How To Hide Anything

One of the first pictures my son drew in school was of himself peeking out from behind a tree. He called it “I Hide,” and I saved it for years, stuck to our refrigerator, because I found a lot of humor and truth in it. When you’re small, hiding things is a daring game. With age, not only do we lose our secret hiding places, but it becomes tougher to conceal our flaws, our opinions, our past, our emotions, our mistakes, and, of course, our treasures.

What follows isn’t designed to help you hide from the law or pull off anything illegal. Rather, its purpose is to help you preserve some measure of dignity in a world that wants to know and expose all. Here are 19 little trees, so to speak, that you can squirrel things away in or crouch behind.

How to Hide AnythingPhotographed By Dan WintersHere are 19 little trees, so to speak, that you can squirrel things away in or crouch behind.

Kitchen Problems
You can hide everything from overcooked vegetables to stale rolls. View the 10 Ways to Hide Cooking Goofs slideshow for details.

A Few Extra Pounds
According to Stacy London, cohost of TLC’s What Not to Wear, it’s easy to look 10 or 15 pounds lighter by following this “clothes diet.”
View the 5 Ways to Hide a Few Extra Pounds slideshow for details.

A Few Extra Years
Women don’t have to resort to Botox injections or plastic surgery to look a little younger. According to Bobbi Brown, author of Bobbi Brown Makeup Manual, you can give yourself a “makeup face-lift.” Although moisturizer, foundation, blush, and eye shadows and liners all play important roles, Brown says, under-eye concealer is key. Pick a yellow tone that’s one or two shades lighter than your foundation. (If you’re unsure, stripe several shades on your cheek and check the mirror in natural light; the one that disappears is ideal for you.) Apply the concealer along your lower lash lines and into the inner corner of each eye using a small-headed brush with firm bristles.

Personal Info on Your Laptop
An estimated two million laptop computers are stolen, lost, or misplaced in the United States annually, and some 600,000 are lost every year in airports. To protect sensitive information stored on yours, there are two options. For $59.99 per year (or $109.99 for three years), Computrace LoJack for Laptops Premium software provides the backing of a “theft recovery team” that will track your stolen computer, report its location to police, and remotely delete personal data. Computrace LoJack has been a top seller for years. But a new, free program, from researchers at the University of Washington and the University of California, San Diego, allows you to track your laptop’s whereabouts and even takes a photo of the thief (if the computer is a Mac with a built-in camera). The program, called Adeona, can be downloaded at

Your Anxiety When Speaking in Public
Schedule a massage a few hours before your big presentation, says Susan Mackewich, an executive producer at Gizmo Enterprises, a media production company in New York City, who’s seen her share of nervous performers. “Tell the massage therapist to focus on where you carry the most tension, like your shoulders, back, or neck,” she says. Then, when you’re at the podium, sip room-temperature (not cold) water to soothe your vocal cords, and, if you feel anxiety building, massage the pad of muscle between your thumb and index finger. It’s an acupressure point, and it’s something your audience won’t notice.

Your Medical Identity
The soaring cost of health care is spawning a new crime: medical identity theft, in which someone uses your insurance information and health records to obtain medication or even surgery. It happens to 250,000 people each year, says the World Privacy Forum. To protect yourself, the WPF recommends that you: 1) closely review all “explanation of benefits” letters from your health insurer, 2) annually request a list of benefits paid by your insurer in your name (sometimes thieves alter billing info), and 3) check your medical file every time you visit the doctor.

Google, Microsoft, and dozens of other companies will also store your personal health records (PHRs) online. While there are advantages to having a complete medical history in one convenient location, some companies have “de-identified” these records and sold them to marketers. Pam Dixon, executive director of the WPF, does not generally recommend PHRs that are not maintained by health care providers. She stresses looking for a service that is “HIPAA covered” rather than “HIPAA compliant” in order to retain confidentiality. Look for that exact wording in the privacy statement. (Electronic health records, or EHRs, are maintained exclusively by health care providers.) For more information, visit and click on PHR Page.

Your Tracks Online
Just as your computer’s browser maintains a history of the websites you visit, your Internet service provider (ISP) may keep an electronic log of the ones you peruse. Until recently, this was all just worthless data. But now some ISPs are considering selling these lists to companies that analyze them and then send targeted ads back to you. If you’re bothered by this, there are three things you can do:

  • Go to and let the site automatically check whether your ISP is using monitoring devices.
  • Since this check is not comprehensive, call your ISP and ask if it’s contemplating selling browsing data; if so, object.
  • Download a free software program called Tor from, which will help block those prying ISP eyes.

Similarly, when you type a phrase into a search engine, you’re broadcasting your interests and personal information. Like ISPs, some search companies routinely gather, store, and sell analyses of such data strings. That’s why you should never search your full name and Social Security number or your name and password. Some other tips from the WPF:

  • Don’t sign up for e-mail with your favorite search engine. This makes it easier to link you and your interests.
  • Use a variety of engines and computers for searching. This makes it more difficult to profile you.
  • Find out if your ISP uses a static IP address system, and if it does, periodically request a new IP address (essentially your computer’s address).
  • Use software that masks your computer’s address, like and

Become more interesting every week!

Get our Read Up newsletter

how we use your e-mail
We will use your email address to send you the newsletter each week, and we may also send you occasional special offers from Reader's Digest. For more information please read our privacy policy.

Some people like to travel by train because 
it combines the slowness of a car with the cramped public exposure of 
an airplane.

Dennis Miller

I think my pilot was a little inexperienced. We were sitting on the runway, and he said, “OK, folks, we’re gonna be taking off in a just few—whoa! Here we go.”

Kevin Nealon

“I can’t wait until your vacation is over.” 
—Everyone following you on Instagram


A man knocked on my door and asked for a donation toward the local swimming pool. So I gave him a glass of water.

Comedian Greg Davies

Funny Jokes

Just found the worst page in the entire dictionary. What I saw was disgraceful, disgusting, dishonest, and disingenuous.


Funny Jokes

Client: We need you to log in to the YouTube and make all our company videos viral.


Funny Jokes

My cat just walked up to the paper shredder and said, “Teach me 
everything you know.”


Funny Jokes

“Just because you can’t dance doesn’t mean you shouldn’t dance.” 

@yoyoha (Josh Hara)

Funny Jokes

My parents didn’t want to move to Florida, but they turned 60 and that’s the law.

—Jerry Seinfeld

Funny Jokes

Q: What do you call an Amish guy with his hand in a horse’s mouth?

A: A mechanic.

Fields marked with an * are required
Foods That Harm Foods That HealWant a Free eBook?
FOODS THAT HARM, FOODS THAT HEAL offers important information about the role diet plays in the struggle against heart disease, cancer, diabetes and other serious illnesses. Answer the question below to receive your FREE digital eBook.

Someone in my household experiences the following conditions:

Send me a link to download FOODS THAT HARM, FOODS THAT HEAL:
By clicking below, I agree to the Trusted Media Brands Privacy Policy