Privacy Tips

Last Updated: March 7, 2026

Our Stance on Privacy

Game Foundry does not use any analytics, tracking cookies, or third-party trackers on this website. We believe your visit should be private by default, no exceptions. The only data we store is information you voluntarily give us (like your email address when subscribing to our newsletter).

Below are some general tips to help you stay private and safe across the wider internet.

1. Use a Privacy-Focused Browser

Your browser is the front door to everything you do online. Consider switching to a browser that prioritises privacy out of the box:

  • Brave: blocks ads and trackers by default, built on Chromium, and requires no configuration to be private out of the box.
  • Tor Browser: routes your traffic through multiple relays for maximum anonymity; slower, but very private (recommended for advanced users).

2. Install a Content Blocker

Even on a good browser, a dedicated content blocker adds another layer of protection. If you're using Brave (which we use ourselves), this is largely unnecessary, as it already blocks ads and trackers at the browser level. For other browsers:

  • uBlock Origin: lightweight, open-source, and blocks ads, trackers, and malicious domains.
  • Privacy Badger: made by the Electronic Frontier Foundation, automatically learns to block invisible trackers.

3. Use Strong, Unique Passwords

Reusing passwords is one of the most common ways accounts get compromised. A password manager makes it effortless to use a different, strong password for every site:

  • Bitwarden: free, open-source, and works across all platforms.
  • Proton Pass: from the makers of ProtonMail, with end-to-end encryption and built-in email alias support.
  • KeePassXC: offline password manager, great if you prefer to keep everything local.

Use passwords that are long (16+ characters) and random. Let the password manager do the remembering.

4. Enable Two-Factor Authentication (2FA)

Even the strongest password can be stolen. Two-factor authentication adds a second step (usually a code from your phone) that makes it vastly harder for someone to break in. Enable 2FA on every account that supports it, especially email, banking, and social media. For the authenticator app itself, we use and recommend:

  • Proton Authenticator: free, open-source, and integrates seamlessly with the broader Proton ecosystem; your 2FA codes are end-to-end encrypted and backed up to your Proton account.
  • Aegis Authenticator (Android): open-source, offline-first, and supports encrypted local backups; a great choice if you prefer not to sync to any cloud.
  • 2FAS: available on both iOS and Android, open-source, with optional encrypted cloud sync; clean and beginner-friendly.

5. Be Careful with Email

Email is one of the most common attack vectors. Keep these habits:

  • Don't click links in unexpected emails. Go directly to the website instead.
  • Check the sender address carefully; phishing emails often use lookalike domains.
  • Consider using email aliases or a service like SimpleLogin to keep your real address private.

For your primary email provider, we use and recommend Proton Mail. It's end-to-end encrypted by default, meaning even Proton cannot read your messages. It's based in Switzerland and subject to some of the world's strongest privacy laws.

6. Use a VPN on Public Wi-Fi

Public Wi-Fi networks (cafes, airports, hotels) are easy to intercept. A VPN encrypts your connection so that even on an untrusted network, your traffic stays private. Our top recommendations:

  • Proton VPN: open-source, independently audited, with a strict no-logs policy; based in Switzerland, and the only premium VPN with a fully free tier that doesn't throttle speeds or sell your data.
  • NordVPN: consistently audited no-logs policy, fast servers worldwide, and strong cross-platform support; a solid choice if you want a polished experience with a large server network.

7. Review App Permissions

Mobile apps frequently request access to your camera, microphone, contacts, and location, often without a good reason. Regularly review and revoke permissions you don't actively need. Both iOS and Android have built-in privacy dashboards that make this straightforward.

8. Keep Your Software Updated

Security patches fix vulnerabilities that attackers actively exploit. Keep your operating system, browser, and apps up to date. Enable automatic updates wherever possible; it's the single easiest thing you can do to stay secure.

9. Think Before You Share

Every piece of information you share online (your location, birthday, workplace, daily routine) can be combined into a detailed profile. Before posting, ask yourself: does this need to be public? Many social platforms let you restrict who can see your posts and personal details.

10. Obscure Your Identity

For services that don't legally require your real details (forums, newsletters, free trials, loyalty cards, app sign-ups), consider using a pseudonym, a disposable email address, and a fake date of birth. There is no ethical or legal issue with doing this when a site has no legitimate need for your real identity; you are simply protecting yourself from data brokers, breaches, and targeted profiling. Reserve your genuine personal information for situations where it is actually required, such as banking, government services, or purchases that require physical delivery.

11. Learn More

Privacy is a journey, not a destination. Here are some excellent resources to keep learning: