Last updated: 20 March 2026
Complete Online Privacy Guide for Australians — 2026
TL;DR
Beyond VPNs — a complete guide to protecting your privacy online. Covers VPNs, password managers, encrypted email, browser settings, two-factor authentication, and phone privacy. Six practical steps that any Australian can follow today.
Why Privacy Matters More Than Ever
Australia has one of the most expansive digital surveillance frameworks in the Western world. That's not hyperbole. Let's look at the facts.
The Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015 requires every Australian ISP to store your metadata for two years. That includes which websites you visit, when you visit them, how long you spend, your IP address, your email metadata, and your phone call records. This data is accessible to over 20 government agencies — many without a warrant.
The Assistance and Access Act 2018 (the so-called “encryption bill”) gives Australian agencies the power to compel tech companies to build backdoors into encrypted communications. This law was rushed through Parliament in a single day and has been criticised by every major tech company, the Australian tech industry, and privacy advocates worldwide.
The Surveillance Legislation Amendment (Identify and Disrupt) Act 2021 gives the Australian Federal Police and ACIC the power to modify, add, copy, or delete data on your devices under certain warrants. It also allows them to take over online accounts.
And now, the age verification framework that took effect on 9 March 2026 requires adults to hand over identity documents or submit to facial recognition to access legal content. It's another step in a consistent direction: more identification, more data collection, less anonymity.
This guide is not about paranoia. It's about taking practical, legal steps to maintain your digital autonomy in a country that has been systematically eroding it. Every step below is something you can do today, most of them for free.
Get a VPN
A VPN (Virtual Private Network) encrypts all your internet traffic and routes it through a server in another country. Your ISP sees encrypted data going to the VPN server — not which websites you visit. This is the single most impactful thing you can do for your online privacy.
A VPN protects you from Australia's metadata retention scheme, prevents your ISP from seeing your browsing history, bypasses the age verification system, and secures your connection on public Wi-Fi. It's the foundation of online privacy.
What to look for in a VPN
- No-logs policy (independently audited) — the VPN provider should not keep records of your activity, and this should be verified by a reputable third-party auditor
- Jurisdiction outside Australia — choose a provider not subject to Australian data retention laws or the Assistance and Access Act
- Kill switch — automatically cuts your internet if the VPN connection drops, preventing accidental exposure of your real IP
- DNS leak protection — ensures your DNS queries go through the VPN tunnel, not your ISP's servers
Our top VPN picks for Australia
| Feature | NordVPNBest Pick | Proton VPN | Surfshark | ExpressVPN |
|---|---|---|---|---|
| Price | AUD $4.19/mo | AUD $4.99/mo | AUD $3.49/mo | AUD $3.74/mo |
| Servers | 6,800+ servers in 111 countries | 4,800+ servers in 110 countries | 3,200+ servers in 100 countries | 3,000+ servers in 105 countries |
| Devices | 10 | 10 | Unlimited | 10 |
| Speed | Fastest tested | Fast | Good | Very fast |
| Kill Switch | ✓ | ✗ | ✗ | ✗ |
| No-logs Audited | ✓ | ✓ | ✓ | ✓ |
| Split Tunnelling | ✗ | ✗ | ✗ | ✓ |
| Ad Blocker | ✓ | ✗ | ✓ | ✗ |
| Rating | 4.8/5 | 4.6/5 | 4.4/5 | 4.5/5 |
For detailed reviews and testing methodology, see our Best VPN Australia 2026 guide. On a tight budget? Read Free VPN Australia.
Use a Password Manager
If you're using the same password on multiple sites — and statistically, you probably are — you're one data breach away from having every account compromised. The Optus breach exposed 9.8 million records. The Medibank breach exposed 9.7 million. The Latitude Financial breach hit 14 million. If your email and password from any of these breaches matches your other accounts, attackers will find them.
A password manager generates unique, random passwords for every account and stores them in an encrypted vault. You remember one master password. The manager handles the rest.
Our recommendations
Bitwarden
Free and open source. Audited by third-party security firms. Works on every platform. The free tier covers everything most people need — unlimited passwords, unlimited devices, secure password generator, and autofill. The paid tier (USD $10/year) adds encrypted file storage and advanced 2FA options. This is what we use.
1Password
USD $2.99/month. The most polished user experience of any password manager. Excellent family and team sharing features. Watchtower feature alerts you to compromised passwords and weak credentials. Not open source, but has undergone multiple independent security audits. If you want the smoothest experience and don't mind paying, 1Password is excellent.
Whichever you choose, the important thing is to use one. Even Apple's built-in Keychain or Google's Password Manager are better than reusing passwords. But a dedicated manager like Bitwarden gives you more control, cross-platform access, and independence from any single tech company.
Switch to Encrypted Email
Gmail scans your emails for advertising purposes. Outlook does similar. Your email contains some of the most sensitive information in your digital life — bank statements, medical correspondence, personal conversations, password reset links, and identity documents you've sent to various services.
Encrypted email providers use end-to-end encryption, meaning even the email provider cannot read your messages. The encryption happens on your device before the email leaves it.
