This site contains affiliate links. We may earn a commission at no cost to you.
Unblock Australia

Last updated: 20 March 2026

Complete Online Privacy Guide for Australians — 2026

TL;DR

Beyond VPNs — a complete guide to protecting your privacy online. Covers VPNs, password managers, encrypted email, browser settings, two-factor authentication, and phone privacy. Six practical steps that any Australian can follow today.

Why Privacy Matters More Than Ever

Australia has one of the most expansive digital surveillance frameworks in the Western world. That's not hyperbole. Let's look at the facts.

The Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015 requires every Australian ISP to store your metadata for two years. That includes which websites you visit, when you visit them, how long you spend, your IP address, your email metadata, and your phone call records. This data is accessible to over 20 government agencies — many without a warrant.

The Assistance and Access Act 2018 (the so-called “encryption bill”) gives Australian agencies the power to compel tech companies to build backdoors into encrypted communications. This law was rushed through Parliament in a single day and has been criticised by every major tech company, the Australian tech industry, and privacy advocates worldwide.

The Surveillance Legislation Amendment (Identify and Disrupt) Act 2021 gives the Australian Federal Police and ACIC the power to modify, add, copy, or delete data on your devices under certain warrants. It also allows them to take over online accounts.

And now, the age verification framework that took effect on 9 March 2026 requires adults to hand over identity documents or submit to facial recognition to access legal content. It's another step in a consistent direction: more identification, more data collection, less anonymity.

This guide is not about paranoia. It's about taking practical, legal steps to maintain your digital autonomy in a country that has been systematically eroding it. Every step below is something you can do today, most of them for free.

1

Get a VPN

A VPN (Virtual Private Network) encrypts all your internet traffic and routes it through a server in another country. Your ISP sees encrypted data going to the VPN server — not which websites you visit. This is the single most impactful thing you can do for your online privacy.

A VPN protects you from Australia's metadata retention scheme, prevents your ISP from seeing your browsing history, bypasses the age verification system, and secures your connection on public Wi-Fi. It's the foundation of online privacy.

What to look for in a VPN

  • No-logs policy (independently audited) — the VPN provider should not keep records of your activity, and this should be verified by a reputable third-party auditor
  • Jurisdiction outside Australia — choose a provider not subject to Australian data retention laws or the Assistance and Access Act
  • Kill switch — automatically cuts your internet if the VPN connection drops, preventing accidental exposure of your real IP
  • DNS leak protection — ensures your DNS queries go through the VPN tunnel, not your ISP's servers

Our top VPN picks for Australia

FeatureNordVPNBest PickProton VPNSurfsharkExpressVPN
PriceAUD $4.19/moAUD $4.99/moAUD $3.49/moAUD $3.74/mo
Servers6,800+ servers in 111 countries4,800+ servers in 110 countries3,200+ servers in 100 countries3,000+ servers in 105 countries
Devices1010Unlimited10
SpeedFastest testedFastGoodVery fast
Kill Switch✓✗✗✗
No-logs Audited✓✓✓✓
Split Tunnelling✗✗✗✓
Ad Blocker✓✗✓✗
Rating4.8/54.6/54.4/54.5/5

For detailed reviews and testing methodology, see our Best VPN Australia 2026 guide. On a tight budget? Read Free VPN Australia.

2

Use a Password Manager

If you're using the same password on multiple sites — and statistically, you probably are — you're one data breach away from having every account compromised. The Optus breach exposed 9.8 million records. The Medibank breach exposed 9.7 million. The Latitude Financial breach hit 14 million. If your email and password from any of these breaches matches your other accounts, attackers will find them.

A password manager generates unique, random passwords for every account and stores them in an encrypted vault. You remember one master password. The manager handles the rest.

Our recommendations

Best Free Option

Bitwarden

Free and open source. Audited by third-party security firms. Works on every platform. The free tier covers everything most people need — unlimited passwords, unlimited devices, secure password generator, and autofill. The paid tier (USD $10/year) adds encrypted file storage and advanced 2FA options. This is what we use.

Best Premium Option

1Password

USD $2.99/month. The most polished user experience of any password manager. Excellent family and team sharing features. Watchtower feature alerts you to compromised passwords and weak credentials. Not open source, but has undergone multiple independent security audits. If you want the smoothest experience and don't mind paying, 1Password is excellent.

Whichever you choose, the important thing is to use one. Even Apple's built-in Keychain or Google's Password Manager are better than reusing passwords. But a dedicated manager like Bitwarden gives you more control, cross-platform access, and independence from any single tech company.

3

Switch to Encrypted Email

Gmail scans your emails for advertising purposes. Outlook does similar. Your email contains some of the most sensitive information in your digital life — bank statements, medical correspondence, personal conversations, password reset links, and identity documents you've sent to various services.

Encrypted email providers use end-to-end encryption, meaning even the email provider cannot read your messages. The encryption happens on your device before the email leaves it.

Our Pick

ProtonMail

Free tier: 1 GB storage, 150 messages/day. Based in Switzerland. End-to-end encrypted. Open source. Used by journalists, activists, and anyone who values email privacy. The paid plan (EUR 3.99/month) adds more storage, custom domains, and additional addresses.

You don't have to move everything at once. Start by creating a ProtonMail account and gradually migrating your important accounts to it. Use it for banking, healthcare, government correspondence, and anything you consider sensitive. Keep your Gmail for newsletters and low-importance stuff.

Other solid options include Tuta (formerly Tutanota, based in Germany, free tier available) and Skiff Mail (end-to-end encrypted, decent free tier). But ProtonMail has the strongest track record and the most mature platform.

