You are about to take the Epstein Digital Hygiene Inventory (or EDHI). Designed by Dr. Robert Epstein (follow on Twitter at @DrREpstein), one of America's most distinguished research psychologists, this is a comprehensive inventory of eleven important skills you and your family need to use computers, mobile phones, tablets, and other new devices responsibly - to protect your privacy and your data, defeat censorship, and stop Big Tech companies from manipulating you and indoctrinating your children.
The content of the test is based on an extensive body of scientific research summarized in Dr. Epstein's upcoming scientific monograph, Preventing the Misuse of Digital Influence.
Most people are able to complete the questionnaire in 10 or 15 minutes, and there are no right or wrong answers. Just select the response that seems best. After you answer all the questions, we'll give you a detailed report showing your scores and explaining what they mean. This is just the start; once you know your EDHI scores, there are many avenues you might pursue to improve your "digital hygiene."
If you are conducting research and would like to collect raw data for a group that is taking this test - for a business, research study, classroom activity, or other purpose - please see our Group Testing Instructions
Before we get to the inventory itself, we'll ask you a few basic questions about yourself. Demographic information is being collected for research purposes only and will be kept strictly confidential.
To make sure the scoring is accurate, be sure to fill in all the blanks!
*Required response
For each of the following questions, select the answer that best applies to you.
*1. I avoid downloading files from peer-to-peer (P2P) file-sharing sites.
Yes
No
*2. If a stranger sends me a link or attachment, I never click it.
Yes
No
*3. I’m aware that my smartphone is probably tracking my location and voice, so I take precautions.
Yes
No
*4. I’m aware of special operating systems I could use to protect my privacy on laptop and desktop computers.
Yes
No
*5. In general, I try to avoid giving an app access to my microphone, location, calendar, photos, or other phone content.
Yes
No
*6. I deactivate social media accounts I no longer use.
Yes
No
*7. I avoid using Android devices, because Android is an aggressive surveillance system.
Yes
No
*8. Even if I never created a social media account, I know that social media companies have created them for me (“shadow profiles”).
Yes
No
*9. I sometimes add fake information to my social media to protect my privacy.
Yes
No
*10. I avoid using the Google search engine because it aggressively tracks my search activity.
Yes
No
*11. I regularly clear all my browsing data (e.g., history, cookies, and cache) throughout the day.
Yes
No
*12. I’m aware that mobile devices (such as phones and tablets) can listen in on me even they’re turned off.
Yes
No
*13. I know how to use anti-malware and anti-virus apps on my devices, and I use them regularly.
Yes
No
*14. I have my devices set so that my data backs up automatically.
Yes
No
*15. I avoid sharing my password with others.
Yes
No
*16. I always block social media accounts that make me feel uneasy or unsafe.
Yes
No
*17. Whenever possible, I use a VPN when making an online transaction.
Yes
No
*18. I regularly update my antivirus software.
Yes
No
*19. I try to limit how much my family and friends post about me online.
Yes
No
*20. I always use a search engine that protects my privacy.
Yes
No
*21. I always review the privacy policies of my online personal assistants (such as ChatGPT).
Yes
No
*22. I avoid using products that have microphones or cameras installed (e.g., Nest thermostats, the Ring doorbell, or smart speakers).
Yes
No
*23. I regularly delete apps I don’t need or use.
Yes
No
*24. I am aware that biased answers given by personal assistants can be used to influence my thinking or behavior without my knowledge.
Yes
No
*25. I try to avoid sharing information with personal assistants.
Yes
No
*26. I avoid using Google or Facebook to sign into other apps or websites.
Yes
No
*27. I have nothing to hide, so I don’t care whether companies are tracking me online.
Yes
No
*28. I avoid posting on social media while in an emotional state.
Yes
No
*29. I download apps when urged to do so by companies and websites.
Yes
No
*30. I am aware that private browsing modes usually do not protect my privacy.
Yes
No
*31. I often double-check the truth of news info I see on my social media.
Yes
No
*32. I often use an email that has end-to-end encryption so only my contact and I know what it says.
Yes
No
*33. I always use an ad blocker when I surf the web.
Yes
No
*34. I always turn off the personal assistants on my devices (e.g., Alexa, Cortana, Siri, Google Assistant, etc.) so they don’t spy on me.
Yes
No
*35. To increase my privacy, I sometimes turn off my device’s Wi-Fi and Bluetooth connections when I’m not using them.
Yes
No
*36. I'm worried about how companies are using my personal data.
Yes
No
*37. I know how to adjust firewall settings on my devices to protect my privacy.
Yes
No
*38. I often fact-check the information I’m shown in search results.
Yes
No
*39. I have researched my VPN to determine if it has a good track record and has shown trustworthy business practices in the past.
Yes
No
*40. Before I install an app, I check its reviews and privacy policy to make sure it’s safe.
Yes
No
*41. I only download files from people or places I trust.
Yes
No
*42. If my device is not encrypted by default, I make sure to encrypt it.
Yes
No
*43. I only install security programs that are trusted and well-reviewed.
Yes
No
*44. In online social media postings, I try to reveal as little personal information about me as I can.
Yes
No
*45. I make copies of important messages and emails.
Yes
No
*46. I try to stay up to date with ways I can protect my digital privacy.
