Skip to content

The Zero Lux Digital Footprint Field Guide

The Zero Lux Digital Footprint Field Guide
A guide to help you be as safe as possible in a digital world

Simple steps to protect your privacy and control what the internet knows about you.

This isn’t about going “off the grid.” It’s about making it harder for companies, hackers, and even governments to track what you do online.
Each section gives you the best tools in its category, why they’re trusted, what country they’re based in (jurisdiction), and quick steps to get started.

Burner Phones — A Separate Number You Control

A burner phone is a basic phone you use only for certain calls or apps — not tied to your personal number or accounts. The goal is to keep parts of your life separate from the rest.

What to look for:

Zero Lux Picks:

Nokia 6300 4GMade in Finland (EU)

Alcatel GO FLIP 4TCL, China-owned

Sonim XP3plusU.S.-based

Jurisdiction note: Where the phone is made matters less than how you buy and use it. Buy in cash, use a prepaid SIM, and never link it to your personal accounts.

Quick setup:

  1. Buy the phone in-store with cash.
  2. Get a prepaid SIM (Tello, Mint, Lycamobile) without giving personal info.
  3. Use only for the apps or contacts you want separate.

Browsers — Separate Tools for Separate Tasks

Your browser is how most tracking happens. Cookies, hidden scripts, and “fingerprinting” connect your activity across sites. The fix: use different browsers for different purposes so they can’t all be linked.

Zero Lux Picks:

Firefox (Hardened)U.S.

BraveU.S.

Tor BrowserU.S.-based project, global network

Mullvad BrowserSweden + U.S. (Tor Project)

Quick setup:

  1. Use Firefox for everyday browsing.
  2. Use Brave for sites that require Chrome compatibility.
  3. Use Tor only for sensitive or anonymous searches.

Jurisdiction note: The U.S. allows subpoenas, but open-source browsers can be checked for hidden tracking. Sweden has no data retention laws for browsers.

VPNs — Hide Your Location

A VPN (Virtual Private Network) sends your internet traffic through a private server before it reaches the site or app you’re using. This hides your real location from trackers.

Zero Lux Picks:

Mullvad VPNSweden

ProtonVPNSwitzerland

IVPNGibraltar

Quick setup:

  1. Pick a VPN and sign up (Mullvad allows totally anonymous sign-up).
  2. Install the app on your devices.
  3. Always connect before doing anything sensitive.

Jurisdiction note: Switzerland is outside U.S./EU surveillance agreements. Sweden and Gibraltar have no laws forcing VPNs to log user activity.

Secure Messaging — Keep Conversations Private

Even if your messages are encrypted, metadata (who you talk to, when, and where) can still be collected. Choose apps that limit both content and metadata access.

Zero Lux Picks:

SignalU.S.

SessionAustralia

WireSwitzerland

Why Not WhatsApp or Telegram?

WhatsApp (U.S., Meta-owned) — Encryption is strong, but it collects metadata and stores unencrypted backups by default.

Telegram (UAE/global) — Not encrypted by default, and most chats are stored on their servers.

Quick setup:

  1. Install at least two secure messengers (Signal + Session).
  2. Use a separate number (from your burner phone) for sign-up.
  3. Enable disappearing messages where possible.

Passwords & Account Security

A single leaked password can undo every other privacy measure.

Zero Lux Picks:

Quick setup:

  1. Install a password manager.
  2. Give every account a unique password.
  3. Add two-factor authentication wherever possible.

Data Storage & File Handling

If someone gets your device or cloud account, they shouldn’t be able to read your files.

Zero Lux Picks:

Quick setup:

  1. Encrypt your laptop’s hard drive in system settings.
  2. Use encrypted cloud storage for sensitive files.
  3. Securely wipe old devices before selling or recycling.

Your Personal Privacy Plan

You don’t need every tool in this guide — focus on what fits your needs.

Zero Lux Digital Privacy Scorecard

Module / Step Points Threats Mitigated
Burner Phone 15 Phone number tracking, SIM-linked identity, contact linking
Browser Compartmentalization 15 Cookie tracking, browser fingerprinting, cross-site profiling
VPN Use 15 IP-based location tracking, ISP logging, geofencing
Secure Messaging 15 Message interception, metadata leaks, contact correlation
Password Manager + 2FA 15 Account hacking, credential stuffing, phishing success
Encrypted Storage 15 Device seizure, lost/stolen device data access, cloud breaches
Personal Privacy Plan 10 Overlap exposure, operational slip-ups

Total Possible: 100 points

Threat Levels:

Important Note on Limits of Privacy Tools

Scoring 100 points means you’ve built a strong defense against:

What this guide does:

What Nation-State Surveillance Looks Like

These are examples of real tools and capabilities used by governments and intelligence agencies. They’re rarely deployed against the general public, but show why no system is truly “unhackable.”

Commercial Spyware Platforms

Custom Government Malware / Implants

Network-Level Collection Systems

Device & Firmware Exploitation

Geolocation & Bulk Data Tools

What this guide cannot do:

Bottom line: The goal is risk reduction, not risk elimination. These measures remove you from the pool of “easy targets” and force an adversary to dedicate significant resources — something usually reserved for a very small number of people.