This document discusses privacy risks in computer technology and how to protect against them. It notes that privacy can be at risk through unauthorized access to personal data, loss of self-control over data, and unwanted tracking. Specific risks mentioned include access to personal information and multimedia through cameras, GPS, cell phones, apps and untrusted apps. The document recommends realizing privacy by providing only necessary personal data, using encryption tools, VPNs and security locks. It also stresses increasing awareness of how technology and systems work in order to better protect privacy.