Proton
browsing history privacy

ISPs are selling your private browsing history. Here’s how to prevent it.

Updated on January 31, 2019

Thanks to the passage of S.J.Res.34 in 2017, Internet service providers can sell and share users’ browsing history with advertisers. Here is our analysis of this law and the steps you should take to protect your privacy.

US lawmakers voted in favor(new window) of allowing Internet service providers (ISP) like Verizon, Comcast and AT&T to sell and share customers’ browsing history for advertising purposes. This is a major breach of browsing history privacy. This resolution was passed by Congress and signed into law by President Trump on April 4, 2017.

How did we get here?

The Internet today is largely driven by advertising, and the fuel that powers this multi-billion dollar industry is personal data which allows advertisements to become more and more targeted. Together, companies like Google and Facebook make over one hundred billion dollars per year(new window) by selling access to the insights gleaned from personal data such as search history and private email communications.

Previously, privacy regulations set by the Obama-era Federal Communications Commission (FCC) made it impossible for ISPs to violate customer privacy and sell browsing history to advertisers without explicit customer consent. To bypass these regulations, the US telecom industry directly lobbied 24 US senators, including contributing over $2.2 million(new window) to their re-election campaigns. As a result, Senate Joint Resolution 34 (S.J.Res.34(new window)) was introduced, passed, and signed into law.

What does this mean for online privacy?

An ISP is a company that provides you with web access. ISPs can see everything you do and every website you visit since they own the internet infrastructure you are using. This means the amount of the data ISPs have on users is much larger than what search engines or social networks like Google and Facebook collect. Whether it’s Facebook, New York Times or a website that you visit in secret, your ISP has a record of all of your browsing history.

Since S.J.Res.34 became law, this highly personal and intimate data can be sold to the highest bidder, who can use this data to show invasive advertising that will pry into our private lives like never before. Even worse, no customer consent is required to do this, so your data can be sold without your permission.

How can you protect your browsing history privacy?

Because the legislation does not require ISPs to get your consent before providing your browsing history to advertisers, there is nothing you can do to opt-out of this privacy violation. Not using an ISP is also not a realistic proposition, as that is equivalent to not using the Internet. However, there are several things that can be done to make sure your private browsing activity stays private.

Use a VPN

The best way to prevent your online activity from being collected by your ISP is to use a Virtual Private Network (VPN). A VPN will shield your browsing history from the prying eyes of your ISP by encrypting and routing your Internet traffic through a private server. This makes it impossible for your ISP to monitor your browsing activity. Proton VPN(new window) has a strict no logs policy to make sure that your online activity remains private. We also offer a free VPN service so that everyone can have secure and private access to the Internet. For more information about VPNs, see our article about choosing the best VPN service.

Don’t use email provided by your ISP

Your ISP likely provides you with a free email address (such as rr.com or comcast.net). Giving your ISP your browsing history is bad enough, don’t also hand over your personal email data. Going to an email provider like Gmail also isn’t a solution because Google may be even worse when it comes to your privacy. However, Gmail alternatives such as Proton Mail are much different.

Because Proton Mail utilizes end-to-end encryption, we don’t actually have the ability to read your emails, and therefore cannot sell your data to advertisers. Instead of paying with your privacy, Proton Mail is supported by paid users, which allows us to put your privacy first.

Lastly, if you are a US voter who is disturbed by this new legislation, you can also contact your Congressman or Senator to voice your objection. Now more than ever, it is important to oppose efforts that have put commercial interests ahead of privacy rights.

You can get a free secure email account from Proton Mail here(new window).

Proton Mail is funded by community contributions. If you would like to support our development efforts, you can upgrade to a paid plan(new window). Thank you for your support!

Suojaa yksityisyyttäsi Protonilla
Luo ilmainen tili

Related articles

en
Cyberattacks aren’t always executed through sophisticated methods like man-in-the-middle (MITM) attacks on public WiFi. Sometimes, they rely on something as simple as looking over your shoulder.  Shoulder surfing attacks are when someone watches you
en
Proton prioritizes our community’s privacy and data security in every aspect of our business.  To further demonstrate our commitment, we underwent a rigorous external audit and – on May 2, 2024 – received our ISO 27001 certification.  As an organiz
en
Anyone with an iPhone can now enjoy Proton Drive’s secure and private photo backup capabilities. This feature is gradually rolling out to the Proton community and will be available to everyone by the end of this week. Smartphones have made us all am
en
From the very beginning, Proton has always been a different type of organization. This was probably evident from the way in which we got started via a public crowdfunding campaign that saw 10,000 people donate over $500,000 to launch development. As
en
Your online data is valuable. While it might feel like you’re browsing the web for free, you’re actually paying marketing companies with your personal information. Often, even when you pay for services, these companies still collect and profit from y
en
Password spraying attacks pose a major risk to individuals and organizations as a method to breach network security by trying commonly used passwords across numerous accounts. This article explores password spraying attacks, explaining their methods