Russ Harvey Consulting - Computer and Internet Services

Restoring Privacy

Take Back Your Privacy | Safer Browsing | VPNs | Take Back Control

Check the privacy settings for your devices and software/apps

Your Privacy At Risk

Your privacy is at risk like it has never been before, yet most folks think they have no need for concern and that only guilty criminals need be concerned.

Why should I care about privacy, when I have nothing to hide? — Reset the Net

They are wrong!

Your Privacy at Risk documents the unprecedented attacks on personal freedom being perpetrated by corporations and governments worldwide.

Profit and political control are the motives. The cost is our privacy.

Take Back Your Privacy

Privacy is power over your own information.

When you realize how much your privacy is threatened, you can either feel impotent or you can learn how to take back your privacy.

I recommend becoming an advocate for privacy.

Much like we lock our doors to retain our physical privacy, we can learn to do the things we need to do to restore our privacy on the Internet.

Organisations can no longer assume that any personal information given to them can be exploited in any way they see fit. — Elliot Rose

This page contains information that will help you protect and restore your privacy.

Avoid Giving Information Away

Take these steps to avoid giving away unnecessary information:

You also need to take steps to avoid compromising other people's privacy like using BCC (blind carbon-copy) when sending emails to groups so you don't reveal their email addresses and in what you post on social media or blogs.

Learn More About Privacy

OpenMedia works to keep the Internet open, affordable, and surveillance-free. We create community-driven campaigns to engage, educate, and empower people to safeguard the Internet. — OpenMedia
Though the internet and social media have been used by the public for decades, the concept of privacy still lacks a modern application to the online world. Digital privacy, therefore, is still very much a legal frontier. — University of Dayton's School of Law

Protect Your Privacy

Be selective in the information you provide.

Avoid giving it away without thinking about the potential consequences first.

  • Does this site need the requested information to supply what I need?
  • How will they use that information?
  • Will they share (sell) that information with others?
  • How will they protect my personal information?
  • If they fail to protect it, what are the consequences for me? For them?

Providing data that enables a company to better sell you what you don't need in exchange for a newsletter or a free document can be a very poor bargain (at least for you).

Forms are Collecting Personal Data

Everyone that asks you to fill out a form — whether a paper form or on-line — is collecting personal data.

Once you provide that information, it is no longer in your control.

While everyone is diligent in collecting your information, they are less careful in protecting that information — particularly if an opportunity to profit comes along.

Decline Email Receipts

The next time you're asked by a sales clerk if you want an emailed receipt, don't.

While it may be harder to lose an emailed receipt, the retailer's marketing department can use it to profile you or send you ads.

The University of Dayton School of Law has an excellent overview of online privacy in their article, How much privacy do you have online? Their recommendations:

  1. Know what to look for in the Terms and Conditions.
  2. Clear out cookies and fully close a browser after every session.
  3. Take advantage of customizable settings.
  4. Use digital tools to better understand consumer rights.

Read the article to fully understand the issue of online privacy from a legal point of view. The legal information pertains to the United States, but the general information and recommendations apply everywhere.

Does This Site NEED My Information?

If you are ordering a product, the company will need your shipping address and payment information.

However, you have choices in how that is accomplished. For example, by using PayPal the seller won't have your credit card information (but PayPal will).

Many sites offer the option to create a unique log-in identity or use your Facebook or Google profile.

  • Logging into a third-party site with your Facebook ID provides that third-party site to your Facebook profile, including your Facebook friends, likes, dislikes, political views and more. Your Google profile provides similar information.
  • Generating a unique account with its own password provides that same company only with your name and email address.

Which do you think protects your privacy more?

Hint, Facebook doesn't believe in privacy unless you want to know what Mark Zuckerberg is doing.

How Will They Use That Information?

Depending upon the site, you should be very selective in providing information.

For example, sites don't need your birth date, only to know if you're old enough to enter into a binding legal agreement. Many sites choose the birth date because that provides them with much more precise information about you.

Facial Recognition

Using your photo for a profile picture or avatar may personalize your experience, but facial recognition software can relate the information to data found on other sites with the same photo — and it can return false results. Combining seemingly innocuous information with trackable information (your IP address, email address, etc.) can create a profile that can be used to direct advertisements or to sell to information brokers.

Will They Share With Others?

Unless specifically stated, you have to assume that they will share your information with others if it is profitable. If the company is sold or if they receive a government warrant, the new company is not bound by any promises made to you.

