drawn outline of a person with a shadow of creature
Access to information Safety

Me & My Shadow

A Tactical Tech website that allows you to trace your “digital shadow” - all the data you disseminate when you are online – and then shows you how to reduce it while enhancing your online privacy.

Me & My Shadow is a website that allows you to trace your “digital shadow” - all the data you disseminate without knowing it when you are online – and then shows you how to reduce it.

Every time you go online, information is collected about you. This creates a profile of who you are, what you do, where you go and what your habits are -- information which can be accessed by governments and private companies.

As an investigator, this profile could put you and your sources at risk. It is therefore important to understand how your personal data is obtained, and how you can better control your online presence. Me & My Shadow features a number of tools that can help.

The website is updated frequently to keep you up to date on the newest digital privacy tools. It also features a section called "Lost in Small Print" that tells you everything you should have read before clicking on the “I agree” button when you signed up to a social network.

Me & My Shadow is produced by Tactical Tech.

More about this topic

photo of the Exposing the Invisible - The Kit's cover
Access to information Safety
Verification Data Mapping Metadata Research

Exposing the Invisible - The Kit

The Kit is a collaborative, self-learning resource that makes investigative techniques and tools use...
black and white abstract painting
Access to information
Metadata Research Data

Digital Resources for Citizen Investigators: Our recommendations

Many of us currently live and work in a challenging physical isolation imposed on us by the COVID-19...
Money and Politics

Our Currency is Information

Our currency is Information is the first episode of the documentary film series Exposing the Invisib...
illustration of a computer and USB flash drive on a gray background

From Tails to Whiskers: How We Created a Secure Investigation Framework

At Tactical Tech we sometimes experiment with creating tools and software that we think are needed b...
Safety Conflict and Power

Risk Assessment Is a Mindset, Not a Checklist

Conducting investigations is risky. Unfortunately, individual investigators rarely have the resource...


The operating system designed to preserve your privacy and anonymity.

GPG Encryption for Your Emails

A tool allowing you to encrypt the content of your emails if the person you write to also uses it.

Tor Browser

A tool to browse the web securely.