Free with Kindle Unlimited — Already a subscriber? Read the entire book right now at no extra cost.
Digitally Undressed — Vol. I ★★★★★ Read Free (KU) $19.99 Paperback
Volume I - Available Now

Your Phone Knows You Better Than You Think.

Discover what 50 major apps actually collect, where your data goes once it leaves your device, and the exact settings to change - in plain English.

by Avery Quinn - Security Engineer · 348 pages

★★★★★
"This book should come pre-installed on every phone."
Digitally Undressed Vol. I book cover - digital human figure composed of data streams
50
Platforms Exposed
A-F
Threat Graded
348
Pages
3
Action Toolkits
+6
Vol. II Preview Chapters

What most people don't realize
📷

TikTok predicts your personality in about 40 minutes of scrolling.

It doesn't need your posts. Your thumb movements, pause duration, and replay behavior are enough to map your political leanings, insecurities, and emotional state.

Chapter 2 - Threat Grade: F
🌦️

Your weather app sells your location hundreds of times per day.

Every time you check the forecast, your precise GPS coordinates are packaged and sold to data brokers before the temperature even loads.

Chapter 34 - Threat Grade: D
🎵

Spotify builds an emotional diary from your listening habits.

It can detect breakups, job loss, and anxiety from sudden playlist shifts - before you tell anyone.

Chapter 13 - Threat Grade: D

Is This Book for You?

If any of these sound familiar, yes.

  • You feel like apps know you a little too well - and you're not sure why
  • You want to protect your kids without becoming a surveillance parent
  • You've clicked "I Agree" hundreds of times without reading a single word
  • You want clear, practical steps - not fear tactics or jargon
  • You want to understand how systems actually behave, not how they claim to

After This Book, You See Differently.

Before

  • You assume apps are harmless background tools
  • You click "Allow" without thinking twice
  • You have no idea what "metadata" means for your family
  • Privacy feels abstract and overwhelming
  • You don't know where to start protecting yourself

After

  • You recognize behavioral architecture instantly
  • You choose settings deliberately, not by default
  • You explain digital risks to your kids clearly
  • You reduce your exposure in 10 minutes
  • You stop being the product and start being the user

This isn't about deleting technology. It's about using it without being used by it.

"Snapchat didn't invent disappearing messages. It invented the feeling of privacy that comes with them."
Chapter 1: Snapchat

Built for Action, Not Anxiety

This is a book you read and then fix things.

Platform-by-Platform Breakdown

50 chapters. What each collects, where data goes, and the exact navigation paths to reduce exposure.

A-F Threat Scoring

Every platform graded so you know where the real risks are and what to prioritize first.

Step-by-Step Settings

Actual navigation paths. Settings > Privacy > toggle this off. Written so anyone can follow.

Breach History

Documented security incidents per platform and what the headlines got wrong.

Parent Survival Toolkit

Keep kids safe without losing your mind. Age-appropriate controls and conversation starters.

Ten-Minute Privacy Cleanse

A right-now reset. More protected than 95% of people in ten minutes.


50 Platforms Exposed

Every app graded, explained, and fixed. Hover to see top dangers.