Big tech has been on a buying spree. While they're acquiring technology, they're also adding to their ability to profile their site visitors.

Monopoly is made by acquisition — Google buying AdMob and DoubleClick, Facebook buying Instagram and WhatsApp, Amazon buying, to name just a few, Audible, Twitch, Zappos and Alexa. — NY Times

How Will They Protect My Information?

Most companies spend much more protecting their own information than protecting yours.

Have you noticed that most security breaches only affect consumer data, not corporate data. After all, it didn't cost them anything to acquire!

Governments don't enforce protection or require significant penalties.

What is their Privacy Policy?

You should always read and understand the privacy policy of any site before you choose to give personal information. See more about privacy policies.

The privacy policy is a legal document, it spells out how a company collects, stores, uses, and shares your data. — IRL Podcast

You need to check this policy from time-to-time as privacy policies change for a number of reasons including purchase of the company or a new business plan.

Any site without a privacy policy probably does NOT have your best interests at heart.

That said, it becomes increasingly impossible to read the privacy policy of every website (or to understand the complex language used).

A study by researchers at Carnegie Mellon concluded,

…if the average American were to actually read every single privacy policy of every single web service that she used in a year…[t]he average user would have to spend between 181 and 304 hours each year reading privacy policies. — “Disappearing phone booths: Privacy in the digital age”

That's the equivalent of between approximately 4.5 and 7.6 work-weeks (about a month or two every year) — just reading privacy statements!

Privacy Policies are Changing

You only need to look at the way Facebook and others so quickly change their privacy policies to enhance their profitability. You're mostly on your own when it comes to protecting your identity.

If the service is free, then you are the product. — The day we lost everything

Government legislation is needed to create and enforce a standard by which consumers are protected and given an even chance against corporate giants.

Consumers need a central location to find out what information companies have collected about them, how it is being used and the ability to restore your privacy.

The changes in the European Union were that resulted in all the new notices about cookies when you load a website are an example.

Privacy updates notices are an opportunity to cancel services you no longer use.

Who Has Your Back?

In the face of unbounded surveillance, users of technology need to know which companies are willing to take a stand for the privacy of their users. — Electronic Frontier Foundation
We are at a critical moment for free expression online and for the role of Internet intermediaries in the fabric of democratic societies.


In particular, governments around the world have been pushing companies to take down more speech than ever before.


What responsibilities do the platforms that directly host our speech have to protect — or take down — certain types of expression when the government comes knocking? — Electronic Frontier Foundation, 2018
EFF 2018 report on the track record of companies in protecting your privacy

EFF released Who Has Your Back? Censorship Edition 2018, documenting the track record for social media, communications and other companies in releasing private information to the government.

The Apple App Store, Google Play Store, and YouTube scored the highest but Facebook and Instagram both failed to match the records of other social networks and tech companies.

One of the reasons I recommend using Firefox as your primary browser is Mozilla's stand on privacy.

We Need to Do Better

The problem with our private data is that so much of it is irreplaceable and cannot be altered like a password. Once released into the world, there is no calling it back.

Both companies and individuals need to quit ignoring the damage caused by security breaches and careless postings on social media.

Fix It Already

Tech companies could change these things to make your life easier and protect your digital security and privacy. Why haven't they yet? — Fix It Already

Do You Protect Others' Privacy?

Are you careful to protect other people's privacy when sending out emails or posting on social media?

Learn how to protect other people's email addresses when sending to lists.

Check Your Privacy Settings

Take the Mozilla privacy survey to see how well you are improving your privacy awareness and changing habits.

Social Media

Social media is a very important aspect of privacy because so much personal information is collected including facial recognition software, comparative and linked data (such as the "Like" button).

Are you sharing too much?

Return to top

More About Restoring Privacy

The following resources provide more information about privacy policies, privacy guides, privacy tools and privacy when crossing borders.

About Privacy Policies

Privacy Guides

Privacy Tools

Privacy When Crossing Borders

Return to top

Safer Browsing

Do Not Track

Current browsers have the capability of telling a site that you don't want to be tracked. But that assumes that a site will bother to respond. There are few, if any, such mechanisms in place.

Do Not Track is a browser setting where the user can indicate that they don't want to be tracked. However, without a consensus about how to interpret DNT, most sites ignore the setting:

At this time, there is no general agreement on how companies interpret Do Not Track signals. This site does not currently respond to Do Not Track signals, whether the signal is received on a computer or on a mobile device.

