Privacy vs Anonymity

Do you know what your Netflix history, your phone’s location, and that message you quickly deleted on WhatsApp have in common? They all leave  digital footprints  that others could use to spy on you, sell you something, or scam you.

Privacy vs. Anonymity: Are They the Same Thing?

Privacy

Privacy is the right to control who has access to your personal information and how it is used. It is about deciding what you share, with whom, and in what context.

Privacy =  You decide  what information you share and with whom.

Anonymity

Anonymity is the state of not being identifiable. It is when you act without revealing your real identity.

Anonymity =  Nobody knows  it’s you.

Why do both matter?

Privacy  protects you from others using your information against you (e.g. ,  job discrimination, aggressive advertising, identity theft, kidnapping, etc.).

Anonymity   allows you to act without fear of retaliation (e.g. reporting corruption, voting in secret )

Privacy: A Right with History

From the US Fourth Amendment (1791) to Europe’s GDPR Regulation (2018), the world has attempted to protect this right. The Universal Declaration of Human Rights (1948) makes this clear:

“No one shall be subjected to arbitrary interference with his privacy”  (Article 17).

But today, the Internet is putting this in jeopardy. The reason?  Metadata  (the “envelope” of your data) is not protected by laws or encryption.

Who’s snooping through your data?

The Internet is like a party full of curious people. Here I explain who they are and what they do:

– ISPs (Internet Service Providers) : They see  all  the pages you visit. They can and do sell that data to third parties.

– Advertisers : They track your searches and online habits. They show you personalized advertising (sometimes too specific).

– Cybercriminals : They hack accounts and steal identities. They sell your data on the Dark Web.

– Social Networks (Facebook, Instagram, TikTok, etc.) : They know how many seconds you looked at each photo or video. They analyze who you interact with and what you share.

– Data Brokers : They buy and sell your data as if it were trading cards. For example: your address, tastes, purchases and browsing habits.

– Web Services (Google, Amazon, etc.) : They store your searches, purchases and preferences. They use this data to improve their services (and sell you more).

– Big Tech Companies (Apple, Microsoft, Meta, etc.) : They collect data to improve their products. They also use it for commercial purposes, such as targeted advertising.

– Intelligence Agencies : They use tools to monitor communications. They detect “threats” (sometimes without your consent).

The problem: When all this data is combined, it creates an incredibly detailed profile of you. And that, without your consent.

Metadata: The “Envelope” of Your Digital Life

When you send a message, it’s not just the content (the “what”) that matters, but also the  metadata  (the “who, when, and how”). It’s like the envelope of a letter.

Metadata is like the “envelope” of a letter. It is not the content of the message itself, but rather information  about  that message. In other words, it is data that describes other data. For example, if you send an email, the content of the message is the “what,” but the metadata is the “who, when, where, and how.”

Types of Metadata

Here I explain the most common types of metadata and how they are used:

  • IP Address :
    • It’s like your “digital address” on the Internet.
    • Reveals your approximate location and your Internet Service Provider (ISP).
    • Example : If you visit a website, the server records your IP to know where you are connecting from.
  • Sending/Receiving Time :
    • Indicates when a message or file was sent and received.
    • Example : If you send an email at 3am, someone might deduce that you are a nocturnal person.
  • Connection frequency :
    • Shows how often you connect to a service or platform.
    • Example : If you log on to a dating app every day, someone might infer that you are looking for a partner.
  • Connection duration :
    • Indicates how much time you spend on a page or app.
    • Example : If you spend hours on Netflix, they might deduce that you like entertainment.
  • Data packet size :
    • It reflects the volume of information you send or receive.
    • Example : If you upload a 50MB file, it could be a video or a presentation.
  • Device used :
    • Includes the type of device (mobile, PC) and its operating system.
    • Example : If you use an iPhone, advertisers may show you iOS-specific ads.
  • Geographic location :
    • Although not always accurate, it can reveal your city or country.
    • Example : If you connect from Madrid, you may receive ads in Spanish.

How is Metadata Transmitted over the Internet?

When you use the Internet, your data travels in “packets.” Each packet has two parts:

  • Content : The message, photo or video you send (this may be encrypted).
  • Metadata : Information about that content (this is almost never encrypted).

Transmission Example :

Imagine you send a message on WhatsApp:

  • Content : “Hello, how are you?” (end-to-end encryption).
  • Metadata :
    • Who sent it (your phone number).
    • To whom (your friend’s number) was sent.
    • When it was sent (time and date).
    • From where (your IP and approximate location).

This metadata travels over the Internet along with the message, but unlike the content, it is not protected by encryption. This means that even if the message is private, the metadata can be intercepted and analyzed by third parties.

Who Can Access Metadata?

Almost any actor on the Internet can collect and analyze metadata:

  • ISPs : They see your IP, the pages you visit, and how much time you spend on each one.
  • Social Networks : They know who you interact with, when and from where.
  • Advertisers : They use metadata to create advertising profiles.
  • Intelligence Agencies : Analyze behavioral patterns to detect “threats.”

Why is Metadata Dangerous?

Although they may seem harmless, metadata can reveal a lot about you:

  • Behavioral Patterns : If you always log on at 2am, they might assume you work at night.
  • Personal relationships : If you always call the same number, they might know who your partner is.
  • Political preferences : If you visit certain websites, they may infer your ideology.

In 2013, Edward Snowden revealed that the NSA used metadata to track phone calls, creating maps of relationships between people without listening to the conversations.

Metadata is gold for AI!

  • They are  unencrypted  (anyone can see them).
  • There are no laws to protect them (GDPR only covers personal data, not metadata).
  • With them, an algorithm can deduce whether you are sick (e.g. if you stop using sports apps) or if you are planning a trip (increase in flight searches).

Anonymity: Your Shield in Key Situations

Anonymity is not for criminals. It is vital in:

  • Voting : If your vote is not secret, would you dare to choose the candidate you want?
  • Health : Would you share your depression with a doctor if your future boss could find out?
  • Reports : How would you expose corruption if your identity was leaked?

Surveillance + AI = Significant Risks

Artificial intelligence can analyze millions of metadata in seconds. How does this affect you?

  • Psychological profiling : In 2018, Cambridge Analytica used Facebook data to manipulate voters in elections.
  • Employment discrimination : Looking for a job? An algorithm could rule you out if it detects you visit mental health forums.
  • Personalized scams : If they know you travel a lot, they will send you phishing emails from fake airlines.

How to protect your privacy?

  • VPN : Hide your IP (like using an invisible tunnel to browse).
  • Anonymous browsing : Use Tor , or better yet NYM, which also protects metadata
  • Encrypted Messaging – Read this post .
  • Temporary emails : read this post

Privacy and anonymity are not just for spies and hackers. They are rights that protect your freedom to think and live without fear.

“Anonymity is not a mask; it is a shield . “

You can read my manifesto here