F

TikTok

Learns you faster than you learn yourself

Predicts personality, politics, and emotions in ~40 min of scrolling

In-app browser injects JavaScript monitoring keystrokes on external sites

Thumb movements alone build your behavioral profile

Read the full chapter →
F

Facebook

The original data farm

Shadow profiles built on non-users via contact uploads and Meta Pixel

Cross-platform tracking across Instagram, WhatsApp, and millions of sites

Ad targeting identifies you by behavior even without your real name

Read the full chapter →
F

Amazon

The store that maps your entire life

Purchase history maps health, relationships, income, and life transitions

Alexa, Ring, and Kindle combine into home-life surveillance

What you browsed but didn't buy is just as valuable as purchases

Read the full chapter →
F

Chrome

The browser that watches back

Most complete record of your online behavior on any platform

Incognito only hides locally - ISP, sites, and Google still see everything

Browsing history reveals interests more honestly than you'd tell anyone

Read the full chapter →
F

Google Maps

Knows where you live, work, and think

Timeline creates a permanent record of everywhere you've been

Infers home, workplace, gym, doctor from location patterns alone

Search queries reveal intent before you act on it

Read the full chapter →
F

SHEIN

Fast fashion, faster data extraction

Tracks zoom on product images and size searches revealing body data

Requests clipboard, photo library, device access beyond shopping

Hundreds of micro-preferences extracted from a single session

Read the full chapter →
F

Temu

The marketplace that knows too much

Requests camera, microphone, call logs, and storage access

Gamification measures your susceptibility to manipulation

Parent company flagged by Google for malware

Read the full chapter →
D

Snapchat

The disappearing message that doesn't

Messages vanish from UI but metadata is permanently retained

Streak patterns reveal relationship dynamics and breakups

Snap Map broadcasts precise location in real time by default

Read the full chapter →
D

Instagram

The pretty feed with a perfect memory

Computer vision analyzes every photo: faces, body types, brand logos

Tracks which body types you linger on - sells your insecurities

Comparison engine maximizes engagement through social comparison

Read the full chapter →
D

Spotify

The soundtrack that reads your mind

Builds emotional diary from song mood data and energy cycles

Detects breakups and job loss from sudden playlist shifts

Tracks skip timing to the second

Read the full chapter →
D

YouTube

The attention laboratory

Models your attention span and psychological vulnerabilities

Watch history more honest than what you'd tell a friend

Read chapter →
D

YouTube Kids

Safe... until it isn't

Behavioral profiling begins from first session

Autoplay keeps kids watching, not serving their interests

Read chapter →
C

WhatsApp

Encrypted chats, metadata shadow

Messages encrypted but metadata shared with Meta for targeting

Contact list maps your entire social network

Read chapter →
D

Discord

The group chat that remembers everything

Messages never auto-deleted, bots log in real time

Voice channels and activity status generate behavioral data

Read chapter →
D

Netflix

Entertainment with a memory

Tracks pause length and rewinds to map emotional patterns

Different thumbnails served and measured per user

Read chapter →
D

Disney+

Family platform, corporate memory

Children's viewing data builds profiles from first show

Family patterns reveal household dynamics and schedules

Read chapter →
D

Hulu

The ad-tuned storyteller

Ad tier tracks which ads you watch, skip, or make you grab your phone

Read chapter →
D

Twitch

The live stream that never sleeps

Payment data reveals spending impulsivity tied to emotions

Read chapter →
D

Cash App

The fintech funnel

Transaction notes reveal context you'd never share with a bank

Read chapter →
D

Venmo

The social payment feed

Public-by-default feed exposes financial relationships to anyone

Read chapter →
D

PayPal

Digital wallet with a long memory

Transaction history going back decades - longest financial memory

Read chapter →
D

Coinbase

Crypto's central observer

Full gov ID and biometric selfie before your first "anonymous" trade

Read chapter →
D

Chime

Friendly bank, full ledger

Spending categorization more detailed than any credit bureau

Read chapter →
D

Zelle

Instant payment, exposed network

Maps your financial network with real names tied to bank accounts

Read chapter →
D

Mint

Your finances, categorized

Aggregates ALL accounts into one profile - complete financial X-ray

Read chapter →
D

Etsy

Your taste, sold back to you

Handmade searches reveal milestones before you announce them

Read chapter →
D

Gmail

Your inbox is a data goldmine

