28-Day Digital Declutter

Your digital life,
finally under control.

A practical, week-by-week program to go from digital chaos to calm — no tech expertise required.

4Weeks
28Daily lessons
~15Min per day
$0New apps needed
1WK

Take Stock

See what you're actually dealing with — before you touch anything

Awareness · Inventory · No deleting yet
0 / 7 complete
Day 01

What does digital clutter actually cost you?

It's not just annoying. Digital mess has real costs in time, money, security, and mental load.

Most people think of digital clutter as a minor inconvenience — a messy desktop, a full inbox, too many browser tabs. But the real cost is far larger than that. Digital clutter drains attention, costs real money, creates genuine security risks, and generates a persistent low-level anxiety that most people have simply stopped noticing because it's been there so long.

Today is about reframing what we're doing here. This program isn't a spring clean you do once and forget. It's about understanding what your digital life actually looks like right now — and then building the systems that keep it under control permanently.
1
The four real costs of digital clutter
2.5h
Average time lost daily to digital distractions, unnecessary notifications, and searching for files
$273
Average annual spend on digital subscriptions people have forgotten about or stopped using
100+
Average number of online accounts per person — most with weak or reused passwords

These numbers come from aggregated research across productivity studies and consumer finance data — but the real insight is how they add up. That 2.5 hours a day is 900 hours a year. The $273 in forgotten subscriptions is probably conservative if you include the ones billed annually. And those 100+ accounts? Each one is a potential security liability that likely shares a password with something important.

Beyond the measurable costs, there's a subtler one: attention debt. This is the low-level cognitive drain of a cluttered digital life. Notifications you've trained yourself to ignore. An inbox you dread opening. A desktop you cover with other windows so you don't have to look at it. A Downloads folder you've never once cleaned out. These aren't just annoyances — they consume mental bandwidth all day, every day, whether you're aware of it or not.

2
How digital clutter accumulates — and why it's not your fault

Digital clutter doesn't accumulate because of laziness or bad habits. It accumulates because:

  • Storage got cheap. When hard drives had limited space, deletion was necessary. Now there's essentially no friction to keeping everything forever — so we do.
  • Sign-ups take seconds. Creating an account anywhere is a one-minute task. Closing one properly can take ten. So accounts pile up.
  • Software signs you up automatically. Free trials roll into paid subscriptions. Purchases opt you into newsletters. Notifications are enabled by default.
  • There's no inbox for files. Email has a concept of "unread" that creates mild urgency. Files just sit wherever they land — and they land everywhere.
  • We're always using it. You can spring clean your home once a year and it stays manageable. Your digital life generates new clutter every single day.

Understanding this matters because the solution isn't "be more disciplined" — it's building systems with the right defaults, so less discipline is required.

3
What this program covers — and in what order

This program tackles your digital life in four focused weeks. Each week builds on the last:

What we're building

A simple, maintainable system for files, accounts, security, email, and subscriptions — with a weekly habit that keeps everything in order.

What we're not doing

A one-time purge that feels great for two weeks, then falls apart. Every change in this program is designed to last.

  • Week 1 — Take Stock: Survey your digital life across all four zones. Observation only — no deleting yet.
  • Week 2 — Files & Storage: Build a folder structure you'll actually use. Clean the Desktop, Downloads, Documents, and Photos. Sort out cloud storage and backups.
  • Week 3 — Accounts & Security: Get a password manager running. Enable two-factor authentication on what matters. Close old accounts.
  • Week 4 — Communication & Habits: Reach inbox zero using a repeatable system. Cull subscriptions. Set up a 10-minute weekly reset that keeps everything in order.
4
The one rule for this week

Week 1 is observation only. Don't delete anything. Don't cancel anything. Don't start reorganising. People who skip the inventory and jump straight to cleaning always hit a wall — usually around Day 10, when they've run out of obvious things to fix and have no system to return to.

The inventory you build this week is the foundation that makes everything else work. Trust the process.

✏️
Your actionWrite down your three biggest digital frustrations right now — the things that genuinely annoy you or stress you out. Be specific: "my inbox has 4,000 unread emails" is better than "email is a mess." These become your personal motivation anchors for the next 28 days.
Key takeaway
Digital clutter isn't a personality flaw. It's the predictable result of a digital world that was never designed to stay organised — and the absence of the systems you're about to build.
Day 02

Map your digital footprint

You have more accounts than you think. Today you find out exactly how many.

The average person has between 100 and 200 online accounts. Most could name fewer than 20 from memory. The rest are scattered across a decade of sign-ups — forums you visited once, apps that no longer exist, services you switched away from years ago. Every one of those accounts exists somewhere, holding your email address and often a password you've reused elsewhere, whether you remember creating it or not.

Today you find out exactly how deep the trail goes. We're not closing anything yet — just counting. The goal is an honest number that becomes your starting point for Week 3.
1
Check your browser's saved passwords

Your browser has been quietly cataloguing every site you've logged into. This is the fastest and most complete snapshot of your account footprint — most people find far more entries here than they expected.

  • Chrome: Go to Settings → Passwords, or type chrome://password-manager/passwords in the address bar
  • Safari: Go to Settings (on Mac: Safari menu → Settings) → Passwords tab
  • Firefox: Settings → Privacy & Security → scroll down to Logins and Passwords → Saved Logins
  • Edge: Settings → Passwords (or type edge://settings/passwords)

When you open the list, sort it alphabetically or by date added. Scroll slowly — you'll recognise some immediately, and many others will spark an "oh, I forgot I had an account there" reaction. That reaction is the point of today.

🔍
Your actionOpen your browser's saved passwords list. Count the total number of entries and write it down. Don't try to review each one — just get the number. Most people find between 80 and 250 saved logins.
2
Search your email for account creation traces

Your inbox is a near-complete archive of every account you've ever created. Companies send confirmation and welcome emails automatically, and most of those emails are still sitting in your inbox or All Mail archive right now.

Search for these phrases in your email and note roughly how many results come up:

  • "welcome to" — catches almost every new account confirmation email
  • "verify your email" — sign-up verification requests, often from services you may not have fully activated
  • "thanks for joining" — registration confirmations, forum and community sign-ups
  • "confirm your account" — another common variant, especially from older services
  • "your account has been created" — used by many SaaS and government services

The goal isn't to read all of these — just scroll through the results and notice how far back the dates go. You're likely to find accounts from 5, 10, even 15 years ago.

📧
Your actionRun the search "welcome to" in your inbox. Scroll through results without clicking. Note: (1) roughly how many results, and (2) what year the oldest one is from. Don't open or click anything — just observe the scale.
3
Check if your email address has been in a data breach

Data breaches happen constantly. When a company's database is compromised, usernames and passwords are often exposed and traded online. The question isn't whether any of your accounts have ever been in a breach — statistically, they have. The question is which ones, and whether those passwords are still in use elsewhere.

🔐
Have I Been Pwned
Free service run by security researcher Troy Hunt — trusted by governments and security teams worldwide. Checks your email against a database of billions of leaked credentials.
haveibeenpwned.com

When you check your email, the results will show you each breach by name, the date it occurred, and what data was exposed (email, password, phone number, etc.). A result here doesn't mean someone is actively using your account — it means that data was exposed at some point. We'll act on it in Week 3.

⚠️
If you see your email in a breachDon't panic. Note the breach name and what was exposed. Most people find their email in at least two or three breaches — it's extremely common. Week 3 covers exactly how to respond to each one.
🔍
Your actionGo to haveibeenpwned.com, enter your primary email address, and note the results. If you use more than one email address, check each one. Write down how many breaches appear and which services were involved. We'll use this list in Week 3.
4
Check "Sign in with Google/Apple" accounts

Many accounts don't appear in your browser's saved passwords at all — because you created them using "Sign in with Google" or "Sign in with Apple" instead of a traditional username and password. These are often overlooked but are still active accounts tied to your identity.

  • Google: Go to myaccount.google.com → Security → Third-party apps with account access. You'll see every app or service you've authorised using your Google account.
  • Apple: Go to appleid.apple.com → Sign in with Apple section, or on iPhone: Settings → [your name] → Password & Security → Apps Using Apple ID.
🔗
Your actionCheck one or both of these lists depending on which you use. Note the total number of connected apps — you'll revisit this in Week 3 when we start revoking access to things you no longer use.
Key takeaway
The discomfort of seeing the full size of your account footprint is the point. That number — however large — is what motivates Week 3's cleanup, which is where the real security gains happen.
Day 03

Your file system reality check

If you can't find something in 30 seconds, it's clutter — even if it's technically "organised."

A healthy file system has one simple test: can you find anything in under 30 seconds without using search? Most people can't — not because they're disorganised, but because files accumulated faster than any system could naturally keep up with.

Today you survey the damage. No deleting, no reorganising. You're auditing four zones that become problem areas for almost everyone, and recording a set of baseline numbers. By the end of Week 2, every one of these zones will have a working system.
1
Understanding the four problem zones

Digital files tend to accumulate in predictable places. Here are the four zones that cause the most chaos — and why each one gets out of hand:

  • Desktop — The most visible mess. Every file here represents a decision you deferred. The Desktop feels like a convenient temporary landing spot, but "temporary" becomes permanent within days. Files sit here for years.
  • Downloads folder — A black hole of PDFs you opened once, installer files you ran and forgot to delete, images saved for a project that finished, and compressed files from years ago. Most people have never once cleaned their Downloads folder.
  • Documents folder — Intended as an organised filing system, it usually becomes a flat pile of everything. It's the drawer you shove things into when you're tidying a different area.
  • Photos / Camera Roll — The largest problem zone by volume. Thousands of photos taken across years, synced from multiple devices, duplicated between your phone, laptop, and cloud — most unsorted, many blurry or duplicate, few deliberately kept.
2
How to count and audit each zone

For each zone: open it, sort by "Date Modified" (oldest first), and record two numbers — the total item count and the age of the oldest item. Don't open individual files. Don't start cleaning. Just count.

How to get item counts quickly:

  • Mac: Click inside the folder, then press Cmd+A to select all, and the count appears in the status bar at the bottom. If you don't see a status bar, go to View → Show Status Bar.
  • Windows: Click inside the folder, then Ctrl+A to select all — the count and total size appear in the bottom bar.
  • Photos app (Mac): Open Photos → All Photos view — the total count shows at the very bottom.
  • iPhone Camera Roll: Settings → General → iPhone Storage → Photos — shows total count and storage used.
📊
Your actionVisit each of the four zones and write down: (1) total item count, and (2) how old is the oldest item? Record these four pairs of numbers — they become your Week 2 starting point and you'll feel good looking back at them.
3
Check your cloud storage situation

If you use any cloud storage services — Google Drive, iCloud, Dropbox, OneDrive, or others — they have their own file chaos that's separate from your local machine. Many people have multiple cloud services with overlapping content.