If if wasn't so profitable to track users and their metadata, I'm sure that standards could be accomplished. It would probably take legislation to enforce such a mechanism and governments are implicit in the collection of metadata and its storage without court oversight.

Still Worth Setting

[D]espite the fact that only a small number of companies respect it — a significant number of companies like Twitter, Medium and others do respect it. — Jules Polonetsky

Hopefully, when there is a universally-accepted standard in place, all websites will honour them.

I wonder if the desire to ignore such requests is behind the failure to cooperate in a respected standard.

Early anti-spam technical fixes failed because no one wanted to accept anyone else's solution. The result? The huge amount of spam we have to deal with today.

Even when Do Not Track is enabled, some facilities also track store visitors via their cell phone using Mobile Location Analytics.

Panopticlick is an online test that analyzes how well your browser and extensions protect you against online tracking techniques, even if you are using privacy-protective software.

Opt-Out Cookies

The Network Advertising Initiative offers to place an opt-out cookie on your computer for certain ad servers such as DoubleClick.

However, any opt-out solution is a unethical. The honourable thing would be to honour the Do Not Track setting in the browser.

Cookies Report on Your Web Habits

People have become more aware of the amount of information that is collected about them while they are on the Internet using such devices as cookies.

You can deal with cookies using some of the many utilities available on the Net or by using the tools provided by modern browsers (Firefox recommended).

Flash Cookies

Many sites use flash cookies (Local Shared Objects or LSOs) that are not deleted when you remove traditional cookies. Adobe provides information on how to manage or disable LSOs, but ignorance makes most users vulnerable to exploitation by sites that use them.

CCleaner is capable of cleaning LSOs, but this is not enabled by default.

Flash is listed as one of three programs that make Windows vulnerable to malware (as well as Linux and Mac if Flash is installed). As technology moves away from Flash, the risk of LSOs should diminish.

Flash is often used to display ads that can be tracked from site-to-site. Using click-to-play you can enable Flash only when it is required (which is how current versions of Firefox handles Flash).

Have a look at my listing of Firefox extensions. Some allow you to manage or remove LSOs but status can change quickly so I won't duplicate the listing here.

Your Choice of Browser Matters

Firefox Recommended | Safari | Internet Explorer | Google Chrome

Your choice of browser affects not only what tools are available to you or how convenient the browser is, but also how much information you share in the process.

The Internet only stays healthy if we trust it as a safe place — to explore, transact, connect, and create. Our privacy and security online is under constant threat. But there's something you can do about it: get informed, protect yourself, and make your voice heard. A healthy Internet depends on you. — Mozilla

Check your browser's privacy settings. Choose your addons carefully as well as any other third-party aspects your browser uses.

Check Your Browser's Search Engine Settings

Choose your search engine carefully rather than accepting the default setting.

Simply using a search engine can leave behind a history that can last for years. My recommendation is StartPage (see how StartPage protects your privacy) or DuckDuckGo.

Firefox: A More Secure Browser

Firefox is my recommendation. Not only is it more secure, but Mozilla is a non-profit organization dedicated to protecting privacy.

Firefox products have never — and never will never — buy or sell user data. — IRL Podcast

Clear Private Data

You should clear your privacy data (cookies, saved form information, cache and authenticated sessions) before and after on-line banking (or similar sites where there is the risk of revealing personal information of greater value).

These settings are on the Privacy tab in the Firefox Options settings. Firefox Options is located on the top right (3 horizontal lines, sometimes called the “hamburger” menu).

Once the Options dialogue box appears, click on the Privacy tab and check Clear history when Firefox closes. You can choose which items get removed by clicking the Settings button on the right:

Clear Private Date dialogue box

Apple Made Safari the “Good Privacy” Browser

Apple announced significant changes to fight ad-tracking and digital fingerprinting at WWDC 2018.

The newest version of Apple's Safari browser will push back hard against the ad-tracking methods and device fingerprinting techniques that marketers and data brokers use to monitor web users as they browse. Starting with Facebook.

The next version of Safari will explicitly prompt you when a website tries to access your cookies or other data, and let you decide whether to allow it, a welcome step toward explicit choices about online tracking. — Wired

Internet Explorer: Simply Too Vulnerable

Internet Explorer (IE) is a major security vulnerability within Windows and therefore should not be used as your primary browser when surfing the Internet.

