One of the first pictures my son drew in school was of himself peeking out from behind a tree. He called it “I Hide,” and I saved it for years, stuck to our refrigerator, because I found a lot of humor and truth in it. When you’re small, hiding things is a daring game. With age, not only do we lose our secret hiding places, but it becomes tougher to conceal our flaws, our opinions, our past, our emotions, our mistakes, and, of course, our treasures.
What follows isn’t designed to help you hide from the law or pull off anything illegal. Rather, its purpose is to help you preserve some measure of dignity in a world that wants to know and expose all. Here are 19 little trees, so to speak, that you can squirrel things away in or crouch behind.
You can hide everything from overcooked vegetables to stale rolls. View the 10 Ways to Hide Cooking Goofs slideshow for details.
A Few Extra Pounds
According to Stacy London, cohost of TLC’s What Not to Wear, it’s easy to look 10 or 15 pounds lighter by following this “clothes diet.”
View the 5 Ways to Hide a Few Extra Pounds slideshow for details.
A Few Extra Years
Women don’t have to resort to Botox injections or plastic surgery to look a little younger. According to Bobbi Brown, author of Bobbi Brown Makeup Manual, you can give yourself a “makeup face-lift.” Although moisturizer, foundation, blush, and eye shadows and liners all play important roles, Brown says, under-eye concealer is key. Pick a yellow tone that’s one or two shades lighter than your foundation. (If you’re unsure, stripe several shades on your cheek and check the mirror in natural light; the one that disappears is ideal for you.) Apply the concealer along your lower lash lines and into the inner corner of each eye using a small-headed brush with firm bristles.
Personal Info on Your Laptop
An estimated two million laptop computers are stolen, lost, or misplaced in the United States annually, and some 600,000 are lost every year in airports. To protect sensitive information stored on yours, there are two options. For $59.99 per year (or $109.99 for three years), Computrace LoJack for Laptops Premium software provides the backing of a “theft recovery team” that will track your stolen computer, report its location to police, and remotely delete personal data. Computrace LoJack has been a top seller for years. But a new, free program, from researchers at the University of Washington and the University of California, San Diego, allows you to track your laptop’s whereabouts and even takes a photo of the thief (if the computer is a Mac with a built-in camera). The program, called Adeona, can be downloaded at adeona.cs.washington.edu.
Your Anxiety When Speaking in Public
Schedule a massage a few hours before your big presentation, says Susan Mackewich, an executive producer at Gizmo Enterprises, a media production company in New York City, who’s seen her share of nervous performers. “Tell the massage therapist to focus on where you carry the most tension, like your shoulders, back, or neck,” she says. Then, when you’re at the podium, sip room-temperature (not cold) water to soothe your vocal cords, and, if you feel anxiety building, massage the pad of muscle between your thumb and index finger. It’s an acupressure point, and it’s something your audience won’t notice.
Your Medical Identity
The soaring cost of health care is spawning a new crime: medical identity theft, in which someone uses your insurance information and health records to obtain medication or even surgery. It happens to 250,000 people each year, says the World Privacy Forum. To protect yourself, the WPF recommends that you: 1) closely review all “explanation of benefits” letters from your health insurer, 2) annually request a list of benefits paid by your insurer in your name (sometimes thieves alter billing info), and 3) check your medical file every time you visit the doctor.
Google, Microsoft, and dozens of other companies will also store your personal health records (PHRs) online. While there are advantages to having a complete medical history in one convenient location, some companies have “de-identified” these records and sold them to marketers. Pam Dixon, executive director of the WPF, does not generally recommend PHRs that are not maintained by health care providers. She stresses looking for a service that is “HIPAA covered” rather than “HIPAA compliant” in order to retain confidentiality. Look for that exact wording in the privacy statement. (Electronic health records, or EHRs, are maintained exclusively by health care providers.) For more information, visit worldprivacyforum.org and click on PHR Page.
Your Tracks Online
Just as your computer’s browser maintains a history of the websites you visit, your Internet service provider (ISP) may keep an electronic log of the ones you peruse. Until recently, this was all just worthless data. But now some ISPs are considering selling these lists to companies that analyze them and then send targeted ads back to you. If you’re bothered by this, there are three things you can do:
- Go to vancouver.cs.washington.edu and let the site automatically check whether your ISP is using monitoring devices.
- Since this check is not comprehensive, call your ISP and ask if it’s contemplating selling browsing data; if so, object.
- Download a free software program called Tor from torproject.org, which will help block those prying ISP eyes.
Similarly, when you type a phrase into a search engine, you’re broadcasting your interests and personal information. Like ISPs, some search companies routinely gather, store, and sell analyses of such data strings. That’s why you should never search your full name and Social Security number or your name and password. Some other tips from the WPF:
- Don’t sign up for e-mail with your favorite search engine. This makes it easier to link you and your interests.
- Use a variety of engines and computers for searching. This makes it more difficult to profile you.
- Find out if your ISP uses a static IP address system, and if it does, periodically request a new IP address (essentially your computer’s address).
- Use software that masks your computer’s address, like anonymizer.com and anonymouse.org.