Metadata reveals relationship dynamics measured by response time

Read chapter →
D

Outlook

Corporate email, consumer tracking

Microsoft Graph API connects email to Teams, Calendar, and Office

Read chapter →
D

Google Drive

Filing cabinet with a duplicate key

Google can scan document contents for ad targeting signals

Read chapter →
C

iCloud

The vault that still sees patterns

Apple holds the encryption keys - accessible to law enforcement

Read chapter →
B

Firefox

Tries to protect you

Better defaults than Chrome but extensions can add tracking vectors

Read chapter →
B

Safari

Quiet one that still knows enough

Default search engine is Google - $20B/year deal feeds their profile

Read chapter →
C

Apple Maps

Quiet tracker, gentle touch

Significant Locations logs places you visit frequently

Read chapter →
D

Weather Apps

Forecasting more than rain

#1 location-tracking trojan horse - "Always On" access

Read chapter →
D

Zoom

The meeting room that logs

Attention tracking shows who's engaged - visible to hosts

Read chapter →
D

Microsoft Teams

Work life under a microscope

Productivity Score tracks all M365 activity - visible to IT admins

Read chapter →
D

Reddit

Anonymous isn't anonymous

Post history is a diary - subreddit memberships are a fingerprint

Read chapter →
D

Pinterest

Your aesthetic blueprint

Pins reveal pregnancies, engagements, and aspirations before you act

Read chapter →
D

LinkedIn

Your career, quantified

Profile updates sold as "career transition signals" to recruiters

Read chapter →
D

Snapchat Spotlight

Infinite scroll inside a disappearing app

TikTok-style tracking layered on Snapchat's existing collection

Read chapter →

50 platforms graded A through F. Every chapter tells you exactly what to change and where to find it.


3 Action Toolkits Built In

Not theory. Not checklists you'll forget. These are structured, step-by-step systems designed to create real change in real time.

Ten-Minute Privacy Cleanse

A right-now reset. Follow it once and you're more protected than 95% of people on the internet. No technical knowledge required. Ten minutes. Done.

  • Device-by-device walkthrough
  • Settings paths written out step by step
  • Works on iOS and Android
👁

Advanced Overwatch

For the person who wants to go deeper. Browser hardening, network-level protections, permission auditing, and the settings most "privacy guides" never mention.

  • Browser and extension hardening
  • Network and DNS-level protections
  • Advanced permission auditing

6 Volume II Preview Chapters Included

Volume I covers your apps. Volume II goes deeper - into the infrastructure you can't see. Six preview chapters are included free with this book.

Preview

Data Brokers

The companies buying and selling your profile without ever installing anything on your phone.

Preview

Facial Recognition

How your face became a searchable database - and what that means in public spaces.

Preview

AI Prediction Engines

The systems that predict your behavior before you've made a decision.

Preview

Location Intelligence

How cell towers, Wi-Fi probes, and Bluetooth beacons track you without GPS.

Preview

Shadow Profiles

The profiles platforms build on people who never signed up.

Preview

Cross-Device Fingerprinting

How your laptop, phone, and smart TV are linked into a single identity - even across accounts.

Volume II: The Invisible Architecture - Coming 2026

Read Before You Buy

No filler. No academic jargon. See how it reads.

Chapter 1
The Disappearing Message That Doesn't Really Disappear
Privacy Threat Score: D

You're lying in bed at midnight, half asleep, flipping through Snapchat stories. You screenshot one, think about it, then delete it. You close the app and forget about it. Snapchat doesn't forget.

Snapchat built its empire on a single, brilliant, deeply misleading premise: your messages disappear. That premise changed how an entire generation communicates. It gave people permission to be impulsive, flirtatious, silly, vulnerable. "Send it on Snap, it disappears." Hundreds of millions of people believe this to be true.

It isn't. The content does vanish from the visible interface. Your Snap to your friend? Gone after they view it. Your Story? Evaporates in 24 hours. But here's what a security engineer sees: a platform that deletes the message but keeps everything around the message. Who you sent it to. When. How quickly they opened it. Whether they screenshotted it. How long they looked at it. What time zone you were in. Where you were standing when you hit send.

Chapter 2
The Infinite Scroll That Learns You Faster Than You Learn Yourself
Privacy Threat Score: F

You open TikTok to kill five minutes while waiting for your coffee. Forty minutes later, you haven't moved. You've watched a dog rescue, three cooking videos, a breakup rant, and a conspiracy theory you'd never admit interested you. You didn't search for any of it. TikTok just knew.

