Skip to content ↓

Mark Zuckerberg Covers His Webcam. Should You?

Mark Zuckerberg, founder of Facebook, recently shared a picture of himself celebrating a milestone: Instagram now has five hundred million active users each month. There was Zuckerberg in his office holding an Instagram-like frame in front of himself. The picture would have been unremarkable and quickly forgotten but for this: Astute observers noticed that his laptop was on the desk behind him and that he had placed tape over the camera and the microphone. Those are small but significant details.

3 things about this photo of Zuck:

Camera covered with tape
Mic jack covered with tape
Email client is Thunderbird pic.twitter.com/vdQlF7RjQt

— Chris Olson (@topherolson) June 21, 2016

There was a time, and it was not so long ago, when we laughed at people who said things like, “The government can control your computer” or “the government can tap into your webcam.” Then Edward Snowden proved that this is actually being done. The unnerving reality is that governmental bodies and skillful hackers actually do have the ability to turn on your webcam without your knowledge and without triggering the indicator light. They actually do have the ability to turn on the microphone and listen in without your knowledge. Conspiracy theory has given way to reality. Mark Zuckerberg would make an especially high-profile target for hackers and for that reason has taken basic but effective measures to protect himself.

Zuckerberg While I try to avoid operating by fear and fringe, I’m not convinced that he is over-reacting. I’m not convinced that his response is irrational or alarmist even for those of us with much less to lose. There are some things every one of us can and ought to do to protect ourselves in this digital world. But my foremost concern is for Christian leaders—from pastors with a voice to their community to denominational figures with a voice to their nation. There are some measures such people should at least consider as a means of protecting themselves, their ministries, and the gospel. Here are a few of them.

Use Good Passwords & Two-Factor Authentication

The most simple and obvious measures of protection are using good passwords and two-factor authentication. Rather than repeat myself, I’ll direct you to an article I’ve written about this very thing: 5 Things You Must Do to Protect Yourself Online. That article explains how to create a great password and why it is so important (and so simple!) to activate two-factor authentication. Seriously, do these things. Lock down your services and lock down your devices.

Address Your Character

Having nothing to hide is the absolute best protection for yourself and your ministry.

Before we talk about technological solutions, let’s talk about character. We tend to believe that problems created by technology can best be addressed by more technology. As we discuss things we can do to protect ourselves from electronic snooping and data gathering, our tendency will be to look for software and devices that can help us. That’s a good idea, but it comes second in order of priority. First we need to understand that the first and most important measure of protection is to avoid whatever is sinful. Having nothing to hide is the absolute best protection for yourself and your ministry. Think honestly about what you do, access, and search for online. If there are unwise patterns or inappropriate habits, take action against those things today. Don’t leave sin unaddressed.

Choose Your Medium Carefully

There are conversations we have via email, text, or other electronic media that may be better had face-to-face. Conversations that are had with formality and gravity in the real-world are often marked by informality and thoughtlessness when conducted electronically. Not only that, but these conversations are recorded and preserved in their every detail. They are just the kind of conversations that can be dug up and used against us later on. Email conversations on confidential topics that are torn out of context, posted publicly, and interpreted by the person who shares them—we have already seen the damage these can do. It is far better to have such conversations face-to-face and, if necessary, to record formal minutes. Choose the medium that is most appropriate for a conversation. Do not assume that electronic conversations will remain forever confidential.

Check Data Policies

Our devices and services leave behind a constant trail of data. Your email, your web browser, your mobile phone, your social networks, your accountability software—they generate lists of sites you have visited, locations you have been, searches you have made, and so much more. This data could prove devastating if it falls into the wrong hands. This is true even if you live by very high moral standards. Just think of the searches you have made to address medical concerns or the pictures that have popped up even when you haven’t wanted to see them. All of this exists in your data trail. Many Christian leaders would have their ministries seriously compromised if such data were to become public.

(Note: Google CEO Eric Schmidt is among others who has made the argument that the best protection is having nothing to hide. I agree as it pertains to the individual. But as it pertains to those who offer services, they need to take every possible measure to protect our data, knowing that even completely moral things can bring great embarrassment or be terribly misinterpreted.)

There are many companies that make every effort to collect information about you but almost no effort to protect it.

You owe it to yourself to research the policies of any company that has access to this trail. I have asked companies questions like these: How and where do you store my data? How long do you store my data and what do you do with it after that? Do you have a system that reports when employees are looking at my data for no good reason? I have immediately stopped using certain services because their answers have been so unsatisfactory There are many companies that make every effort to collect information about you but almost no effort to protect it. You have to assume that unless a company has a very strict data-destruction policy, they will keep your data forever. You have to assume that unless a company has a very strict data-protection policy, they may at some point allow it to be compromised.

Consider the Zuckerberg Approach

Finally, some people may need to consider the Zuckerberg approach. For most people in most situations there is probably no good reason to cover your webcam and microphone. If the computer sits in your office facing a wall and if your conversations are non-confidential, there is not much to gain or lose. But consider the computer that sits in your bedroom with a camera facing the bed. Knowing what you know, might it be a good idea to cover it up? Perhaps so. Even while it’s very unlikely that anyone will ever access it, there is still some measure of risk. If you keep your phone on a bedside table, at least angle the camera away from your bed. For leaders who have a particularly high profile, I would think even more carefully about such precautions in your home and workplace. Be wise as serpents and innocent as doves (Matthew 10:16). Do a bit of research online and see what the experts are saying.

The thing is, we really don’t know who is collecting information about us and what they are doing with it. But we do know that bodies like the NSA are collecting massive amounts of it and storing it all away. If they are, so too are others who may have even more dangerous designs. Though your data may not be used against you today and though it may not come to light tomorrow, it is still there. In an age of ubiquitous data collection, there is wisdom in taking some basic measures of self-protection and self-preservation. I saw many articles from tech-savvy writers remarking on Zuckerberg’s laptop; I didn’t see one that was mocking him or accusing him of over-reacting.


  • What Makes You Beautiful

    What Makes You Beautiful

    I have often thought of a conversation that took place when my girls were little. Abby was perhaps 5 or 6 at the time and Michaela just working her way through the “terrible twos” (which for our kids always happened when they were three or four). A stranger saw me interacting with them one day…

  • A La Carte Collection cover image

    A La Carte (April 25)

    A La Carte: John Piper and ChatGPT / Who’s praying for your wife and kids? / When your dreams include sin / Are you called to ministry? / Our feet shall tread this place again / and more.

  • A La Carte Collection cover image

    A La Carte (April 24)

    A La Carte: He cares for us / Will the pope to go heaven? / An easy Christian faith / The good we cannot see / Chickens, elephants, and freedom / When we skip the prophets / Kindle and book deals / and more.

  • Francis

    Did Francis Prove To Be “The Humble Pope?”

    Francis’ time as pope has come to an end and already many are attempting to define his legacy. Was he a reformer? Was he a progressive? Was he an apostate? Perspectives are wildly varied with some honoring him as the greatest pope of modern times and some dishonoring him as a disgrace to the office.

  • A La Carte Collection cover image

    A La Carte (April 23)

    A La Carte: How to begin a conversation with a dechurched friend / Machen was right / The truth of Christ’s resurrection / When grief becomes sin / Nope to the media’s ideal for a new pope / Book sale / and more.

  • A La Carte Collection cover image

    A La Carte (April 22)

    A La Carte: Pope Francis / Yes, Jesus was crucified with nails / The mystery of “the call” / Just a little bit / The last of the four / John outran Peter / Kindle deals / and more.