  • Google Drive: drive.google.com — check Storage (left sidebar) for total usage and percentage used
  • iCloud: Settings → [your name] → iCloud → Manage Account Storage (iPhone), or System Settings → Apple ID → iCloud on Mac
  • Dropbox: dropbox.com → Account settings → Plan shows your usage
  • OneDrive: onedrive.live.com → storage usage shown on account page

For each service you use, note: total storage, how much is used, and whether there's any folder structure or just a flat pile of files at the top level. Also check if you're paying for upgraded storage — and whether you actually need to be.

☁️
Your actionCheck each cloud service you use. Note storage usage and whether it's approaching capacity. If you're paying for upgraded cloud storage, note the monthly cost — this goes on your subscription list from Day 5.
4
The "30-second test"

Before you move on, run the 30-second test on your current system: without using the search function, try to find each of these in under 30 seconds:

  • Your most recent tax return or a key financial document
  • A photo from a specific event in the last 12 months
  • A work document you created in the last 3 months

Note how many you found, and how long each took. This isn't a test you pass or fail — it's a baseline. By the end of Week 2, all three should be findable in under 30 seconds without using search.

Key takeaway
The numbers you've just recorded aren't a verdict on you — they're a baseline. Everything in Week 2 is designed to address exactly what you found today.
Day 04

Email: facing the inbox

The average inbox has 1,000+ unread emails. Yours probably does too — and today you look honestly at why.

Email was designed as a tool for sending and receiving messages. Somewhere along the way it became a newsletter dump, receipt archive, notification feed, calendar reminder service, and source of low-level anxiety that most people quietly dread opening.

Today is not about fixing your inbox. It's about understanding exactly how it got this way — because that understanding is what makes Week 4's fix actually stick instead of reverting within a month.
1
Take an honest inventory of your inbox

Before you can fix a system, you need to understand what's actually in it. Open your primary email account and answer these questions:

  • Total unread count — the number in the badge or shown in your inbox. Write it down without judgement.
  • Oldest unread email — scroll to the very bottom of your unread or sort by oldest first. What year is the oldest unread message from?
  • How many email accounts? — personal, work, old accounts you still check occasionally. Count them all.
  • Total inbox size — most providers show total storage usage or message count. Note this if you can find it.
📧
Your actionWrite down: your unread count, the year of your oldest unread email, and how many email accounts you actively use. Don't try to fix anything — just establish the baseline.
2
Understand what's actually in your inbox

Scroll through the most recent 50–100 emails and mentally categorise what you see. For most people, the breakdown looks something like this:

~70%
Automated: newsletters, marketing, notifications, receipts, alerts
~20%
Semi-useful: shipping updates, booking confirmations, account notices
~10%
Actual messages from real people that need a response

The problem isn't the volume of email — it's that the 10% that matters is buried inside the 90% that doesn't. Every time you open your inbox, your brain has to process and filter everything to find the real messages. That filtering has a cognitive cost, even when you do it quickly.

3
How email became a noise machine — and how it happened to you specifically

Every source of email noise in your inbox got there through a real mechanism. Understanding each one matters because the fix is different for each:

  • Online purchases: Most retailers add you to their marketing list automatically when you buy something. By law in many countries, this is allowed — you're technically an "existing customer." One purchase can mean years of emails.
  • Free downloads and trials: Any free resource — ebook, template, tool trial — almost always requires an email address. That address goes on a list immediately.
  • App notifications routed to email: Many apps send notifications both as push alerts to your phone AND as emails. You're getting double-notified for things you've already seen.
  • Services you use but don't need emails from: You have accounts at dozens of services you use occasionally. They send updates, newsletters, and "we miss you" emails even though you never asked for them.
  • Old subscriptions you forgot to cancel: Some newsletters you did intentionally sign up for — years ago, for a period of life that's moved on.
✓ Inbox should be

An arrival zone for messages you'll act on — cleared regularly, like a physical letterbox. When you open it, most things there are relevant.

✗ Most inboxes are

A permanent storage archive where everything piles up indefinitely — a mix of noise and signal with no way to easily tell them apart.

4
Find your top 5 sources of noise

Scroll through your inbox and find the five senders who appear most frequently sending things you don't read. These aren't necessarily the senders sending the most email — they're the ones whose emails you delete, ignore, or scroll past most consistently.

Write down these five sender names or domains. In Week 4, the very first action will be to unsubscribe from or block these specific sources. Having the list now means that session starts with instant momentum.

📋
Your actionIdentify your top 5 email noise sources — the senders whose emails you consistently ignore or delete without reading. Write them down. These are your first five unsubscribes in Week 4.
Key takeaway
A full inbox isn't a sign you're bad at email. It's a sign your inbox has never had a system that matches how email actually works — and that system is what Week 4 is built around.
Day 05

The subscription and account money audit

How much are you paying for digital things you've completely forgotten about?

Digital subscriptions are the modern equivalent of the gym membership you never use — except most people have six or seven of them, not one. They're designed to be cheap enough individually that no single charge ever feels significant enough to cancel. But they compound quietly every month, and the annual total is almost always larger than people expect.

Today you build the complete list of every digital charge hitting your accounts. Don't cancel anything yet. The act of listing them, costing them, and seeing the annual total is the motivation that makes Week 4's cancellation session one of the most satisfying things in this program.
1
Search your bank and card statements

The most complete source of subscription information is your bank and credit card statements. Go through last month's statements — and check December of last year for annual charges that don't show up monthly. Look for recurring charges in these categories:

  • Streaming — Video: Netflix, Disney+, Apple TV+, Stan, Paramount+, Binge, Amazon Prime Video, YouTube Premium
  • Streaming — Music & Audio: Spotify, Apple Music, Tidal, Audible, audiobook services, podcast apps with paid tiers
  • Cloud Storage: iCloud+ (Apple), Google One, Dropbox, OneDrive, Backblaze, other backup services
  • Productivity & Software: Microsoft 365, Adobe Creative Cloud, Notion, Evernote, LastPass, 1Password, any SaaS tools
  • Fitness & Wellness: gym apps, yoga or pilates streaming, meditation apps (Calm, Headspace), health tracking subscriptions
  • News & Editorial: newspaper subscriptions (digital), magazines, Substack paid newsletters, industry publications
  • Gaming: PlayStation Plus, Xbox Game Pass, Apple Arcade, Nintendo Online, in-game monthly subscriptions
  • Learning platforms: Coursera, MasterClass, LinkedIn Learning, language apps (Duolingo Plus, Babbel)
  • Miscellaneous: VPN services, antivirus subscriptions, dating apps, niche tools you signed up for once
💳
Your actionOpen last month's bank and card statements. Write down every digital/software charge — name, monthly cost, and whether it's monthly or annual. For annual ones, note the monthly equivalent. Don't cancel anything yet.
2
Check platform-level subscription management

Many subscriptions are managed at the platform level — meaning Apple, Google, or PayPal handles the billing, and the subscription doesn't appear in your bank statement under the app's own name. Check each platform you use:

  • iPhone / iPad (App Store subscriptions): Settings → tap your name at the top → Subscriptions. This shows every active and recently expired App Store subscription, including ones you may have forgotten.
  • Android (Google Play): Open Google Play → tap your profile picture → Payments & subscriptions → Subscriptions
  • PayPal automatic payments: Log in to PayPal → Settings (gear icon) → Payments → Manage automatic payments. This catches any service you authorised to bill via PayPal.
  • Amazon: amazon.com → Account & Lists → Memberships & Subscriptions. Check for Prime and any digital subscriptions billed through Amazon.
📱
Your actionCheck your Apple or Google subscriptions list and note any that didn't appear in your bank statement. Add them to your list with their monthly cost.
3
Calculate the annual total

Once your list is complete, do the maths. For each subscription, note whether you've used it in the last 30 days. Then add everything up — the monthly total and the annual total.

✓ Keep if

You've used it at least once in the last 30 days AND the monthly cost feels proportional to how much you use it AND there's no free alternative that would cover your needs.

✗ Flag for cancellation if

You haven't used it in the last month. You use it occasionally but not enough to justify the cost. You'd forgotten it existed until you found it in this audit.

Don't cancel anything yet — flag the candidates and keep the list for Week 4. The cancellation session will cover how to exit each one cleanly, including some that make cancelling harder than it should be.

Key takeaway
The annual total is almost always surprising. Whatever number you've calculated, Week 4's cancellation session will recover a meaningful portion of it — and you'll feel the difference every month.
Day 06

Device inventory: what do you actually own?

Old phones, dead laptops, and mystery USB drives are all part of your digital life.

Most people have a drawer, box, or shelf where old technology accumulates. Old phones. Laptops that "still work, mostly." USB drives with no label. Hard drives from a computer you replaced five years ago.

Every one of these devices is still holding your data. Your photos, messages, browser history, and saved passwords don't disappear when you upgrade. They stay on the device until it's deliberately cleared — which almost nobody does. Today you find out exactly what you're sitting on.
1
Do a physical walk-through of your home

Go room by room and check the places where technology tends to collect: desk drawers, bedside tables, kitchen junk drawers, bookshelves, wardrobes, boxes in storage, the back of closets. Look for anything that could hold personal data:

  • Old smartphones — yours, family members', old work phones you kept
  • Tablets and e-readers (old iPads, Kindles, Android tablets)
  • Old laptops or desktop computers, including ones that "don't work properly"
  • External hard drives — these often hold huge amounts of old data including complete backups
  • USB flash drives — these travel everywhere and get forgotten in bags, drawers, and boxes
  • Old smart watches or fitness trackers
  • Old game consoles that can connect to the internet (PlayStation, Xbox, Nintendo Switch)
  • Cameras with built-in storage or memory cards
🔍
Your actionDo a physical walk through your home. Gather every device you can find into one place — or write down where each one is. Phones you haven't turned on in years still count. Everything goes on the list.
2
Why old devices are a serious security and privacy issue

This step gets skipped because old devices feel harmless — they're just sitting in a drawer. But consider what's actually on them:

  • Old phones: Have your accounts signed in. Contain years of messages, emails, and photos. Often have saved passwords in the browser. Many are not encrypted by default if they're more than a few years old.
  • Old laptops: Have saved passwords in every browser that was ever installed. May contain sensitive work documents, banking records, and personal correspondence. If sold or given away without a factory reset, the new owner has direct access to all of it.
  • External hard drives: Often contain complete backups of old computers — meaning everything that was ever on the computer you replaced, including files you thought you deleted.
  • USB drives: These are routinely lost in bags or given away without being wiped. A found USB drive with your data on it is a treasure trove for identity theft.
⚠️
The critical ruleNever sell, donate, give away, or throw out a device without a factory reset first. This applies even to broken devices — a cracked screen doesn't protect the storage chip. Week 4 covers exactly how to reset each type of device safely before letting it go.
3
Categorise what you found

For each device, note:

  • What it is (model and approximate age if you know it)
  • What's likely on it (photos? work documents? old messages? full backup?)
  • What you want to do with it — keep it, give it away, recycle it, or sell it
  • Whether data has been transferred — if it's an old phone, are the photos on it already backed up elsewhere?

Don't do anything with the devices yet. Week 4 covers the right way to wipe each type and the safest ways to dispose of or recycle old electronics.

📱
Your actionWrite down every device you've found that could hold personal data. For each one, note what you think is on it and what you plan to do with it. This list is your Week 4 device action plan.
4
Check devices still in use: what's signed in?

Extend the audit to your current devices. On each device you actively use, check what accounts are currently signed in:

  • iPhone: Settings → [your name] — shows all devices signed into your Apple ID. Tap any you don't recognise and choose "Remove from Account."
  • Google Account: myaccount.google.com → Security → Your devices — shows every device signed into your Google account, with last activity.
  • Facebook / Instagram: Settings → Security → Where you're logged in — lists all active sessions, including browsers and apps you may have forgotten.

If you see devices or sessions you don't recognise, note them down. We'll clean these up properly in Week 3.

Key takeaway
Physical digital clutter carries more security risk than anything on your screen. Now you know exactly what you have — and in Week 4 you'll clear it properly.
Day 07

Week 1 review: your digital map

Pull everything you've found this week into a single honest picture of your digital life.

This week you did something most people never do: you looked honestly at the full scope of your digital life. You didn't just sense it was messy — you measured it. You have numbers, lists, and a clear picture of what's actually going on across every area.

That inventory is the foundation for everything that follows. Today you consolidate it into one clear map, write an honest summary, and close Week 1 with everything in place for the work that starts next week.
1
Compile your Week 1 inventory

Gather everything you've noted this week into one place. Check each item off as you confirm you have it recorded:

Account footprint (Day 2) — number of saved passwords in your browser, rough count of email-traced accounts, Have I Been Pwned breach results, number of "Sign in with Google/Apple" connected apps
File situation (Day 3) — item counts and oldest-file dates for Desktop, Downloads, Documents, and Photos; cloud storage usage across all services
Inbox state (Day 4) — unread email count, year of oldest unread, number of email accounts, your top 5 noise sources identified
Subscription list (Day 5) — every recurring digital charge, monthly cost, annual total, and which ones you've flagged for potential cancellation
Device inventory (Day 6) — every device holding personal data, what's on it, and what you plan to do with it

If any of these is incomplete or rough, take 5 minutes now to fill in the gaps. The more complete this inventory, the more effective each of the next three weeks will be.

2
Understand what each week will fix

Now that you've seen the full picture, here's exactly how each remaining week maps to what you've found:

  • Week 2 — Files, Photos & Storage: Directly addresses everything from Day 3. You'll build a simple folder structure, clear your Desktop and Downloads to zero, sort your Documents, organise photos by year, and set up a proper backup for the first time.
  • Week 3 — Accounts & Security: Directly addresses everything from Day 2. You'll set up a password manager, migrate your most important accounts to strong unique passwords, enable two-factor authentication on email, and start closing old accounts you no longer need.
  • Week 4 — Communication & Habits: Directly addresses everything from Days 4 and 5. You'll unsubscribe from your top noise sources, reach inbox zero using a four-action system, cancel subscriptions you don't use, wipe and dispose of old devices, and set up a 10-minute weekly reset that keeps everything in order going forward.
3
Identify your most important wins

Look back at the inventory you've built. For each area, identify the single most impactful thing you'll fix:

  • Files: What's the most frustrating thing about your current file situation? The chaotic Desktop? Never being able to find anything? Photos spread across three services?
  • Security: What's the most concerning thing you found? Breach results? Realising you use the same password everywhere? Accounts connected to a service you haven't used in years?
  • Communication: What's the email habit that bothers you most? The pile of unread? The constant newsletters? The inbox that makes you anxious to open?
  • Subscriptions: Which subscription on your list is the most obviously wasteful — the one you see and immediately think "why am I still paying for that?"

These four answers become your Week 2, 3, 4, and 4 priorities. They're the things you'll feel most immediately when they're fixed.

4
Write your "state of my digital life" summary

Take 5–10 minutes and write a short honest paragraph — or a few bullet points — that answers these three questions:

  • What's the messiest part of my digital life right now?
  • What surprised me most this week — what was worse than I expected?
  • What am I most looking forward to fixing in the next three weeks?

Be specific. Don't write "my files are messy" — write "my Downloads folder has 2,400 files, the oldest from 2011, and I couldn't find a document from last month without using search." The specificity makes the before-and-after comparison on Day 28 genuinely meaningful.

Save this somewhere you'll find it in 21 days. A notes app, a document in your soon-to-be-organised Documents folder, or even a printed page. On Day 28, the very first thing you'll do is find this paragraph and write the "after" version.

✏️
Your actionWrite your "state of my digital life" paragraph right now. Three questions, honest answers, specific numbers from this week's inventory. Save it somewhere findable. This is the document you'll read on Day 28 — and the difference will be striking.

Week 1 complete

What you've built this week

Account inventoryFull scope of your digital footprint — passwords, breaches, connected apps
File situation mappedBaseline counts for all four zones — ready to clean in Week 2
Subscription list builtEvery recurring charge identified, costed, and reviewed
Device inventory doneOld devices located, data assessed, disposal planned
Next week: Files, photos, and storage. You know what's there — now we build the simple system that makes everything findable in 30 seconds, clean up every problem zone, and set up a real backup for the first time.
2WK

Files, Photos & Storage

Clear the clutter you can see — and build a system that stays clean

Files · Photos · Cloud storage · Backup
0 / 7 complete
Day 08

The folder system that actually works

You don't need a perfect system. You need a simple one you'll actually use.

Most people's file organisation fails for one reason: it starts too complicated. Dozens of folders, deep nesting, rigid categories that don't fit real life. After a few weeks the system collapses under its own weight and everything lands back on the Desktop.

The solution is radical simplicity. Fewer folders, shallower structure, one consistent rule — a system simple enough that you could rebuild it from memory in five minutes, and maintain it in ten minutes a week.
1
Why most folder systems fail

Before building the new system, it's worth understanding why the old one broke. File organisation fails for predictable reasons:

  • Too many folders: When there are 30 possible places something could go, deciding where takes effort. When deciding takes effort, you stop deciding — and put it on the Desktop instead.
  • Too deep: A structure that requires five clicks to reach the right place will be abandoned within weeks. The Desktop is always one click away.
  • Categories that don't map to real life: A folder called "Miscellaneous" or "Other" is a sign the system doesn't have a place for the things that actually arrive. Files pile up where the system doesn't account for them.
  • No arrival zone: Without a designated temporary holding area, new files land everywhere. The Desktop becomes the de facto inbox for files.

The system you're building today avoids all four of these failure modes by design.

2
The three-click rule

The single design constraint that makes a folder system sustainable: any file should be reachable in three clicks or fewer from your Documents folder.

That means a structure like: Documents → Finance → Tax → 2024 is four levels deep — one too many. The fix is to flatten it: Documents → Finance → Tax 2024 is three levels deep and still perfectly findable.

When you feel the urge to create a subfolder within a subfolder, that's the signal to pause and ask whether the extra level actually helps — or whether it's just adding complexity for its own sake. Most of the time, a clear file name handles the job better than another folder layer.

3
The six-folder structure

Create these six top-level folders inside your Documents directory. They cover the full range of what most people actually keep:

  • Work — projects, clients, employer documents, job applications, contracts. If you're self-employed or run a business, this becomes your primary working folder.
  • Finance — tax returns, bank statements, receipts worth keeping, insurance policies, superannuation/pension documents, invoices. Anything with a dollar sign.
  • Health — medical test results, referral letters, prescriptions, immunisation records, private health documentation, dentist and specialist notes.
  • Home — lease or mortgage documents, property records, warranties and manuals for appliances, vehicle registration, home improvement records, utility account details.
  • Creative — personal writing, photography projects, music files, design work, side projects, hobbies. Anything you make that doesn't belong in Work.
  • Archive — everything that doesn't fit anywhere else but you're not ready to delete. Old projects, completed folders from previous years, documents you're uncertain about. This folder is your "maybe delete later" safety net.

Inside each folder, you can create subfolders as needed — but keep them to one level deep. Finance → Tax 2024 is fine. Finance → Tax → 2024 → Federal is too deep.

📁
Your actionCreate these six top-level folders in your Documents directory right now. Don't move anything into them yet — you're building the skeleton first. If any of the six don't apply to your life, skip them. If you need a seventh that's clearly different, add it. But resist adding more than seven total.
4
File naming: the habit that makes searching work

A good folder structure and a consistent naming habit work together. Without good names, you'll end up with 40 files called "document.pdf" that are impossible to distinguish without opening each one.

A simple naming convention that works for most files:

YYYY-MM — Description — Version.ext

  • 2024-03 — Tax Return — Final.pdf
  • 2024-11 — Home Insurance Renewal.pdf
  • 2025-01 — Contract Draft v2.docx

Starting with the year and month means files sort chronologically by default in any file manager. You don't need to use this exact format — any consistent format is better than no format at all.

Key takeaway
Six broad folders and the three-click rule is enough structure for any normal person's entire digital life. Simplicity isn't a compromise — it's the reason the system will still be working in two years.
Day 09

Taming the Desktop and Downloads

These two folders are not storage. They're arrival zones — and today you'll treat them that way.

The Desktop and Downloads folder are where good intentions go to die. They accumulate because they're the path of least resistance — dropping a file here takes one second, filing it properly takes ten. Over months and years, that gap compounds into hundreds of deferred decisions sitting in two folders.

Today you clear both completely. The approach is methodical, not rushed — and most people are surprised how fast it goes once they have a system to file things into.
1
Why the Desktop especially needs to be empty

The Desktop isn't just a visual problem. It has real functional consequences:

  • It slows your computer. On most operating systems, every file on the Desktop is rendered individually every time you minimise a window. Dozens of files mean dozens of rendering operations — it's a real performance drag.
  • It obscures what's current. When everything lives on the Desktop, you can't tell at a glance what's actually active and what's been there for three years. The signal-to-noise ratio collapses.
  • It becomes a mental anchor. A cluttered Desktop is a constant low-level reminder of undone work. An empty Desktop — a clean visual field — genuinely reduces cognitive load.

The goal today: zero items on the Desktop. Not ten items, not "just the important ones." Zero, plus system aliases and drives if they're unavoidable on your OS.

2
The three-decision rule for every item

For every file on your Desktop and in Downloads, you make exactly one of three choices. There are no other options:

File it — move it to the correct folder in the structure you built yesterday. If you genuinely don't know where it belongs, the Archive folder exists for exactly this situation.
Delete it — the test is simple: "If this disappeared right now without warning, would I notice?" If the answer is no, or probably not, it goes. Trust that instinct.
Archive it — for anything you're genuinely uncertain about but can't bring yourself to delete. Move it to Archive. Do not use this as a way to avoid deciding — use it for genuine uncertainty only.

The rule is: every item must receive a decision. No item goes back where it was. No "I'll deal with this one later" — that is exactly how it ended up here.

3
Working through the Desktop

Start with the Desktop. Sort by "Kind" (file type) — this groups all the PDFs together, all the images together, all the documents together, which makes batch decisions much faster than going item by item.

Common Desktop residents and what to do with them:

  • Screenshot files — almost always deletable. Screenshots are usually taken for a momentary purpose that's already past. Delete everything older than one week.
  • Downloaded PDFs — check the name. If it's a receipt, file it in Finance. If it's an article you saved, ask if you'll actually read it. If not, delete it.
  • Installer files (.dmg, .exe, .pkg) — if the software is installed, delete the installer. You can always re-download from the developer.
  • Working documents — if you're actively using it, move it to the right Work subfolder and access it from there. Active doesn't mean it has to live on the Desktop.
  • Mystery files — open them, identify what they are, then make the three-decision choice. Don't skip mystery files.
🖥️
Your actionClear your Desktop to zero items. Sort by Kind to batch similar files. Apply the three-decision rule to every single item — no exceptions, no deferred decisions. Time yourself: most people complete a full Desktop clear in 20–40 minutes.
4
Working through Downloads

Downloads is usually larger and less emotionally charged than the Desktop — which makes it easier to work through quickly. Sort by Date Modified (oldest first) and apply a simple rule: anything older than 30 days that you haven't opened recently gets deleted or archived without further review.

The Downloads folder is not storage. It's an arrival zone. Its purpose is to hold things briefly while you decide what to do with them — not to hold them permanently.

  • Work through oldest-first to avoid getting stuck in recent files that feel more relevant
  • Installer files older than 6 months: delete — you'll re-download if you ever need them again
  • Compressed/zip files you've already extracted: delete the zip, keep what was inside if needed
  • Anything you remember downloading but have already used: delete

Goal: Downloads should contain only items from the last 7 days by the time you finish.

🗑️
Your actionSort Downloads by Date Modified, oldest first. Delete everything older than 30 days that isn't worth keeping. File anything worth keeping into your folder structure. Target: only last 7 days of downloads remaining.
5
Setting the rule going forward

The Desktop and Downloads stay clean with one rule: nothing is allowed to live in either folder for more than 7 days. During your weekly filing habit (Day 14), both get cleared completely. That's the maintenance that prevents today's work from needing to be repeated in six months.

Some people find it helpful to set their browser's download location to a folder that's visible and separate — a dedicated "Inbox" folder on the Desktop or in Documents — rather than the generic Downloads folder. This makes new arrivals more deliberate and visible. Try it if the Downloads pile is a recurring problem.

Key takeaway
A clear Desktop isn't aesthetic vanity — it's the most immediate visible proof that your file system is working. Once you see it empty, you'll understand why keeping it that way matters.
Day 10

The Documents deep clean

Your Documents folder is probably full of things you haven't opened in years. Today you find out what's actually worth keeping.

The 80/20 rule applies reliably to documents: roughly 80% of what you've saved you'll never open again, but 20% genuinely matters and needs to be findable. The Documents deep clean isn't about deleting everything — it's about getting the important 20% properly organised and into your new structure, while clearing out the rest.

Today you go through your entire Documents folder methodically. Most people find documents they'd completely forgotten, a few they're genuinely glad they kept, and a large volume they're comfortable deleting.
1
Sort by date — oldest first

Open your Documents folder and sort by "Date Modified," oldest first. This is the most important step: starting with the oldest files removes the emotional weight of deciding about recent things you might still need. Anything untouched for 2+ years has survived without you needing it — which is usually a reliable signal.

The test for every file, regardless of age: "If my laptop was stolen tonight, would this be on the list of things I'd want recovered?"

  • If yes, definitely → file it into your new structure
  • If probably not → archive it (Archive folder)
  • If definitely not → delete it
  • If you genuinely don't know → open it, spend 10 seconds, then decide
2
How to handle common document types

Different file types have different patterns — here's guidance on the most common:

  • Tax returns and financial records: Keep everything from the last 5 years. File into Finance. Records older than 5 years can usually be archived — check your country's requirements, but most tax authorities require a maximum of 5–7 years.
  • Work documents from old jobs: If you left the job more than 2 years ago, most of it can be archived or deleted. Keep: reference material you still consult, work samples you use in a portfolio, anything with ongoing legal relevance. Delete: day-to-day files, meeting notes, old project briefs.
  • Old CVs and cover letters: Keep the most recent version. Archive or delete everything else — your new CV will be built from scratch anyway when you need it.
  • Photos saved as documents: Move them to your Photos folder or the appropriate album. Don't leave personal photos in Documents.
  • PDF manuals and instructions: Delete almost all of these. Manuals for appliances and electronics are always available on the manufacturer's website — there's no reason to store a PDF for a product you still own or have already replaced.
  • Half-finished personal projects: If it's been more than a year and you haven't returned to it, archive it. You're not going to finish it — and if you do, you'll find it in Archive.
📄
Your actionSort Documents by Date Modified, oldest first. Work through the folder applying the "stolen laptop" test to every item. File what matters into your six folders, archive the uncertain, delete the rest. Set a timer for 45 minutes and work until it goes off — you don't need to finish in one session.
3
Dealing with existing sub-folders

Many people have existing folder structures inside Documents — an old attempt at organisation that partially worked. Here's how to handle them:

  • If the old folder maps cleanly to one of your six new folders: Move the entire old folder inside the appropriate new one. You can refine the contents later.
  • If the old folder is a mix: Open it, quickly sort the contents into the right new folders, then delete the old folder shell.
  • If the old folder is clearly Archive material: Move the whole thing into Archive intact. You've just cleared it from your active space without having to make individual decisions.

Don't try to perfectly refile every document inside old sub-folders today. Get them into the right top-level folder, and the detail can be tidied over time.

4
What to do with documents you're afraid to delete

The Archive folder is specifically for this feeling. Use it without guilt. The purpose of Archive is to create a clear distinction between "active files I use" and "old files I'm keeping just in case" — without forcing a decision about permanent deletion.

A useful rule: once a year, open the Archive folder and delete anything in there that you haven't opened since you archived it. If it was in Archive for 12 months and you never needed it, you don't need it.

⚠️
Don't empty the Trash yetHold off on permanently emptying your Trash/Recycle Bin until the end of this week — once you've finished the full clean and had a few days to realise if anything important was deleted by mistake.
Key takeaway
The Archive folder is one of the most useful tools in this whole program. It lets you clear your active space without the anxiety of permanent deletion — use it generously, and trust it.
Day 11

Photos: the endless backlog

Most people have thousands of photos they've never looked at. Here's a system that actually works.

Photo organisation is the task that overwhelms people most reliably in this entire program. The reason isn't the volume — it's the emotional weight. These are memories. It feels wrong to delete them, which means most people delete nothing, sort nothing, and end up with a Camera Roll of 15,000 images that contains a lot of blurry, accidental, and duplicate photos alongside the ones that actually matter.

The goal today isn't to sort 15,000 photos. It's to put a system in place that stops the pile from growing, starts clearing the recent backlog, and creates a structure where the photos you actually care about are findable.
1
The two things that make photo management feel impossible

Understanding these makes the solution clearer:

Problem 1 — Volume

Smartphones take photos effortlessly and constantly. A single family event might generate 200 photos, most nearly identical. Nobody reviews and curates these in real time — so the pile grows unboundedly.

Problem 2 — Emotional friction

Deleting a photo feels like deleting a memory. This feeling isn't rational (the event still happened, and you almost certainly have 12 other shots of the same moment) but it's real — and it causes paralysis.

The solution to both is the same: don't try to review the entire archive. Focus on what's recent and build a habit going forward. The old backlog can wait — or be tackled in small sessions over months.

2
Understand where your photos actually live

Before organising, map where your photos are currently spread across:

  • Phone Camera Roll — the primary source for most people. Likely syncing automatically to cloud.
  • iCloud Photos / Google Photos — cloud copy of your Camera Roll, possibly with automatic organisation already applied.
  • Other cloud services — some people have photos in Dropbox, OneDrive, or both, from different periods.
  • Computer Photos app or Pictures folder — older photos imported from cameras or previous phones.
  • External hard drives — often contain photo archives from years ago that haven't been looked at since.

You don't need to consolidate all of these today — just know where everything lives. The most important action is to make sure your current Camera Roll is backed up, and to stop the current pile from growing without a system.

🗺️
Your actionNote how many photos are in your Camera Roll / primary photo library, and list every other place photos are currently stored. Don't try to count everything — just map the landscape.
3
The three-tier system

This structure works for most photo libraries — it's simple enough to maintain but meaningful enough to be useful:

  • Tier 1 — Camera Roll / Unsorted Inbox: Where new photos land automatically. This gets reviewed and cleared monthly — or at least every few months. Photos don't live here permanently.
  • Tier 2 — Organised Albums by Year and Event: The main library. Named with a consistent format: 2024 · Japan Trip, 2024 · Christmas, 2025 · New House. Within each album, keep the best 20–30% of shots and delete or leave the rest behind. These are the photos you'll actually look at.
  • Tier 3 — Favourites: The best 1–2% of everything. Photos you'd want on a wall, share with family, or print. Most photo apps have a Favourites or Starred feature built in. Using it creates a curated collection that's instantly accessible without scrolling through albums.
4
What to actually do today

Don't try to tackle the entire library. Do these specific things:

  1. Confirm your photos are backed up. If you use iCloud Photos or Google Photos with auto-backup enabled, you're covered. If not, enable it now — this is the single most important photo action you can take today. Settings vary by platform but the option is always in your phone's Settings or the Photos/Google Photos app settings.
  2. Create year albums for the last 3 years. In your Photos app, create albums named 2023, 2024, and 2025 (or whichever years are relevant). These are your starting structure.
  3. Sort the last 3 months of photos. Go through everything taken since roughly January and move the best shots into the appropriate year album. Delete duplicates, blurry shots, and screenshots that don't belong in your photo library.
  4. Star or favourite your top 10 photos from the last year. This starts your curated Favourites tier and takes less than 5 minutes.
📸
Your actionEnable auto-backup if not already on. Create year albums for the last 3 years. Sort your last 3 months of photos into albums, deleting obvious duplicates and blurry shots as you go. Then star 10 of your best photos from the past year.
5
What to do about the old backlog

You probably have thousands of unsorted photos from years ago. Here's the honest advice: don't try to sort them all at once. Attempting to review 10,000 old photos in a single session is how this task gets abandoned permanently.

Instead, adopt a gradual approach:

  • Once a month, spend 20 minutes reviewing one month of old photos — delete the obvious ones, star the best, create an album for the rest
  • Work backwards in time, one month at a time
  • At 20 minutes per month, you'll clear 5 years of backlog in about 12 months — without it ever feeling overwhelming

The goal today is to stop the pile from growing uncontrolled. The backlog will sort itself out gradually.

Key takeaway
Your photos are backed up, recent shots are sorted, and a sustainable structure is in place. The backlog clears itself over time with a monthly 20-minute habit. Today's work makes that possible.
Day 12

Cloud storage audit

Your cloud storage is probably a second mess you forgot you had — across multiple services that don't talk to each other.

Most people accumulate files across Google Drive, iCloud, Dropbox, and OneDrive with no clear purpose for each service. Files get saved to whichever is open at the time. The result: the same document in three places, photos stored in two cloud services that don't talk to each other, and storage limits approached on multiple paid accounts simultaneously.

Today you consolidate. One primary cloud service, a clear structure inside it, and specific single purposes for anything secondary. By the end of today, you should be able to find any cloud file without remembering which service it's in.
1
Why multiple cloud services create chaos

Cloud storage services seem interchangeable — they're all "the cloud." But practically, scattering files across multiple services means:

  • You can't search across all of them at once. Finding a file requires remembering which service it's in, then searching within that service. If you're wrong, you search again. This compounds every time you need a file.
  • Duplicates multiply unnoticed. Moving a file to "the cloud" and then forgetting which cloud creates silent duplication. You end up with the same file in multiple places, with no clear indication of which is current.
  • You pay for more storage than you need. If your files are spread across three services, you might be paying for upgraded storage on each — when consolidating would let you pay for just one.
  • Sharing and collaboration gets complicated. If you share files from different services depending on context, the people you share with have to manage multiple links and logins on their end.
2
Audit each service you use

For each cloud service you have an account with, check three things:

  • Storage usage: How much are you using, and how much of your quota is it?
  • What's actually in there: Spend 2 minutes browsing the top-level folder structure. Is it organised or a flat pile?
  • When you last added something: Sort by Date Modified to see if this service is actively used or abandoned.
Google Drive — check at

drive.google.com → Storage in left sidebar shows total usage. The Storage page (one.google.com/storage) shows a breakdown by service.

iCloud — check at

On iPhone: Settings → [your name] → iCloud → Manage Account Storage. On Mac: System Settings → Apple ID → iCloud → Manage.

Dropbox — check at

dropbox.com → click your avatar → Settings → Plan shows storage usage. The web interface shows your full folder structure.

OneDrive — check at

onedrive.live.com → storage indicator in left sidebar. Or on Windows: Settings → System → Storage → OneDrive.

☁️
Your actionCheck storage usage and folder structure on every cloud service you have an account with. Write down: service name, storage used/total, and whether it's actively used or mostly abandoned.
3
Choose your primary service

Pick one cloud service as your primary — the one where your important files live. The right choice depends on your ecosystem:

  • All-Apple household (iPhone + Mac): iCloud Drive is the natural choice — it's deeply integrated and requires no extra setup. Files appear automatically in Finder on Mac and the Files app on iPhone.
  • Mixed devices (Android phone + Windows laptop, or any mix): Google Drive or Dropbox are better choices — they have strong apps across all platforms and work consistently regardless of which device you're on.
  • Windows-first + Microsoft 365 user: OneDrive is integrated into Windows and Microsoft 365 apps — your Word and Excel documents save there automatically if you use the Microsoft apps.
  • Existing heavy user of one service: If you've been using one service for years and it has most of your files, that's your primary — migration cost outweighs the benefit of switching unless you have a specific reason.
4
Consolidate and apply your folder structure

Once you've chosen your primary service:

  1. Create your six-folder structure inside it — the same Work, Finance, Health, Home, Creative, Archive folders from Day 8. Your cloud primary and your local Documents should mirror each other.
  2. Move important files from secondary services into your primary. Open each secondary service and identify any files that matter. Download them and upload into the correct folder in your primary service.
  3. Delete or leave the secondary services empty. Once the important files are moved, leave secondary services empty and unused — or close the accounts if you're confident you no longer need them.
  4. Assign specific single purposes to anything you keep. If you keep Dropbox because you use it to share files with specific people, that's fine — but it should have one specific job, not be a general file dump.
🔄
Your actionChoose your primary cloud service. Create your six-folder structure inside it. Move any important files from secondary services into the right folders in your primary. If secondary services are now empty or near-empty, consider whether you still need the accounts — or if they're just adding a subscription cost.
5
Check whether you're overpaying for storage

Once consolidated, you may find you no longer need upgraded storage on one or more services. Storage tiers to be aware of:

  • Google One: Free tier is 15GB (shared across Gmail, Drive, and Google Photos). Paid starts at 100GB.
  • iCloud+: Free tier is 5GB (almost always not enough for photos). Paid starts at 50GB.
  • Dropbox: Free tier is 2GB — very limited. Paid plans start at 2TB, which is expensive if you don't need it.
  • OneDrive: Free tier is 5GB. Microsoft 365 subscriptions include 1TB.

If consolidating means you can drop from a paid storage tier to a free one on a service you're keeping as secondary (or cancelling), note that on your subscription list from Day 5 — it's money to recover in Week 4.

Key takeaway
One primary cloud service with a clear structure beats four half-used ones. Consolidation doesn't just tidy things up — it makes your files reliably searchable and your backup situation dramatically simpler.
Day 13

The backup you probably don't have

If your laptop was stolen tonight, what would you lose forever? Most people have never set up a proper backup.

Here's the uncomfortable truth about backups: most people only set one up after losing something important. A failed hard drive, a stolen laptop, a phone dropped in water, a ransomware attack — these are the events that motivate backup behaviour. But by then, it's too late for the data that's already gone.

The cloud sync you probably already have is not a backup. Understanding this distinction — and setting up a real backup today — is one of the most genuinely protective things in this entire program.
1
The critical difference: sync vs. backup
Sync (what most people have)

iCloud, Google Drive, Dropbox — these mirror your files to the cloud. If you delete a file, the deletion syncs. If ransomware encrypts your files, the encrypted versions sync. Sync protects against hardware failure, but not against accidental deletion or malware.

Backup (what you need)

A separate, independent copy that doesn't mirror changes automatically. If you delete something, the backup still has it. If you're hit with ransomware, the backup is unaffected. Backup protects against everything sync doesn't.

Think of it this way: sync keeps files accessible across devices. Backup keeps files safe from yourself, from accidents, and from malicious software.

2
The 3-2-1 rule

The standard backup framework used by IT professionals worldwide:

3
copies of anything important
2
different storage types (e.g. laptop + external drive)
1
stored off-site (cloud counts for this)

In practical terms for most people: your working files on your laptop + cloud sync for accessibility + an external drive or dedicated backup service for true backup. Two of those three copies should be independent — meaning a single event (fire, theft, ransomware) can't take out both at once.

You don't need a complex or expensive setup. You need at least two genuinely independent copies of anything you'd be devastated to lose.

3
Back up your phone photos first

For most people, the photos on their phone are the single most irreplaceable category of data — and the most at-risk. Enable automatic cloud backup right now if you haven't already:

  • iPhone — iCloud Photos: Settings → [your name] → iCloud → Photos → turn on "Sync this iPhone." This uploads every photo to iCloud as it's taken. Ensure you have enough iCloud storage — the free 5GB is usually not sufficient if you take photos regularly.
  • iPhone — Google Photos (alternative or addition): Download the Google Photos app → open it → Backup settings → turn on Backup. Google Photos gives you 15GB free and offers higher-resolution storage options. This is a great second backup layer for photos.
  • Android — Google Photos: Open Google Photos → tap your profile picture → Photos settings → Backup → turn on Backup.
📱
Your actionOpen your phone settings and confirm photo backup is enabled. Check that backup is actually running (not paused due to storage limits). If it's not enabled, turn it on now — this takes 2 minutes and protects years of photos.
4
Back up your computer

Computer backup options, from simplest to most comprehensive:

  • Mac — Time Machine (built-in, free): Plug in an external hard drive → System Settings → General → Time Machine → Add Backup Disk. Time Machine automatically backs up everything hourly, keeping older versions for weeks. This is the easiest complete backup solution for Mac users. An external drive costs roughly $80–$150 for 1–2TB.
  • Mac — Backblaze (cloud, ~$10/month): An online backup service that automatically backs up your entire computer to the cloud in the background. Unlike sync services, it's a true backup — changes don't overwrite previous versions. Worth it if you don't want to manage an external drive.
  • Windows — File History (built-in, free): Settings → Update & Security → Backup → Add a drive. Backs up your personal files to an external drive automatically.
  • Windows — Backup and Restore: For a complete system backup (operating system included), use Control Panel → Backup and Restore (Windows 7) — still available in Windows 10 and 11.
💾
Your actionChoose one of the above options and set it up today. The goal is to have your computer automatically backing up without you having to think about it. If you don't have an external drive, either order one or set up a cloud backup service. Don't leave today without something running.
5
What counts as "irreplaceable" — know what to prioritise

Not everything needs the same level of backup redundancy. Focus on:

  • Photos and videos — irreplaceable by definition. Should have at least two independent copies.
  • Important documents — tax records, contracts, medical records, passports (scans), financial records. At least two copies, one off-site.
  • Creative work — writing, design files, music projects, anything you've made. Back up to cloud + local external drive.
  • Less critical: Downloaded music and movies (re-downloadable), application files (re-installable), things that exist elsewhere on the internet.
Key takeaway
A backup isn't something you set up after losing data. It's the thing that means you never have to find out what losing data actually feels like. Today's 20-minute setup provides protection that lasts indefinitely.
Day 14

Week 2 review: your storage system

Close out the week with a clean file system, a working backup, and the 10-minute habit that keeps it that way.

You've built a working file system this week — a structure that could survive a fresh laptop, that you could explain to someone in two minutes, and that you'll still be using in a year because it's simple enough to actually maintain.

Today you verify the work, run the 30-second test from Day 3, and set up the weekly habit that keeps everything in order. Without this last step, the clean system you've built this week will slowly return to chaos — the weekly habit is what makes this week's effort permanent.
1
Verify what you've built this week

Work through this checklist. For anything you haven't done yet, do it now — most items are quick to complete:

Six-folder structure created (Day 8) — Work, Finance, Health, Home, Creative, Archive exist in your Documents directory (and ideally mirrored in your primary cloud storage)
Desktop cleared to zero (Day 9) — no files on the Desktop except any system aliases or drive icons your OS requires
Downloads cleaned (Day 9) — only items from the last 7 days remain; everything older has been filed, archived, or deleted
Documents sorted (Day 10) — files moved into appropriate folders, old content archived or deleted, no flat pile at the top level
Photos backed up and recent 3 months sorted (Day 11) — auto-backup is on, year albums created, last 3 months sorted, 10 photos starred as favourites
Cloud storage consolidated (Day 12) — one primary service chosen, folder structure applied, important files from secondary services moved over
Backup running (Day 13) — phone photos auto-backing up to cloud, computer backing up to external drive or cloud backup service
2
Run the 30-second test

On Day 3, you ran this test on your original chaotic system. Run it again now on your new one. Without using the search function, try to find each of these in under 30 seconds:

  • Your most recent tax return or a key financial document
  • A photo from a specific event in the last 12 months
  • A work document you created in the last 3 months

If any of these take longer than 30 seconds or require search, note where the gap is. The folder structure may need a slight adjustment — or there's a category of files that hasn't been filed into the right place yet. Fix what you find.

⏱️
Your actionRun the three-item 30-second test right now. If all three are findable in under 30 seconds without search, your file system is working. If not, identify the gap and fix it before moving on.
3
Set up the weekly Digital Filing habit

This is the most important step of the entire week. Without a maintenance habit, the clean system you've just built will return to chaos within 3 months. With one, it stays clean indefinitely.

The weekly Digital Filing habit takes 10 minutes and covers three things:

  • Clear Desktop and Downloads — apply the three-decision rule to everything that's landed since last week. File, archive, or delete. Both should be empty by the end of this step (3–5 minutes).
  • Sort any new photos — move this week's best photos into the right year album, delete obvious duplicates or blurry shots (2–3 minutes).
  • File loose documents — anything that arrived this week (email attachments saved, new downloads worth keeping) goes into the right folder (2 minutes).

That's it. 10 minutes, once a week, and your system stays working.

📅
Your actionSet a recurring weekly calendar event right now. Pick a specific day and time you will actually keep — Sunday evening, Friday afternoon, Monday morning. Label it "Digital Filing — 10 min." Then run through the three steps once right now, today, as your first session. Starting with the habit today means it already exists — you're maintaining it rather than starting it.
4
Compare your before and after from Day 3

Look back at the numbers you wrote down on Day 3:

  • Desktop item count — vs. zero today
  • Downloads item count and oldest item age — vs. 7 days today
  • Documents situation — vs. a structured folder system today
  • Cloud storage situation — vs. one primary service with a clear structure today

This comparison matters because it's concrete evidence of what a week of structured effort produces. You built a system from nothing in seven focused sessions. The next two weeks do the same for your security and your communications.


Week 2 complete

Your file system is now a system

Folder structure builtSix folders, three-click rule — simple and sustainable
Desktop and Downloads clearedZero on Desktop, last 7 days only in Downloads
Photos organised and backed upAuto-backup on, year albums created, recent 3 months sorted
Backup runningTwo independent copies of irreplaceable data — phone and computer
Cloud consolidatedOne primary service, clear structure, no scattered duplicates
Weekly habit set10 minutes every week — the thing that makes all of this permanent
Next week: Accounts and security. You know the scope of your account footprint from Week 1 — now we fix the passwords, enable proper authentication, and close the doors that are still open.
3WK

Accounts, Passwords & Security

Lock the doors you didn't know were open

Passwords · 2FA · Old accounts · Privacy
0 / 7 complete
Day 15

The password problem, honestly

Password reuse is what actually gets people hacked — not weak passwords.

Most people think about password security the wrong way. The threat isn't someone sitting in a dark room trying to guess your password one attempt at a time. That almost never happens. The real threat is data breaches — when a company you've registered with gets hacked and millions of usernames and passwords are stolen simultaneously and sold online.

Password strength matters less than password uniqueness. If you reuse a password across multiple sites, a single breach at any of those sites compromises every account that shares it. A unique "weak" password is safer than a strong password used on 30 sites.
1
How credential stuffing actually works

Here's the actual attack chain that compromises most accounts:

  1. A site you registered with years ago gets breached. Your email and password are in the leaked database.
  2. That database gets sold on the dark web for a few hundred dollars. Automated tools download it.
  3. Those tools try your email/password combination on hundreds of other popular sites — Gmail, banking, Amazon, PayPal — automatically, thousands of attempts per minute.
  4. If you reused that password anywhere, those accounts are now compromised too — and you won't know until something goes wrong.

This process is called credential stuffing, and it's responsible for the overwhelming majority of account compromises. No hacking skill required — just an automated tool and a stolen database.

2
Check your actual breach exposure
🔐
Have I Been Pwned
Free service run by security researcher Troy Hunt — trusted by governments worldwide. Checks your email against billions of leaked credentials from known breaches.
haveibeenpwned.com

When you check your email, the results tell you which specific services were breached and when. Read each one carefully — if a breached service used a password you still use anywhere, that password needs to change today.

🔍
Your actionCheck every email address you use on haveibeenpwned.com. For each breach result, note the service name and what was exposed. If you recognise the password you used there and still use it anywhere, write it down — you'll change it tomorrow when the password manager is set up.
3
The maths problem that makes memorisation impossible

The reason most people reuse passwords isn't laziness — it's that the alternative (unique passwords everywhere) was genuinely impossible before password managers existed.

100+
Average number of online accounts per person
0
Passwords the human brain can reliably remember that are both unique and strong

This isn't a memory problem — it's a mathematical reality. You cannot memorise 100 unique, strong passwords. Nobody can. The solution isn't to try harder. The solution is a password manager, which turns the impossible into trivial: one strong password to remember, and the manager generates and remembers unique ones for everything else.

4
What "strong" actually means

Common password advice is often focused on the wrong things. Here's what actually matters:

✗ Doesn't actually help much

Adding an exclamation mark or replacing letters with symbols (p@ssw0rd). Using the same password everywhere but making it "complex." Changing passwords on a regular schedule without a reason.

✓ What actually matters

Uniqueness — a different password for every single site. Length — longer passwords are exponentially harder to crack. Randomness — not words associated with you, your pets, or your family.

A password manager generates truly random passwords automatically — something like Xk9#mL2@pQr7 — and you never need to see or remember it. The manager fills it in for you.

Key takeaway
Password reuse is the single biggest password security vulnerability most people have. Tomorrow you'll set up the tool that makes fixing it straightforward — and removes the problem permanently.
Day 16

Setting up a password manager

You don't need to remember passwords. You need to remember one good one.

A password manager stores all your passwords in an encrypted vault that only you can unlock. You remember one strong master password — the manager handles generating, storing, and filling in unique passwords for everything else. It's not just more convenient than trying to remember them all: it's provably more secure than any system you could build yourself.

This is the single highest-impact security action in the entire program. Twenty minutes of setup today provides protection that works silently in the background for years.
1
Choose your password manager

There's no single "best" option — the right choice depends on your devices and whether you want to pay. All four of these are trustworthy and widely used:

  • Bitwarden (free, open source) — the top recommendation for most people. Free tier is genuinely full-featured. Syncs across all devices. Open source means the code is publicly audited by the security community. Available on all platforms. Start here if you're undecided.
  • 1Password (~$3–5/month) — the most polished option. Excellent apps on all platforms, great family sharing, clear interface that's easy to get started with. Worth paying for if you want the most friction-free experience.
  • Apple Passwords / iCloud Keychain (free, built-in) — seamless on iPhone and Mac, no extra app needed. Works well if you're entirely within the Apple ecosystem. Weaker if you use Windows or Android alongside Apple devices.
  • Google Password Manager (free, built-in) — works best if you use Chrome across all your devices and are invested in the Google ecosystem. Accessible at passwords.google.com.

If you're already using your browser's built-in password saving, note that this is better than nothing — but a dedicated manager gives you far more control, works across all browsers and apps, and has a proper security model for master password protection.

2
Create your master password — the right way

Your master password is the one password you'll actually need to remember. Make it strong but memorable using a passphrase — four or more random, unrelated words strung together:

  • correct-horse-battery-staple — the classic example (don't use this one)
  • purple-envelope-mountain-jazz — random, memorable, extremely strong
  • lamp-river-telescope-friday — the randomness of the combination is what makes it secure

A four-word passphrase is vastly stronger than a "complex" 8-character password with symbols. Length beats complexity. A 20-character passphrase is effectively uncrackable even with modern hardware.

⚠️
Write it down and store it physicallyYour master password is the one exception to "don't write passwords down." Write it on paper and keep it somewhere physically secure — a locked drawer, a safe, or with important documents. If you forget it, access to your vault is gone permanently. The paper copy is your recovery plan.
3
Install and set up today

The setup process for any manager follows the same basic steps:

  1. Create an account at the manager's website using your email address and your new master passphrase
  2. Download the browser extension — this is what fills in passwords automatically on websites. Install it in every browser you use.
  3. Download the mobile app and log in — enables autofill on your phone
  4. Enable biometric unlock (Face ID, fingerprint) on your phone — so you don't have to type the master password every time on mobile

For Bitwarden specifically: bitwarden.com → Create Account → download the extension for your browser → download the iOS or Android app → log in on both.

🔑
Your actionChoose a manager, create your account with a strong passphrase, install the browser extension and the mobile app. Then add your 10 most-used accounts: email, banking, and the next 8 most important. These don't need new passwords yet — just get them into the vault so the habit of opening the manager starts forming.
4
Importing from your browser

If your browser has saved passwords already, most password managers can import them directly — which saves manually adding each one:

  • Chrome → Bitwarden: Chrome: Settings → Passwords → Export passwords (saves a CSV). Bitwarden: Tools → Import Data → select Chrome CSV format. All your passwords import in one step.
  • Safari → 1Password or Bitwarden: Safari: Settings → Passwords → select all → Export (or use File → Export in the Passwords app on Mac). Then import the CSV into your manager.
  • Firefox: about:logins → three-dot menu → Export Logins → import the resulting CSV into your manager.

After importing, delete the exported CSV file — it contains all your passwords in plain text and shouldn't sit in your Downloads folder.

Key takeaway
The password manager is now your security foundation. Every new account you create from today gets a unique, generated password saved in the vault. The old ones get fixed over the next two days.
Day 17

Fix your most critical passwords first

Not all passwords are equal. Fix the ones that matter most today, and work outward from there.

You don't need to update every password today — and trying to update 150 passwords in one session is how this task gets abandoned halfway through. What you need is a clear priority system: fix the accounts where a breach would cause real, serious damage first, then work outward methodically.

Email gets fixed first. No exceptions. Everything else follows.
1
Why email is the master key to your entire digital life

Your email account isn't just one of many accounts — it's the recovery mechanism for every other account you have. Almost every service on the internet uses "forgot password → send reset email" as the account recovery flow. If someone has access to your email, they can reset the password on any account you own, in any order, in seconds.

A compromised email account means: compromised banking, compromised social media, compromised everything. It's why every security expert, every guide, and every security course says the same thing: email first, always.

⚠️
Email security before anything elseBefore you update a single other password today, your email must have: (1) a unique, strong password stored in your manager, and (2) two-factor authentication enabled. Both. Without 2FA, even a strong unique password can be bypassed through other means. Day 18 covers 2FA — plan to complete both days back-to-back.
2
The priority tiers

Work through accounts in this order. Complete each tier before moving to the next:

  • Tier 1 — Fix today (the critical four):
    • Your primary email account (and any secondary email accounts)
    • Online banking and investment accounts
    • Any accounts with saved credit/debit card details (Amazon, PayPal, major retailers)
    • Government accounts (tax portal, MyGov, Medicare — anything linked to your identity)
  • Tier 2 — Fix this week:
    • Private health insurance and health-related accounts
    • Social media (Facebook, Instagram, LinkedIn, Twitter/X) — these can be used for identity attacks
    • Work accounts and any professional platforms
    • Telecommunications (your phone provider account controls your phone number, which is often used for SMS 2FA)
  • Tier 3 — Fix gradually:
    • Forums, community sites, newsletters
    • Apps and services you use occasionally but have no payment details saved
    • Old accounts you found in the Day 2 audit that you'll be deleting anyway in Day 19
3
How to change a password correctly

The process for every account is the same:

  1. Log into the account using your existing password
  2. Go to Security settings or Account settings → Change password
  3. In your password manager, click "Generate" to create a new unique random password (aim for 16+ characters)
  4. Paste the generated password into the "New password" field
  5. Save it in your password manager before confirming the change — confirm the change only after it's saved
  6. Log out and log back in using the manager to confirm the autofill works

The last step matters: testing autofill immediately means you'll catch any saving errors before you're locked out.

🔐
Your actionUpdate all Tier 1 passwords today using your password manager to generate and save each new one. At minimum: your email account and your banking accounts must have unique, generated passwords in your manager before today is done. Then work through as many Tier 2 accounts as time allows.
4
Check for weak and reused passwords in your manager

Most password managers have a built-in security audit that flags weak, reused, and breached passwords automatically:

  • Bitwarden: Tools → Reports → shows Exposed Passwords, Reused Passwords, and Weak Passwords reports
  • 1Password: Watchtower (in the sidebar) — highlights vulnerable passwords with specific categories
  • Apple Passwords: Settings → Passwords → Security Recommendations — flags reused and compromised passwords
  • Google Password Manager: passwords.google.com → Check Passwords — runs a breach check automatically

Use this report to identify which accounts in your vault still have reused or weak passwords — these become your Tier 2 and 3 priority list for the rest of the week.

Key takeaway
Email first. Always email first. Every other account recovery runs through it — which means securing your email is the single action that protects everything downstream.
Day 18

Two-factor authentication: the second lock

Even a perfect password can be stolen. 2FA means a stolen password alone isn't enough to get in.

A strong unique password is a good lock on your front door. Two-factor authentication (2FA) is a deadbolt. Even if someone steals your password — through a breach, a phishing email, or malware — they still can't access your account without the second factor, which is typically a code generated on your physical phone.

Enabling 2FA on your email is the single highest-impact security action you can take. It takes five minutes and protects your entire digital life through the same logic as yesterday's email-first rule: secure your email, and everything downstream is harder to compromise.
1
How 2FA works

When 2FA is enabled, logging in requires two separate proofs of identity:

  1. Something you know — your password
  2. Something you have — your phone (which generates or receives the code)

An attacker who steals your password from a breached database is on the other side of the world. They don't have your phone. Even with the correct password, they can't pass the second step — so the account stays locked.

This is why 2FA is so effective: it turns a password breach from "your account is compromised" to "your account is still safe, and you know someone tried to get in."

2
SMS codes vs Authenticator apps — what's the difference
✓ Authenticator app (strongly preferred)

Codes are generated locally on your device — they never travel over the network. Even if your phone number is hijacked, the codes are unaffected. Free apps: Google Authenticator, Microsoft Authenticator, Authy. Also built into 1Password and Bitwarden.

↑ SMS codes (good, not perfect)

A code is texted to your phone number. Vulnerable to SIM-swapping attacks (where someone convinces your carrier to transfer your number to their SIM). Still far better than no 2FA — use it wherever authenticator apps aren't supported.

For most people, the practical guidance is: use an authenticator app for your most critical accounts (email, banking), and SMS 2FA for everything else. Either option is dramatically better than password-only security.

3
Enable 2FA on your email — step by step

The exact steps vary by provider:

  • Gmail: myaccount.google.com → Security → 2-Step Verification → Get Started. Google offers SMS, Google Prompt (approve on your phone), and Authenticator app. Choose Authenticator app for strongest security.
  • Outlook / Microsoft: account.microsoft.com → Security → Advanced security options → Two-step verification. Supports SMS, Microsoft Authenticator app, and hardware keys.
  • Apple ID: appleid.apple.com → Sign-In and Security → Two-Factor Authentication. Apple uses its own system — a code sent to your trusted Apple devices. Already enabled on most recent Apple accounts.
  • Yahoo Mail: account.yahoo.com → Security → Two-step verification.

When setting up an authenticator app, the service shows you a QR code. Open your authenticator app, tap the "+" or "Add account" button, and scan the QR code. The app will then generate a fresh 6-digit code every 30 seconds — enter this code when prompted during login.

🛡️
Your actionEnable 2FA on your primary email account right now. Use an authenticator app if possible. Then enable it on your banking accounts and any other Tier 1 accounts that support it. Save any backup codes the service provides — store them in your password manager or print and keep physically.
4
Backup codes — the safety net you must not skip

When you enable 2FA, most services offer you a set of one-time backup codes. These are for emergencies: if you lose your phone, these codes let you get back into your account without the authenticator app.

You must save these. The recommended approach:

  • Save them as a secure note inside your password manager (most managers have a secure notes feature)
  • Print a copy and keep it with your important documents or in a safe
  • Do not save them in a plain text file on your Desktop — that defeats the purpose

People who lose access to their accounts after enabling 2FA almost always skipped this step. The backup codes are your fallback. Keep them.

5
Which other accounts should have 2FA

After email and banking, prioritise 2FA on these account types:

  • Social media — Facebook, Instagram, LinkedIn, Twitter/X can all be used for identity fraud and phishing attacks against your contacts
  • Cloud storage — your Google Drive or iCloud account contains documents, photos, and potentially sensitive files
  • Your password manager — if your manager is compromised, everything is. Most managers support 2FA and it should be enabled.
  • Telecommunications — your phone provider account controls your phone number. Someone who can change your number can bypass SMS-based 2FA on other accounts.

A useful resource: twofactorauth.org lists which services support 2FA and what types they support.

Key takeaway
2FA on your email makes you meaningfully harder to compromise than the vast majority of people online. Five minutes of setup today, years of protection. This is the security upgrade with the best effort-to-impact ratio in the entire program.
Day 19

The old account purge

Every old account you've abandoned is an unlocked door you forgot about. Today you start closing them.

Every old account you've abandoned is still a real, active account. It holds your email address, often a reused password, sometimes your date of birth, your address, and occasionally saved payment details. When that service gets breached — and statistically, the more accounts you have, the more likely at least one will be breached — your data is exposed whether you remember the account exists or not.

Abandonment is not the same as deletion. An abandoned account is an open door you just stopped checking. Deletion closes it permanently.
1
Why deleting old accounts matters more than people realise

Here's what an abandoned account actually represents:

  • A reused password sitting on a server you don't control. If you created the account more than 3 years ago, it almost certainly uses a password you've used elsewhere. When that service is breached, that password is now in the wild.
  • Personal information that never goes stale. Your email address, date of birth, and name are permanently useful to identity thieves — and they don't expire.
  • A potential account takeover vector. Old accounts on legitimate platforms can be hijacked and used to send phishing messages to your contacts, impersonate you, or be used in fraud schemes.
  • Data that gets sold without your knowledge. Many companies sell user data to third parties. Old accounts from companies you've stopped using may still be actively monetising your information.
2
Find your old accounts

Use the same methods from Day 2 of Week 1, but this time you're acting on what you find:

  • Email search: Search your inbox for "welcome to", "verify your email", "thanks for registering", "your account". Each result is a potential old account.
  • Browser saved passwords: Open your password manager or browser password list and look for services you don't recognise or haven't used in years.
  • "Sign in with Google/Apple" list: myaccount.google.com → Security → Third-party apps with account access. appleid.apple.com → Sign In with Apple. These show services you've connected to using your identity provider.
  • Breach results from Day 2: Any service that appeared in your haveibeenpwned.com results is a good candidate for deletion — it's already been compromised, so closing it removes a confirmed vulnerability.
🔍
Your actionSpend 10 minutes finding old accounts using the methods above. Make a list of at least 10 accounts you no longer use or need. Aim for accounts you haven't logged into in over a year.
3
How to actually delete accounts

Account deletion is deliberately made difficult by most services — they'd rather you stayed. Here's how to navigate it:

🗑️
JustDeleteMe
Directory of direct links to account deletion pages for hundreds of services, colour-coded by difficulty (Easy, Medium, Hard, Impossible)
justdeleteme.xyz

The general process for deleting any account:

  1. Log in (use your password manager — the password may be saved there)
  2. Go to Account Settings or Privacy Settings
  3. Look for "Delete Account," "Close Account," or "Deactivate" — it's usually buried in Advanced or Privacy sections
  4. If you can't find it, search "[service name] delete account" — or check justdeleteme.xyz for the direct link
  5. Some services require you to email support requesting deletion — note these and send the emails today
  6. Some services have a "cooling off" period (30–90 days) before the account is permanently deleted. Start these first.
🔒
Your actionDelete at least 5 old accounts today. Use JustDeleteMe to find the deletion page faster. For any service that requires an email request, send it now. Aim for 10 total — but 5 real deletions today is meaningful progress.
4
What to do with accounts you're not ready to delete

Some accounts are harder to close cleanly — you're not sure if you'll need them, or they hold data you want to export first. For these:

  • Export your data first. Most major platforms (Facebook, Google, Instagram, Twitter) offer a "Download your data" option in settings. Use it before deletion if you want to keep any content.
  • Revoke third-party app access instead of deleting. For services connected via "Sign in with Google/Apple," revoking the app's access (without deleting the account) immediately stops data sharing, even if you're not ready to fully close the account.
  • Make a "delete later" list. For accounts you want to delete but need more time on — note them down and set a reminder for 2 weeks from now to actually go through with it.
Key takeaway
Every account you delete is an unlocked door permanently closed. You don't need to delete everything today — but every deletion you do complete removes a real, concrete piece of your exposure from the internet.
Day 20

Privacy checkup: what apps know about you

You've granted more permissions than you remember. Today you take some back.