TikTok doesn't care what you say. It doesn't care what you post. It doesn't care about your profile, your bio, your follower count, or your comment history. TikTok cares about one thing: what you do with your thumb.

Every other social platform learns about you from the content you create. Facebook reads your posts. Instagram studies your photos. LinkedIn analyzes your resume. TikTok needs you to do literally nothing except stare at your phone. The algorithm watches what you watch. It measures how long you watch it. It notes the exact millisecond you lose interest and swipe.

Chapter 41
The Ten-Minute Privacy Cleanse
A Reset Anyone Can Do Right Now

You just read forty chapters about how apps collect your data. You might be feeling overwhelmed. Maybe a little paranoid. Possibly wondering if you should throw your phone in a lake. Don't do that. Instead, spend ten minutes doing the things in this chapter.

Knowledge without action is just anxiety. And I don't want this book to leave you anxious. I want it to leave you protected. So here's the deal: I'm going to give you a ten-minute checklist. Not a theoretical framework. Not a philosophical discussion about privacy rights. A literal, step-by-step list of things you can do right now, on the device you're holding, that will meaningfully reduce your exposure.

Chapter 50
When the Machine Knows You Better Than You Do
Privacy Threat Score: D

You asked a chatbot for medical advice, let an AI write your resume, and used a recommendation engine to pick tonight's movie. Each interaction fed data into a system that's learning your preferences, your vulnerabilities, and your decision-making patterns.

I saved this chapter for last on purpose. Not because AI is the newest threat. It's been operating in the background of nearly every platform we've covered. The TikTok algorithm that learns your insecurities in thirty minutes? AI. The Netflix recommendation engine that knows your mood from your viewing pattern? AI. The Google Maps prediction that suggests your next destination before you've decided where you're going? AI.

Every single chapter in this book has been, at some level, about artificial intelligence. We just didn't always call it that.

What Readers Are Saying

★★★★★
"I thought I was pretty tech-savvy. Then I read the Snapchat chapter and realized I had no idea what 'disappearing' actually meant. This book should come pre-installed on every phone."
Amazon Verified Purchase
★★★★★
"Finally - a privacy book that doesn't make me feel like I need a computer science degree. I did the Ten-Minute Cleanse on my lunch break. My husband did it that night. Now we're making our kids do it."
Amazon Verified Purchase
★★★★★
"The threat scoring system is genius. I went straight to the apps I use most and started with the F-rated ones. Changed my Venmo to private in under a minute. Why was it ever public?"
Amazon Verified Purchase

Get 5 Critical Privacy Settings Free

The five changes that make the biggest difference - pulled straight from the book. Delivered instantly. No spam.

Your email stays private. Obviously.

"Pinterest doesn't know who you are. It knows who you want to be. And that might be the most psychologically intimate data any platform collects."
Chapter 38: Pinterest

Three Volumes. One Mission.

Volume I covers the apps on your phone. The story gets bigger from there.

Available Now

Volume I: Why Am I the Only One Naked?

The Apps on Your Phone

50 platforms exposed. Social media, messaging, streaming, shopping, finance, browsers, maps, productivity, and smart home. Every one graded, explained, and fixed.

Coming Soon

Volume II: The Infrastructure Behind the Curtain

The Systems That Track You Without Apps

Data brokers. Facial recognition. Smart cities. Connected cars. AI prediction engines. The invisible infrastructure beneath the apps.

Coming Soon

Volume III: Taking Back Control

The Playbook for Fighting Back

Regulation. Advocacy. Technical countermeasures. From protecting yourself to changing the system.

Get the Book

348 pages. 50 platforms. Same security engineer telling you what your apps won't.