Windows 10 includes IE along with Microsoft Edge, however it was not intended to be used as your primary browser:

"You see, Internet Explorer is a compatibility solution," wrote [Microsoft security chief] Jackson in the blog. "We're not supporting new web standards for it and, while many sites work fine, developers by and large just aren't testing for Internet Explorer these days. They're testing on modern browsers. — ZDNet

Security risks are not unique to Internet Explorer but its reach is deep into the Windows operating system, making it more vulnerable to security issues than any other browser.

If a website won't load properly except in IE or Google Chrome, you're probably better off going elsewhere for your information.

Google Chrome: Convenient but Lacks Privacy

Google Chrome has become very popular by surreptitiously installing itself as the default browser as a paid add-on to other free software such as AVG, Defraggler and Adobe Flash:

Google is pre-checked in Piriform's Defraggler installer

Pre-checked Installations

Although it was an “optional” addon, it was pre-selected and folks simply clicked through the options without checking for extra software.

Now Controlling Global Searches

Google now controls a significant majority of both Web searches AND browser installations, giving Google a monopoly on access to content on the Web.

Google controls about 62% of mobile browsers, 69% of desktop browsers, and the operating systems on 71% of mobile devices in the world. 92% of internet searches go through Google and 73% of American adults use YouTube. Google runs code on approximately 85% of sites on the Web and inside as many as 94% of apps in the Play store. It collects data about users' every click, tap, query, and movement from all of those sources and more. — EFF

Combined User Data

Google has become more powerful, purchasing existing companies with expertise in areas they traditionally didn't have access, then combining it with the users' data from all their companies to create powerful search and advertising profiles.

Don't Sign-in To Google

Chrome does this, in part, by keeping the user's data on their servers rather than on the user's computer so you have access to their data from any number of computers, phones and tablets.

More Effective Targeted Ads

This is convenient but eliminates your ability to fully control your own information. Google uses this information to serve more appealing ads based upon what you've viewed with Chrome.

Free Email Costs You Your Privacy

So many people have moved to using “free” cloud-based webmail programs that the market has virtually collapsed for independent stand-alone email programs.

Running Google's free Gmail while surfing the Web (especially while using the Chrome browser) will provide even more information about yourself, helping to create a more accurate profile to serve ads to. Google never forgets!

No Privacy

The biggest issue is privacy.

Services like Gmail, Yahoo! Mail and (formerly Hotmail) can sift through your emails to build a profile on you to sell advertising.

Even if companies claim not to use your emails for profiling, privacy policies can change in a heartbeat.

No Security

The Yahoo! data breach shows that your privacy was NOT a priority.

The company suggests the stolen information could include personal credentials such names, email addresses, telephone numbers, dates of birth, hashed passwords (the vast majority with bcrypt) and even security questions and answers. — Mashable

Not only was that enough information to commit identity theft but Yahoo! took several years before telling anyone.

Security breaches are increasingly common, each revealing more about you to hackers and scammers.


If you've had difficulty getting Gmail to work smoothly in your email program, you're not alone.

Google wants you to leave a browser window open with Gmail running. By knowing the sites you're visiting they can present “more relevant” ads (i.e. ads that you're more likely to click on based upon your surfing history). Of course, if you're running Chrome, they already know this.

StartMail Recommended

StartMail (US$59.95 per year) provides an alternative to ‘free’ email services that aren't free — you pay for them by sharing the most intimate details of your life with corporations and marketers. StartMail's privacy policy.

Everyone uses email, but sending regular email is like sending a postcard — it makes snooping very easy! That's why we built StartMail from scratch: a total solution for protecting your email privacy that includes features like extra-secure data storage, disposable email addresses, and an ownership that will resist unwarranted intrusion.

Return to top

Virtual Assistants

We're now interacting directly with our computers using virtual assistants built into our devices (Siri, Cortana, Google Assistant). Internet-connected devices like Amazon Alexa and Google Home are have become the virtual assistants in our homes and offices.

Marketing Potential

While these can be tremendous help, there is much more involved.

There is a war for your loyalty.

In the future these virtual assistants are going to have a larger role in what music we listen to, what movies or TV programs we watch and what products we buy.

They're Listening

We are providing more information to these devices every time we use them.

