Personal Security After Data Breaches

I tend to do both. Randomise first then request deletion.

If the service actually deletes then props to them but it was a small amount of my time wasted. If the service hides so that login no longer works but the data is retained “forever” by them then it’s a win for me. If the service ignores so that login continues to work “forever” then it’s a win for me.

There are gaps in my strategy.

1 Like