Yes
No
*47. My social media account settings are always set to private.
Yes
No
*48. I’m almost always connected to a trusted VPN when I surf the web.
Yes
No
*49. I avoid connecting my virtual assistant to other smart devices in my home.
Yes
No
*50. I use a guest account for day-to-day activities and an administrative account only for administrative tasks.
Yes
No
*51. I avoid using the Chrome browser because it aggressively tracks everything I do.
Yes
No
*52. My devices always have a unique and strong password.
Yes
No
*53. I update my operating system in a timely fashion.
Yes
No
*54. I only accept friend requests from people I know.
Yes
No
*55. When connected to public Wi-Fi (at an airport, for example, or at McDonald’s or Starbucks), I always use a VPN to protect my privacy.
Yes
No
*56. I’m aware that most privacy policies allow companies to retain all of my personal information indefinitely.
Yes
No
*57. In online social media postings, I try not to reveal my location.
Yes
No
*58. I have a plan to recover my data if it is lost.
Yes
No
*59. I check to see how an app uses my data before I download it.
Yes
No
*60. I always use a VPN when downloading content that is sensitive or suspect in some way.
Yes
No
*61. If I have to email sensitive information, I sometimes lock the file with a password.
Yes
No
*62. I know how to use special apps (such as Signal) to make secure voice and video calls.
Yes
No
*63. I know where to find secure apps that protect my privacy.
Yes
No
*64. I install browser plugins or extensions only when I know they’re safe.
Yes
No
*65. I often use secure messaging apps such as Signal to send text messages.
Yes
No
*66. I regularly change the default passwords on my devices.
Yes
No
*67. I know where I can buy a secure phone that protects my privacy.
Yes
No
*68. I always take time to review privacy policies and terms of service.
Yes
No
*69. Trying to protect your privacy online is pointless because tech companies will always find ways to track you.
Yes
No
*70. I typically delay updating my computer and mobile devices.
Yes
No
*71. I’m aware that Apple products generally protect people’s privacy, but that the company also collects data that authorities can access.
Yes
No
*72. Personal data I share online can be used by companies to change how I think and behave.
Yes
No
*73. I trust higher-ranking search results more than lower-ranking search results.
Yes
No
*74. I avoid clicking on sponsored search results.
Yes
No
*75. I make sure that my video calling app doesn’t collect or monitor my activities, metadata, or images.
Yes
No
*76. When I have the option to tell my browser or search engine not to personalize the content it shows me, I always pick that option.
Yes
No
*77. I opt out of being shown advertisements whenever possible.
Yes
No
*78. I regularly use a browser (e.g., Brave or Tor) that protects my privacy.
Yes
No
*79. I am aware that generative AI tools can convincingly fabricate voices, photographs, and videos.
Yes
No
*80. I regularly backup my data.
Yes
No
*81. I’m aware of special operating systems for smartphones that protect my privacy.
Yes
No
*82. I store copies of my data outside of my personal devices, such as in the Cloud or on an external storage device.
Yes
No
*83. To protect my privacy, I avoid using biometrics to lock my devices.
Yes
No
*84. I store my data backups in multiple locations.
Yes
No
*85. I sometimes test my VPN for privacy leaks.
Yes
No
*86. I don’t backup my data because it’s unlikely I’ll lose it.
Yes
No
*87. I am aware that biased search engine results can influence my beliefs and behavior without my knowledge.
Yes
No
*88. I encrypt my backups to protect myself from malware.
Yes
No
*89. I always reject nonessential cookies on the sites I visit.
Yes
No
*90. I avoid using jailbroken phones due to security concerns.
Yes
No
*91. When possible, I use two-factor authentication when I login to apps.
Yes
No
*92. I use a VPN when accessing work-related files.
Yes
No
*93. I regularly change my email password.
Yes
No
*94. I am aware that biased search suggestions can influence my beliefs and behavior without my knowledge.
Yes
No
*95. I avoid using smart devices (e.g., Fitbit, which is owned and monitored by Google) that are linked to the internet.
Yes
No
*96. I’m skeptical about answers I get from personal assistants and chatbots.
Yes
No
*97. The more frequently I change my data, the more frequently I back it up.
Yes
No
*98. I have installed trusted VPN software onto my mobile devices.
Yes
No
*99. I avoid installing illegally pirated software because it might install malware on my computer.
Yes
No
*100. When I’m surfing the internet, I avoid clicking on suspicious links and websites.
Yes
No
*101. I sometimes use browser add-ons that enhance my privacy by blocking trackers.
Yes
No
*102. I keep my device’s camera covered when not in use.
Yes
No
*103. To protect my privacy, I do most of my browsing on laptop or desktop computers rather than on mobile devices.
Yes
No
*104. I only update an app when I’m sure it’s safe to do so.
Yes
No
*105. The cost of securing my data is worth it.
Yes
No
*106. I avoid using home security systems that are linked to the internet.
Yes
No
*107. If I found a flash drive, I would not plug it into my computer because I know the flash drive could damage it.
Yes
No
*108. I limit my time spent on online social networks.
Yes
No
*109. I enable the setting on my VPN that will disconnect me from the internet in case the VPN fails.
Yes
No
*110. I have researched what my VPN protects me from, and what it does not protect me from.
Yes
No