Do You Know How to Use Tech Responsibly?
Do You Know How to Use Tech Responsibly?
Epstein Digital Hygiene Inventory (EDHI) v. 3.0, © 2025, Dr. Robert Epstein  

You are about to take the Epstein Digital Hygiene Inventory (or EDHI). Designed by Dr. Robert Epstein (follow on Twitter at @DrREpstein), one of America's most distinguished research psychologists, this is a comprehensive inventory of eleven important skills you and your family need to use computers, mobile phones, tablets, and other new devices responsibly - to protect your privacy and your data, defeat censorship, and stop Big Tech companies from manipulating you and indoctrinating your children.

The content of the test is based on an extensive body of scientific research summarized in Dr. Epstein's upcoming scientific monograph, Preventing the Misuse of Digital Influence.

Most people are able to complete the questionnaire in 10 or 15 minutes, and there are no right or wrong answers. Just select the response that seems best. After you answer all the questions, we'll give you a detailed report showing your scores and explaining what they mean. This is just the start; once you know your EDHI scores, there are many avenues you might pursue to improve your "digital hygiene."

If you are conducting research and would like to collect raw data for a group that is taking this test - for a business, research study, classroom activity, or other purpose - please see our Group Testing Instructions

Before we get to the inventory itself, we'll ask you a few basic questions about yourself. Demographic information is being collected for research purposes only and will be kept strictly confidential.

To make sure the scoring is accurate, be sure to fill in all the blanks!

*Required response

*Highest Degree:
None
High School
Associates
College
Masters
Doctorate
*Race/Ethnicity:
White
Black
Hispanic
Asian
American Indian
Other
*Gender:
Male
Female
Other
*Sexual Orientation:
Straight
Gay or lesbian
Bisexual
Other



For each of the following questions, select the answer that best applies to you.


*1. I avoid downloading files from peer-to-peer (P2P) file-sharing sites.
Yes  No


*2. If a stranger sends me a link or attachment, I never click it.
Yes  No


*3. I’m aware that my smartphone is probably tracking my location and voice, so I take precautions.
Yes  No


*4. I’m aware of special operating systems I could use to protect my privacy on laptop and desktop computers.
Yes  No


*5. In general, I try to avoid giving an app access to my microphone, location, calendar, photos, or other phone content.
Yes  No


*6. I deactivate social media accounts I no longer use.
Yes  No


*7. I avoid using Android devices, because Android is an aggressive surveillance system.
Yes  No


*8. Even if I never created a social media account, I know that social media companies have created them for me (“shadow profiles”).
Yes  No


*9. I sometimes add fake information to my social media to protect my privacy.
Yes  No


*10. I avoid using the Google search engine because it aggressively tracks my search activity.
Yes  No


*11. I regularly clear all my browsing data (e.g., history, cookies, and cache) throughout the day.
Yes  No


*12. I’m aware that mobile devices (such as phones and tablets) can listen in on me even they’re turned off.
Yes  No


*13. I know how to use anti-malware and anti-virus apps on my devices, and I use them regularly.
Yes  No


*14. I have my devices set so that my data backs up automatically.
Yes  No


*15. I avoid sharing my password with others.
Yes  No


*16. I always block social media accounts that make me feel uneasy or unsafe.
Yes  No


*17. Whenever possible, I use a VPN when making an online transaction.
Yes  No


*18. I regularly update my antivirus software.
Yes  No


*19. I try to limit how much my family and friends post about me online.
Yes  No


*20. I always use a search engine that protects my privacy.
Yes  No


*21. I always review the privacy policies of my online personal assistants (such as ChatGPT).
Yes  No


*22. I avoid using products that have microphones or cameras installed (e.g., Nest thermostats, the Ring doorbell, or smart speakers).
Yes  No


*23. I regularly delete apps I don’t need or use.
Yes  No


*24. I am aware that biased answers given by personal assistants can be used to influence my thinking or behavior without my knowledge.
Yes  No


*25. I try to avoid sharing information with personal assistants.
Yes  No


*26. I avoid using Google or Facebook to sign into other apps or websites.
Yes  No


*27. I have nothing to hide, so I don’t care whether companies are tracking me online.
Yes  No


*28. I avoid posting on social media while in an emotional state.
Yes  No


*29. I download apps when urged to do so by companies and websites.
Yes  No


*30. I am aware that private browsing modes usually do not protect my privacy.
Yes  No


*31. I often double-check the truth of news info I see on my social media.
Yes  No


*32. I often use an email that has end-to-end encryption so only my contact and I know what it says.
Yes  No


*33. I always use an ad blocker when I surf the web.
Yes  No


*34. I always turn off the personal assistants on my devices (e.g., Alexa, Cortana, Siri, Google Assistant, etc.) so they don’t spy on me.
Yes  No


*35. To increase my privacy, I sometimes turn off my device’s Wi-Fi and Bluetooth connections when I’m not using them.
Yes  No


*36. I'm worried about how companies are using my personal data.
Yes  No


*37. I know how to adjust firewall settings on my devices to protect my privacy.
Yes  No


*38. I often fact-check the information I’m shown in search results.
Yes  No


*39. I have researched my VPN to determine if it has a good track record and has shown trustworthy business practices in the past.
Yes  No


*40. Before I install an app, I check its reviews and privacy policy to make sure it’s safe.
Yes  No


*41. I only download files from people or places I trust.
Yes  No


*42. If my device is not encrypted by default, I make sure to encrypt it.
Yes  No


