In this article, you will learn what you can do to protect your privacy against malicious network activity and policy violations (exploits, port-scanners, advertising, telemetry, state surveillance, etc.) when even the most widespread tools seem to fail this goal.