You can't really. If they are using data from the IRS, non public and the public data sources available to them, ie housing deeds etc, then there's nothing you can do. The government has the data to profile regardless of whether you give it to them or not because of how data is already collected for various uses. That's why the government doing things like using this data to make lists of people is so dangerous, regardless of government and country. Once you make and use identity graphs at that scale, you can get anything on anyone. ( This was also the problem with PRISM and is all really just expansions on that system and mentality) Answer from good4y0u on reddit.com
Palantir
palantir.com › docs › foundry › security › single-sign-on-security
Protecting identity • Palantir
Require device security or health attestations or assessments as a condition for access. Require unusual logons or activity to require re-authentication. Service accounts often have broadly-permissive access to sensitive data, and tend to be ...
Palantir
palantir.com › docs › foundry › getting-started › authentication
Authentication • Palantir
Instead, your device will verify your identity using security features such as biometrics, and provide a private cryptographic key to authenticate you, allowing you to log in. Passkeys eliminate the need to remember complex passwords and allow you to sign in with your fingerprint, face scan, security key, or password manager.
Hackaday
hackaday.com › 2025 › 11 › 19 › browser-fingerprinting-and-why-vpns-wont-make-you-anonymous
Browser Fingerprinting And Why VPNs Won’t Make You Anonymous | Hackaday
November 19, 2025 - Browser attestation is why VPNs will not keep you anonymous. https://en.wikipedia.org/wiki/Web_Environment_Integrity Considering the current climate, I’d expect this to be resurrected in some digital-ID form. ... Find someone that works at a FAANG and buy them a few beers. Ask about how browser finger printing is just one piece of the puzzle, and how quickly they can fingerprint and link any device you are on to every other.
You can't really. If they are using data from the IRS, non public and the public data sources available to them, ie housing deeds etc, then there's nothing you can do. The government has the data to profile regardless of whether you give it to them or not because of how data is already collected for various uses. That's why the government doing things like using this data to make lists of people is so dangerous, regardless of government and country. Once you make and use identity graphs at that scale, you can get anything on anyone. ( This was also the problem with PRISM and is all really just expansions on that system and mentality) Answer from good4y0u on reddit.com
Reddit
reddit.com › r/privacy › the us government has hired palantir to create a database on every american. how can one protect themselves from this?
r/privacy on Reddit: The US government has hired Palantir to create a database on every American. How can one protect themselves from this?
June 1, 2025 -
And how might it affect non-Americans who use American software?
Top answer 1 of 68
1344
You can't really. If they are using data from the IRS, non public and the public data sources available to them, ie housing deeds etc, then there's nothing you can do. The government has the data to profile regardless of whether you give it to them or not because of how data is already collected for various uses. That's why the government doing things like using this data to make lists of people is so dangerous, regardless of government and country. Once you make and use identity graphs at that scale, you can get anything on anyone. ( This was also the problem with PRISM and is all really just expansions on that system and mentality)
2 of 68
368
Reduce the digital footprint. Leave your phone at home. Pay in cash. And remember: tyranny can always come to you. All you can do is be prepared for it.
Wikipedia
en.wikipedia.org › wiki › Palantir_Technologies
Palantir Technologies - Wikipedia
1 day ago - U.S. military intelligence used the Palantir product to improve its ability to predict locations of improvised explosive devices in its war in Afghanistan.
Opentitan
opentitan.org › book › doc › security › specs › attestation
Device Attestation - OpenTitan Documentation
Attestation is the mechanism in which software verifies the authenticity and integrity of the hardware and software of a device. OpenTitan supports the following attestation mechanisms: · Creator Based Attestation (Creator Identity Certificate)
Apple Support
support.apple.com › guide › security › managed-device-attestation-security-sec8a37b4cb2 › web
Managed device attestation security - Apple Support
Managed device attestation is available in iOS 16, iPadOS 16, macOS 14, tvOS 16, watchOS 9, visionOS 1.1, or later. It uses the Secure Enclave to provide cryptographic assurances about the identity of a device and its security posture. iPhone, iPad, Apple TV devices require the A11 Bionic chip or later, and only Mac computers with Apple silicon are supported.
Apple Support
support.apple.com › guide › deployment › managed-device-attestation-dep28afbde6a › web
Managed Device Attestation for Apple devices - Apple Support
Managed Device Attestation provides strong evidence about which properties of a device can be used as part of a trust evaluation. This cryptographic declaration of device properties is based on the security of the Secure Enclave and the Apple attestation servers.
Approov
approov.io › knowledge › what-is-the-difference-between-device-attestation-and-app-attestation
What is the difference between 'Device Attestation' and 'App Attestation'?
Device Attestation: Device attestation focuses on verifying the integrity and security of the entire mobile device including the hardware, firmware and software including the OS. This process involves confirming that a mobile device is free from compromise and adheres to predefined security ...
TrustDecision
trustdecision.com › articles › device-fingerprinting-enhanced-security-identity-verification
TrustDecision | Device Fingerprinting: Enhancing Security in Identity Verification
Unlike one-time authentication methods, device fingerprints persist across sessions, allowing for continuous monitoring and adaptive security. This means that even after the initial login, the system can keep verifying the user's identity based on their device's unique fingerprint.
Microsoft Learn
learn.microsoft.com › en-us › windows-server › security › device-health-attestation
Device Health Attestation | Microsoft Learn
Enables enterprises to raise the security bar of their organization to hardware monitored and attested security, with minimal or no impact on operation cost.