Limited Time
Free with Kindle Unlimited
Already a KU subscriber? Read the entire book right now at no extra cost.
Read Free with Kindle Unlimited
Kindle
$7.99
Instant download · Own it forever
Buy on Kindle
Hardcover
$29.99
Case laminate
Order Hardcover

Audible edition coming soon.

About the Author

AQ

Avery Quinn

Security Engineer · Digital Privacy Researcher · The Person at the Cookout Who Makes Everyone Put Their Phone Face-Down

With a background in cybersecurity, behavioral systems analysis, and professionally overthinking how technology behaves when nobody's watching, Avery has spent years translating the fine print that billion-dollar companies hope you never read into something a normal human being can actually understand - and act on.

This book wasn't written in a lab. It wasn't written by a committee. It was written by someone who opened one too many privacy policies at 2 AM, said "people need to see this," and then spent a year proving it across 50 platforms. The goal was simple: make it clear without making it scary. Make it useful without making it boring. And make it honest without making you want to throw your phone into a river.

(Though if you do throw your phone into a river after Chapter 2, that's between you and the river.)

Avery believes privacy isn't about hiding. It's about choosing. Choosing what you share, who sees it, and whether you made that decision - or whether an algorithm made it for you while you were checking the weather.

Digitally Undressed is the first book in a three-volume series. Volume II expands beyond apps into the invisible infrastructure - data brokers, facial recognition, AI prediction engines, and the systems that track you without ever installing anything on your phone. Volume III shifts from awareness to action at scale.

For a limited time, Volume I is free to read with Kindle Unlimited. No excuses left. Your privacy isn't going to protect itself - but ten minutes and this book gets you closer than most people will ever bother to get.

"I wrote this book because I got tired of watching smart, capable people get blindsided by systems they never agreed to understand. You shouldn't need a cybersecurity degree to know what your phone is doing with your life. I tried to write the book I wish someone had handed me ten years ago - clear, honest, useful, and occasionally funny enough that you don't feel like you're reading a threat briefing. Because the truth is, your data situation isn't hopeless. It's just unexamined. And that's fixable."

Frequently Asked Questions

The platform behaviors described — what apps collect, how they build profiles, what your data funds — apply globally. The legal framework references (GDPR, CCPA) are called out by jurisdiction. If your phone runs TikTok or Facebook, the surveillance architecture is the same regardless of where you live. The settings instructions work on every device in every country.
Yes, Avery Quinn is a pen name. The author has a background in cybersecurity and behavioral systems analysis. The pen name exists because writing candidly about what major platforms do when nobody's watching — by name, with citations — is the kind of thing that generates attention from lawyers and PR teams. The research is real. The identity protection is deliberate and, frankly, on-brand for a privacy book.
No. The book was written specifically for people who don't have one. Every technical concept is explained in plain English before it's used. The settings instructions are written as step-by-step navigation paths — "Settings > Privacy > toggle this off" — not abstract advice. If you can read a recipe, you can follow the toolkits.
Same content across all three formats. The Kindle edition is the fastest way in — instant download, searchable, and free for Kindle Unlimited subscribers. The paperback is 348 pages and Prime-eligible for next-day delivery. The hardcover has case laminate binding. If you want to highlight and dog-ear pages, get the paperback. If you want it now, get the Kindle. If you want it on a shelf where people will ask about it, get the hardcover.
Volume II is scheduled for 2026. It goes deeper than the apps on your phone — into the infrastructure you can't see or delete: data brokers, facial recognition networks, AI prediction engines, location intelligence from cell towers and Bluetooth, and the shadow profiles platforms build on people who never signed up. Six preview chapters are included free in Volume I.
One email when Volume II launches. Possibly one or two updates if a major new toolkit drops. That's it. No weekly newsletter. No affiliate offers. No "productivity hacks." The irony of a privacy book harvesting your inbox is not lost on anyone here.

Stop Being Exposed by Default.

You can't delete the digital world. But you can stop being naked in it. Written to inform, not alarm. To clarify, not overwhelm.

Digitally Undressed Vol. I - Available Now
Read Free (KU)