*43. I only install security programs that are trusted and well-reviewed.
Yes  No


*44. In online social media postings, I try to reveal as little personal information about me as I can.
Yes  No


*45. I make copies of important messages and emails.
Yes  No


*46. I try to stay up to date with ways I can protect my digital privacy.
Yes  No


*47. My social media account settings are always set to private.
Yes  No


*48. I’m almost always connected to a trusted VPN when I surf the web.
Yes  No


*49. I avoid connecting my virtual assistant to other smart devices in my home.
Yes  No


*50. I use a guest account for day-to-day activities and an administrative account only for administrative tasks.
Yes  No


*51. I avoid using the Chrome browser because it aggressively tracks everything I do.
Yes  No


*52. My devices always have a unique and strong password.
Yes  No


*53. I update my operating system in a timely fashion.
Yes  No


*54. I only accept friend requests from people I know.
Yes  No


*55. When connected to public Wi-Fi (at an airport, for example, or at McDonald’s or Starbucks), I always use a VPN to protect my privacy.
Yes  No


*56. I’m aware that most privacy policies allow companies to retain all of my personal information indefinitely.
Yes  No


*57. In online social media postings, I try not to reveal my location.
Yes  No


*58. I have a plan to recover my data if it is lost.
Yes  No


*59. I check to see how an app uses my data before I download it.
Yes  No


*60. I always use a VPN when downloading content that is sensitive or suspect in some way.
Yes  No


*61. If I have to email sensitive information, I sometimes lock the file with a password.
Yes  No


*62. I know how to use special apps (such as Signal) to make secure voice and video calls.
Yes  No


*63. I know where to find secure apps that protect my privacy.
Yes  No


*64. I install browser plugins or extensions only when I know they’re safe.
Yes  No


*65. I often use secure messaging apps such as Signal to send text messages.
Yes  No


*66. I regularly change the default passwords on my devices.
Yes  No


*67. I know where I can buy a secure phone that protects my privacy.
Yes  No


*68. I always take time to review privacy policies and terms of service.
Yes  No


*69. Trying to protect your privacy online is pointless because tech companies will always find ways to track you.
Yes  No


*70. I typically delay updating my computer and mobile devices.
Yes  No


*71. I’m aware that Apple products generally protect people’s privacy, but that the company also collects data that authorities can access.
Yes  No


*72. Personal data I share online can be used by companies to change how I think and behave.
Yes  No


*73. I trust higher-ranking search results more than lower-ranking search results.
Yes  No


*74. I avoid clicking on sponsored search results.
Yes  No


*75. I make sure that my video calling app doesn’t collect or monitor my activities, metadata, or images.
Yes  No


*76. When I have the option to tell my browser or search engine not to personalize the content it shows me, I always pick that option.
Yes  No


*77. I opt out of being shown advertisements whenever possible.
Yes  No


*78. I regularly use a browser (e.g., Brave or Tor) that protects my privacy.
Yes  No


*79. I am aware that generative AI tools can convincingly fabricate voices, photographs, and videos.
Yes  No


*80. I regularly backup my data.
Yes  No


*81. I’m aware of special operating systems for smartphones that protect my privacy.
Yes  No


*82. I store copies of my data outside of my personal devices, such as in the Cloud or on an external storage device.
Yes  No


*83. To protect my privacy, I avoid using biometrics to lock my devices.
Yes  No


*84. I store my data backups in multiple locations.
Yes  No


*85. I sometimes test my VPN for privacy leaks.
Yes  No


*86. I don’t backup my data because it’s unlikely I’ll lose it.
Yes  No


*87. I am aware that biased search engine results can influence my beliefs and behavior without my knowledge.
Yes  No


*88. I encrypt my backups to protect myself from malware.
Yes  No


*89. I always reject nonessential cookies on the sites I visit.
Yes  No


*90. I avoid using jailbroken phones due to security concerns.
Yes  No


*91. When possible, I use two-factor authentication when I login to apps.
Yes  No


*92. I use a VPN when accessing work-related files.
Yes  No


*93. I regularly change my email password.
Yes  No


*94. I am aware that biased search suggestions can influence my beliefs and behavior without my knowledge.
Yes  No


*95. I avoid using smart devices (e.g., Fitbit, which is owned and monitored by Google) that are linked to the internet.
Yes  No


*96. I’m skeptical about answers I get from personal assistants and chatbots.
Yes  No


*97. The more frequently I change my data, the more frequently I back it up.
Yes  No


*98. I have installed trusted VPN software onto my mobile devices.
Yes  No


*99. I avoid installing illegally pirated software because it might install malware on my computer.
Yes  No


*100. When I’m surfing the internet, I avoid clicking on suspicious links and websites.
Yes  No


*101. I sometimes use browser add-ons that enhance my privacy by blocking trackers.
Yes  No


*102. I keep my device’s camera covered when not in use.
Yes  No


*103. To protect my privacy, I do most of my browsing on laptop or desktop computers rather than on mobile devices.
Yes  No


*104. I only update an app when I’m sure it’s safe to do so.
Yes  No


*105. The cost of securing my data is worth it.
Yes  No


*106. I avoid using home security systems that are linked to the internet.
Yes  No


*107. If I found a flash drive, I would not plug it into my computer because I know the flash drive could damage it.
Yes  No


*108. I limit my time spent on online social networks.
Yes  No


*109. I enable the setting on my VPN that will disconnect me from the internet in case the VPN fails.
Yes  No


*110. I have researched what my VPN protects me from, and what it does not protect me from.
Yes  No