ProtonMail
Free tier: 1 GB storage, 150 messages/day. Based in Switzerland. End-to-end encrypted. Open source. Used by journalists, activists, and anyone who values email privacy. The paid plan (EUR 3.99/month) adds more storage, custom domains, and additional addresses.
You don't have to move everything at once. Start by creating a ProtonMail account and gradually migrating your important accounts to it. Use it for banking, healthcare, government correspondence, and anything you consider sensitive. Keep your Gmail for newsletters and low-importance stuff.
Other solid options include Tuta (formerly Tutanota, based in Germany, free tier available) and Skiff Mail (end-to-end encrypted, decent free tier). But ProtonMail has the strongest track record and the most mature platform.
Secure Your Browser
Your browser is the window through which nearly all your internet activity passes. Chrome, the world's most popular browser, is made by the world's largest advertising company. It tracks you extensively. Google uses your browsing data to build advertising profiles, and Chrome's “privacy sandbox” is still fundamentally an advertising technology.
Option A: Firefox + uBlock Origin
Firefox is open source, developed by the non-profit Mozilla Foundation, and has strong built-in tracking protection. Add the uBlock Origin extension (free, open source) and you've got a browser that blocks ads, trackers, and malware domains. Firefox also supports container tabs, which let you isolate different accounts so Facebook can't track you across the web.
Key Firefox privacy settings to enable:
- • Settings > Privacy & Security > Enhanced Tracking Protection > Strict
- • Enable “Delete cookies and site data when Firefox is closed”
- • Disable “Ask to save passwords” (use your password manager instead)
- • Set “Do Not Track” to Always
- • In the address bar, type
about:configand setprivacy.resistFingerprintingto true
Option B: Brave Browser
Brave is a Chromium-based browser with built-in ad blocking, tracker blocking, and fingerprint protection. It works with all Chrome extensions and feels familiar if you're switching from Chrome. Brave blocks ads and trackers by default — no extensions needed. It also includes built-in Tor support for private tabs.
Brave has its own cryptocurrency token (BAT) and an opt-in ad system, which some people find off-putting. You can ignore these features entirely and just use it as a privacy-focused Chrome alternative.
Enable 2FA Everywhere
Two-factor authentication (2FA) adds a second verification step when you log in. Even if someone steals your password, they can't access your account without the second factor. This is one of the most effective security measures you can take.
Important: do not use SMS for 2FA if you can avoid it. SIM-swapping attacks, where criminals convince your mobile provider to transfer your number to a new SIM, are common in Australia. If your 2FA relies on SMS, a SIM-swap gives attackers access to your codes.
Use an authenticator app instead
Aegis Authenticator
Android only. Free, open source, encrypted backups. Our top pick for Android users.
Raivo OTP / 2FAS
iOS options. Raivo is open source and stores data locally. 2FAS is cross-platform and syncs via iCloud.
Enable 2FA on these accounts first (in order of priority): email, banking, cloud storage, social media, and any service that holds your personal data. Your email account is the most critical — if someone accesses your email, they can reset passwords on everything else.
Review Your Phone Settings
Your phone is the most intimate surveillance device you own. It knows your location 24/7, who you talk to, what apps you use, and — through its sensors — even how you move. Both iOS and Android have privacy settings that most people never touch. Here's what to change.
iPhone (iOS)
- • Settings > Privacy & Security > Tracking > disable “Allow Apps to Request to Track”
- • Settings > Privacy & Security > Location Services > review each app. Set most to “While Using” or “Never”
- • Settings > Privacy & Security > Apple Advertising > disable Personalised Ads
- • Settings > Safari > enable “Prevent Cross-Site Tracking” and “Hide IP Address”
- • Settings > Privacy & Security > Analytics & Improvements > disable everything
- • Consider using Lockdown Mode if you're a high-risk target (journalist, activist)
Android
- • Settings > Privacy > Ads > delete advertising ID (Android 12+)
- • Settings > Location > review app permissions. Revoke from apps that don't need it
- • Settings > Privacy > Permission Manager > review Camera, Microphone, Contacts for each app
- • Settings > Google > Ads > opt out of ad personalisation
- • Settings > Google > disable Web & App Activity, Location History, YouTube History
- • Consider disabling Google Play Services on a secondary device, or using a privacy-focused Android ROM like GrapheneOS or CalyxOS
These changes take 10 minutes and dramatically reduce the amount of data your phone sends to Apple, Google, and the apps you've installed. Your phone will work exactly the same — you just won't be feeding the advertising machine quite as much.
More Resources
Best VPN Australia 2026
Full comparison of the top VPNs for Australia
Free VPN Australia
Why free VPNs are dangerous and which are safe
Is VPN Legal in Australia?
The full legal position explained clearly
Age Verification Australia
What the law means and how it works
Unblock Pornhub Australia
Step-by-step guide to bypassing age verification
Blog
Latest privacy news and VPN guides
Get weekly Australian privacy updates
No spam, unsubscribe anytime.
Frequently Asked Questions
NordVPN
Overall best for Australia
AUD $4.19/mo
2-year plan
4.8/5
Our rating
10
Devices
- No-logs policy (audited)
- Kill switch
- Double VPN
- Threat Protection
30-day money-back guarantee. No questions asked.