4

Secure Your Browser

Your browser is the window through which nearly all your internet activity passes. Chrome, the world's most popular browser, is made by the world's largest advertising company. It tracks you extensively. Google uses your browsing data to build advertising profiles, and Chrome's “privacy sandbox” is still fundamentally an advertising technology.

Option A: Firefox + uBlock Origin

Firefox is open source, developed by the non-profit Mozilla Foundation, and has strong built-in tracking protection. Add the uBlock Origin extension (free, open source) and you've got a browser that blocks ads, trackers, and malware domains. Firefox also supports container tabs, which let you isolate different accounts so Facebook can't track you across the web.

Key Firefox privacy settings to enable:

  • • Settings > Privacy & Security > Enhanced Tracking Protection > Strict
  • • Enable “Delete cookies and site data when Firefox is closed”
  • • Disable “Ask to save passwords” (use your password manager instead)
  • • Set “Do Not Track” to Always
  • • In the address bar, type about:config and set privacy.resistFingerprinting to true

Option B: Brave Browser

Brave is a Chromium-based browser with built-in ad blocking, tracker blocking, and fingerprint protection. It works with all Chrome extensions and feels familiar if you're switching from Chrome. Brave blocks ads and trackers by default — no extensions needed. It also includes built-in Tor support for private tabs.

Brave has its own cryptocurrency token (BAT) and an opt-in ad system, which some people find off-putting. You can ignore these features entirely and just use it as a privacy-focused Chrome alternative.

5

Enable 2FA Everywhere

Two-factor authentication (2FA) adds a second verification step when you log in. Even if someone steals your password, they can't access your account without the second factor. This is one of the most effective security measures you can take.

Important: do not use SMS for 2FA if you can avoid it. SIM-swapping attacks, where criminals convince your mobile provider to transfer your number to a new SIM, are common in Australia. If your 2FA relies on SMS, a SIM-swap gives attackers access to your codes.

Use an authenticator app instead

Aegis Authenticator

Android only. Free, open source, encrypted backups. Our top pick for Android users.

Raivo OTP / 2FAS

iOS options. Raivo is open source and stores data locally. 2FAS is cross-platform and syncs via iCloud.

Enable 2FA on these accounts first (in order of priority): email, banking, cloud storage, social media, and any service that holds your personal data. Your email account is the most critical — if someone accesses your email, they can reset passwords on everything else.

6

Review Your Phone Settings

Your phone is the most intimate surveillance device you own. It knows your location 24/7, who you talk to, what apps you use, and — through its sensors — even how you move. Both iOS and Android have privacy settings that most people never touch. Here's what to change.

iPhone (iOS)

  • • Settings > Privacy & Security > Tracking > disable “Allow Apps to Request to Track”
  • • Settings > Privacy & Security > Location Services > review each app. Set most to “While Using” or “Never”
  • • Settings > Privacy & Security > Apple Advertising > disable Personalised Ads
  • • Settings > Safari > enable “Prevent Cross-Site Tracking” and “Hide IP Address”
  • • Settings > Privacy & Security > Analytics & Improvements > disable everything
  • • Consider using Lockdown Mode if you're a high-risk target (journalist, activist)

Android

  • • Settings > Privacy > Ads > delete advertising ID (Android 12+)
  • • Settings > Location > review app permissions. Revoke from apps that don't need it
  • • Settings > Privacy > Permission Manager > review Camera, Microphone, Contacts for each app
  • • Settings > Google > Ads > opt out of ad personalisation
  • • Settings > Google > disable Web & App Activity, Location History, YouTube History
  • • Consider disabling Google Play Services on a secondary device, or using a privacy-focused Android ROM like GrapheneOS or CalyxOS

These changes take 10 minutes and dramatically reduce the amount of data your phone sends to Apple, Google, and the apps you've installed. Your phone will work exactly the same — you just won't be feeding the advertising machine quite as much.

More Resources

Get weekly Australian privacy updates

No spam, unsubscribe anytime.

Frequently Asked Questions

Not necessarily all at once. If you do nothing else, get a VPN and a password manager — those two steps alone will dramatically improve your privacy and security. Then layer on the other recommendations as you have time. Each step makes you harder to track and less vulnerable to breaches.
They're related but different. Security protects you from hackers, malware, and unauthorised access. Privacy protects you from legitimate companies, governments, and services that collect your data legally. A strong password protects your security. A VPN protects your privacy. Ideally, you want both.
A VPN prevents your ISP from seeing which websites you visit, which means the metadata retention scheme captures encrypted VPN traffic rather than your actual browsing history. However, no tool provides absolute anonymity. If a government agency with significant resources specifically targets you, a VPN alone may not be sufficient. For the vast majority of Australians, a VPN provides more than adequate privacy from routine surveillance and data collection.
Yes. Every tool recommended in this guide — VPNs, password managers, encrypted email, privacy-focused browsers, and two-factor authentication apps — is completely legal in Australia. Using privacy tools is a sensible precaution, not a suspicious activity.
Tor provides stronger anonymity than a VPN but is significantly slower, making it impractical for streaming or daily browsing. Tor routes your traffic through three random volunteer nodes, which provides excellent anonymity but typically results in speeds of 2-5 Mbps. For most Australians, a VPN offers the right balance of privacy and usability. If you need maximum anonymity for specific activities, consider using Tor Browser for those tasks and a VPN for everything else.
Start With Step 1 — Get a VPN

NordVPN

Overall best for Australia

AUD $4.19/mo

2-year plan

4.8/5

Our rating

10

Devices

  • No-logs policy (audited)
  • Kill switch
  • Double VPN
  • Threat Protection
Get NordVPN75% off

30-day money-back guarantee. No questions asked.