By their very nature, they need to know a lot about us to be effective (one of the reasons that Siri or Cortana want to get to know you when you get started with them).

You can't have Google call Beth if they don't know who that is and how to best contact her. When we refer to Beth as our sister, then the assistant knows her relationship to us.

Danger, Will Robinson

Not all is as rosy as it appears. Using these virtual assistants is providing a lot of personal information to companies with a less-than-perfect track record for privacy.

Human Monitoring

We have less control over what is collected than you might think.

Voice data is being monitored all the time but the assistant is supposed to wait for the “hey Google” prompt. That may not limit what is recorded and can reveal a lot of private information.

Apple contractors regularly hear confidential medical information, drug deals, and recordings of couples having sex, as part of their job providing quality control, or "grading", the company's Siri voice assistant, the Guardian has learned. — The Guardian

Children's Access

Children are quick imitators and young children have been found to be conversing with these virtual assistants like they are a friend.

Your Devices Are Watching You

Samsung and Vizio televisions have recorded conversations and other devices can collect very personal information about us as well.

This issues is only going to get worse as the Internet of Things becomes pervasive and a thousand small devices like baby monitors, smart toys, security devices, etc. begin monitoring our activities

Protecting Your Privacy

You need to do several things to protect yourself. Start by choosing devices based upon their privacy track record. Next, change the default passwords and privacy settings on devices like Alexa and Google Home.


VPN Services

A Virtual Private Network, or VPN, is often used by businesses to secure their private network over a public network.

Using a VPN is a safer way to browse on an unsecure network, such as a public Starbucks wi-fi; however, it does not stop trackers from gathering browsing information on you. Trackers gather information using things other than your location or ISP, and could still identify you based on your browsing habits. — Ghostery
A Virtual Private Network (VPN) is just a fancy way of saying that you can use the internet while remaining invisible to your ISP. — Top VPN Canada
In an era of increased surveillance, VPNs have become an essential tool to safeguard our online activity from prying eyes. — OpenMedia

For most users this will mean securing your access over the Internet using a private VPN service so that your communications are encrypted.

[A VPN] secures your computer's internet connection to guarantee that all of the data you're sending and receiving is encrypted and secured from prying eyes. — LifeHacker

Be careful in how you select your VPN. There are lots of VPN services.

Cheap or free VPNs have to make money somehow and might be doing so by selling your private data or worse.

Paid VPNs are no guarantee of privacy, but their fees provide the means to pay for the service.

Are VPNs truly private? Unfortunately, no. The VPN provider can still log your browsing data. You are essentially putting your trust in your VPN provider. Will your provider hand over info when pressed? Will they log your browser data and sell it at a later date? — Mozilla

If your VPN retains ANY information about you online activity, that data is subject to being sold or released to governments issuing a court order. Given the current low threshold for such warrants, your only protection is a VPN that doesn't retain such information.

Choosing a VPN Service

In researching this section on VPNs, I found a lot of conflicting information and much that uses terminology that sounds tough but lacks any real value (e.g. military grade).

Facebook VPNs Collecting Your Data

Onavo Protect, owned and promoted by Facebook, is NOT recommended.

As a VPN, Onavo — which is still available from the Google Play store — can monitor device traffic at the same highly intrusive level as an Internet service provider (ISP).


That means it can tell where your traffic is going and when. This is a tremendous amount of information, and it has given Facebook a privileged view of the usage trends and growth of its competitors. — EFF
But this time, Facebook went further than it has before, and instructed the app's users to configure their device in a way that undermined their basic security. — EFF

Apple banned Onavo Protect from its App Store. Facebook then released Project Atlas and Facebook Research which have similar weaknesses.

About VPNs

Learn what to look for in a VPN service:

VPN Reviews

Probably my biggest issue with the VPNs I've tried is that they massively slow down my Internet.

Reviewers indicate that you have to look around to find one that works for you. I strongly recommend using one while using public WiFi, but paying for higher speed access then paying more to have that throttled back when at home doesn't make economic sense.

TopVPNCanada rates NordVPN as the best for security and PureVPN the best for speed, giving NordVPN the higher rating.

Rather than looking at the wide range of free providers, which often have a lot of limits (and dubious loyalties), we are looking at those vendors who charge a few bucks a month, but put your interests first, rather than those of shadowy advertisers and sponsors. — CNET
Beware: Many highly recommended “best VPNs” don't live up to their privacy claims. —

These reviews should help you to select a suitable provider. Keep in mind's warnings about VPN reviews.

Return to top

Take Back Control

Millions of dollars are spent by tech companies to learn how to fully engage their viewers. These include techniques like

  • the suggestions on the side of YouTube and news feeds;
  • the notifications from Facebook and other social media sites; and
  • the use of instant-on videos on websites to add sound and video to draw you in.

We've Lost Control

A simple check on what you're friends or family are doing can turn into a three-hour Facebook bing. Playing a game for a “five-minute break” and suddenly an hour has gone by.

We Need to Restore Balance

We need to restore balance to our lives by reducing our exposure to these techniques. While profitable to the corporate bottom line, they are increasingly making us feel more isolated.

Take Back Your Phone

Take control of your phone. Don't let your apps control your phone use, change settings to remove the distractions.

  • Try these simple changes to live more intentionally with your devices right now.
  • iOS 12 includes a Screen Time tool (swipe right to see it) that allows you to control activity.
  • Edit what appears on your screen. Do you really need real-time weather, news, stocks, etc.? Do you need all those apps?

Crossing Borders?

Like much of Canada's privacy laws, the rules governing border searches pre-date the consumer use of the Internet and cellphones and are seriously out of touch with the reality that we carry our entire lives on our smartphones.

Border searches can be conducted not only at the actual border, but within 100 miles (160 km) of the U.S.-Canada border as well as at airports or even when boarding a cruise ship.

There is an increasing trend around the world to treat borders as law-free zones where authorities have the right to carry out whatever outrageous form of surveillance they want.


But they're not: the whole point of basic rights is that you're entitled to them wherever you are. — Edin Omanovic
Canada's border agents can search your phone and laptop at borders and airports, including looking through your private photos, personal messages, and call history. — OpenMedia
[B]order agents could end up seeing private emails and text messages, photos, web browser histories and sensitive documents, even if you've done nothing wrong. — CTV News

The recommendation is to leave your devices at home. If you plan to take your digital devices across the border, check out the following advice:

…[B]efore crossing the border, delete private material or transfer it to the cloud; at the border, turn on airplane mode yourself; and, finally, be prepared, unless you have some really compelling privacy reason, to just turn over your phone. — CTV News

Reset the Net

One year after Snowden revealed just how much governments were collecting, Reset the Net launched splash screens like the one below.

Reset the Net. Take back your privacy and freedom.

This program urged people to take back their privacy by signing the following pledge and taking action:

Mass surveillance is illegitimate. I'm taking steps to take my freedoms back and I expect governments and corporations to follow in my footsteps and take steps to stop all mass government surveillance.

While the June 5, 2014 date is far in the past, it is even more important that we follow advice to end surveillance and the collection of big data.

The Nature of the Problem

Rather than discovering and repairing weaknesses in Internet security, governments are exploiting them to spy on the entire world, twisting the Internet into something it was never meant to be: a panopticon.


I urge you to take the initiative to follow the recommendations (and those elsewhere on this page) to restore your privacy.

Start Using Privacy Tools

Start using effective privacy tools and be sure that you're not installing software that is unsafe to use.

Websites complaining about protective technologies were the ones that abused your privacy.

The real cost of using “free” apps is your privacy.

See the Reset the Net Privacy Pack and my recommended software.

For Website Owners

Website owners should begin to use technologies that secure their sites and make them safer to use.

Avoid invasive (a.k.a. sleazy) techniques. These place your site visitors at risk and your site's security.

Pledge to add SSL, HSTS & PFS protection this year; it matters! Already rocking SSL & HSTS? Consider approaches to end-to-end crypto.

For Mobile App Developers

Too many apps collect information they don't need (often surreptitiously) then selling it. Not only should these apps be banned, but so should the developers that released them.

Some developers released their app without securing it properly Those developers' products should not be in the app store.

Technologies like SSL and proper certification pinning should be mandatory. End-to-end encryption makes messaging much safer and your app a worthwhile download.

If you serve ads on your free apps, you need to ensure that ALL third party code, including ads and analytics, are secure.

Ensure that ads within your app play nicely.

  • Avoid ads that crash an app or lock it up for extended periods of time.
  • Your paid version is judged by the performance of your free app.

Related Resources

Related resources on this site:

or check the resources index.

If these pages helped you,
buy me a coffee!


Return to top
Updated: September 13, 2020