Every app on your phone has had opportunities to ask for permissions — access to your location, contacts, camera, microphone, calendar, and health data. Most people tap "Allow" in the moment because the app needs it right now to function. What they don't do is revisit those permissions later, when it turns out the app accesses location at 3am or reads your contacts even when you haven't opened it in months.

Today you audit what's been granted and take back what shouldn't have been given. This isn't paranoia — it's informed, intentional data sharing.
1
Start with location — the most revealing permission

Location data is the most commercially valuable permission on your phone. It tells companies where you live, where you work, what shops you visit, when you're home and when you're not, where you travel, and who you spend time with. "Always On" location access means an app can track all of this continuously, not just when you're actively using it.

Review location permissions now:

  • iPhone: Settings → Privacy & Security → Location Services. Every app appears here with its current permission level.
  • Android: Settings → Privacy → Permission Manager → Location. Shows apps with "Allow all the time" vs "Allow only while using."

For each app, ask: does this app need to know where I am when I'm not using it? Almost every app should be set to "While Using App" or "Never." The exceptions are genuinely rare:

  • Legitimate "Always" use: Navigation apps that need to reroute in the background, Find My (Apple), Google Maps if you use live location sharing with family, specific fitness trackers that record routes.
  • Should be "While Using": Weather apps (they check when you open them), ride-share apps (only need location when you're ordering a ride), restaurant or shopping apps, most social media apps.
  • Should be "Never": Games, productivity tools, news apps, any app where you cannot think of a single reason it would need your location.
📍
Your actionOpen your location permissions list and change every "Always" to "While Using" unless you can name a specific reason it needs background access. This change alone is one of the most meaningful privacy improvements you can make on your phone.
2
Audit camera, microphone, and contacts access

These permissions are less continuous than location but equally worth auditing:

  • Camera: Settings → Privacy & Security → Camera (iPhone) or Privacy → Permission Manager → Camera (Android). Any app that has camera access and shouldn't — social apps you no longer use, games, utilities — revoke it. The app will ask again if it genuinely needs it.
  • Microphone: Same path as Camera. Particularly worth checking: any app you don't actively use for voice calls or recording. A keyboard app, a shopping app, or a game doesn't need microphone access.
  • Contacts: Settings → Privacy & Security → Contacts. Many apps request contacts to help you "find friends" when you first install them. After that initial use, the permission is rarely needed again — but the app still has access to every phone number and email in your contact list.
  • Calendar: Worth checking if you don't remember deliberately granting this. Calendar access reveals your schedule, appointments, and sometimes location information.
🎤
Your actionGo through Camera, Microphone, and Contacts permissions. Revoke any app that has access and that you can't clearly justify needing it. When in doubt, revoke — the app will ask again if it genuinely needs it for a feature you want to use.
3
Review social media privacy settings

Social platforms have their own privacy settings separate from phone permissions — and the defaults are almost always set to maximum data collection and maximum audience visibility. A quick review of each platform you use:

  • Facebook: Settings & Privacy → Settings → Privacy. Check "Who can see your future posts" (Friends, not Public), "Who can look you up by email/phone" (Friends, not Everyone), and review which third-party apps have access to your account (Settings → Apps and Websites).
  • Instagram: Settings → Account → Private Account (if you want a private profile). Settings → Security → Apps and websites to review third-party access.
  • LinkedIn: Settings → Privacy → who can see your connections, who can see your profile, and whether your activity is shared. Recruiters can see a lot of LinkedIn data by default.
  • Google: myaccount.google.com → Data & Privacy. Review "Web & App Activity," "Location History," and "YouTube History" — these can be turned off or set to auto-delete after a period.
4
Ad tracking and data personalisation

Both iOS and Android have a system-level setting for ad tracking that limits how apps share your behaviour data with advertisers:

  • iPhone: Settings → Privacy & Security → Tracking → toggle off "Allow Apps to Request to Track." This tells all apps that you prefer not to be tracked across apps and websites. When disabled, apps cannot ask for tracking permission.
  • Android: Settings → Privacy → Ads → "Delete advertising ID" or "Opt out of Ads Personalisation." This resets your advertising identifier and limits personalised ad targeting.
🔒
Your actionEnable the ad tracking opt-out on your phone. Then pick one social platform and spend 5 minutes reviewing its privacy settings — adjust anything that feels more public or more tracked than you're comfortable with.
Key takeaway
Privacy is about intentional data sharing — granting access when there's a clear benefit to you, not by default whenever an app asks. Today's changes take 20 minutes and meaningfully reduce how much of your behaviour is tracked and shared without your ongoing awareness.
Day 21

Week 3 review: your security posture

Close the week knowing your accounts are locked, passwords fixed, and old doors shut.

Three weeks in. Your files are organised and backed up, your storage is consolidated, and your accounts are more secure than they've probably ever been. Week 3 specifically addressed the part of your digital life that has the most direct connection to real-world consequences — the security layer that protects everything else.

Today you verify, consolidate, and make sure everything from this week is actually in place before the final week begins.
1
Verify your Week 3 security checklist

Work through each item. If anything is incomplete, do it now — most items are 5–10 minutes to complete:

Password manager installed and set up (Day 16) — manager is installed on your phone and browser, master passphrase is written down and stored safely, at least 10 accounts are saved in the vault
Tier 1 passwords updated (Day 17) — email and banking accounts have unique, generated passwords stored in the manager; the password manager's security audit has been checked for reused/weak passwords
2FA enabled on email (Day 18) — two-factor authentication is active on your primary email; backup codes are saved in the password manager or stored physically
2FA enabled on banking (Day 18) — at least your primary banking account has 2FA enabled; ideally your password manager also has 2FA active
Old accounts deleted (Day 19) — at least 5 old accounts have been properly deleted (not just abandoned); "Sign in with Google/Apple" list has been reviewed and unused apps revoked
Phone permissions audited (Day 20) — location "Always" permissions changed to "While Using" where appropriate; camera, microphone, and contacts permissions reviewed; ad tracking opt-out enabled
2
Continue building your password vault

Your password manager is only as useful as the accounts you've added to it. Use today's session to get all Tier 2 accounts into the vault — not just saved with their current passwords, but with new unique generated passwords replacing whatever they had before.

Focus particularly on accounts that have saved payment details anywhere. Retail accounts, PayPal, any subscription services that bill you automatically — all of these should have unique passwords. If the breached service list from Day 15 included any of these, those specific accounts are your highest priority.

🔑
Your actionSpend 15–20 minutes today adding Tier 2 accounts to your password manager with new generated passwords. Target: health and insurance accounts, social media, and any online stores with saved card details. Every account you update today is a concrete improvement.
3
Set up ongoing password hygiene

Your password manager makes security maintenance much easier than it used to be — but there are a few habits worth setting now:

  • Use the generator for every new account. When you create any new account from today, generate a password in your manager first, paste it in, and save it. Never type a password manually that you'll need to remember — the manager handles it.
  • Review the security audit periodically. Most managers show a "Security Score" or equivalent that updates as you add accounts. Check it once a month and work through any newly flagged passwords.
  • Update passwords after breaches. Set up alerts at haveibeenpwned.com (free) to receive an email notification if your email address appears in a new breach. When a notification arrives, update that account's password immediately.
  • Never reuse a generated password. Even if you're creating a throwaway account for a one-time use, generate a unique password. The few seconds this takes is worth it.
4
What you've accomplished — the security picture now

Compare where you were at the start of Week 3 to where you are now:

Before Week 3

Reused passwords across most accounts. Email with no 2FA. Dozens of forgotten accounts holding your data. Every breach at any service was a potential cascade. App permissions you'd never reviewed.

After Week 3

Unique passwords on every critical account. Email protected by 2FA — a stolen password alone isn't enough. Old accounts deleted, reducing your breach exposure surface. App permissions audited and trimmed.

This isn't theoretical improvement. These are concrete structural changes to how your accounts work. The combination of unique passwords + 2FA on email means that the most common attack vectors — credential stuffing and account takeover — are no longer effective against your most important accounts.


Week 3 complete

Your digital security is now intentional

Password manager runningOne master passphrase, unique generated passwords for everything else
2FA on email and bankingA stolen password alone is no longer enough to compromise your most critical accounts
Old accounts deletedClosed doors, reduced breach exposure, fewer places your data sits unguarded
App permissions reviewedLocation, camera, microphone, and contacts trimmed to what's actually needed
Breach monitoring set upAlerts configured so future breaches are caught immediately
Security habits in placeGenerate-and-save for every new account, audit monthly, update after any breach notification
Next week: Communication, subscriptions, and the habits that make everything permanent. You'll reach inbox zero, cull your subscriptions, wipe old devices, and set up the 10-minute weekly reset. The final push.
4WK

Communication, Subscriptions & Habits

Quiet the noise and build the habits that keep it quiet

Inbox zero · Unsubscribing · Subscriptions · Lasting habits
0 / 7 complete
Day 22

The unsubscribe sprint

Your inbox is flooded because you said yes to too many mailing lists. Today, in 20 minutes, you say no.

The most effective way to fix your inbox permanently isn't to process emails faster — it's to stop so many of them arriving in the first place. Every marketing email that reaches your inbox had to be created, sent, and processed by you, even if only to delete it. Over years, that adds up to a significant drain on time and attention that you've normalised without noticing.

An hour of unsubscribing today has a compounding return that continues for years. Every list you leave is one less email per week, per month, forever. This is one of the highest-return sessions in the entire program.
1
The fastest ways to unsubscribe at scale

Different email clients handle unsubscribing differently. Use the fastest method available to you:

  • Gmail — List-Unsubscribe header (fastest): Open any marketing email. Next to the sender's name at the top, Gmail shows an "Unsubscribe" link in small text. Click it. You never leave Gmail, no confirmation needed. This uses the standard list-unsubscribe protocol that reputable senders are required to support.
  • Gmail — Sort by sender: In the search bar, type the sender's domain (e.g. from:@newsletter.com), select all matching emails, and archive or delete them all at once. Then unsubscribe from one email in the thread.
  • Apple Mail: Marketing emails show a "This message is from a mailing list — Unsubscribe" banner at the top. Click it for instant unsubscribe without opening the email body.
  • Outlook: Open the email → select Unsubscribe from the top toolbar, or scroll to the bottom of the email and use the unsubscribe link.
  • Scroll to the bottom: The fallback for any client — all legitimate marketing emails are legally required to include an unsubscribe link at the bottom. If there isn't one, mark as spam.
⚠️
Never click unsubscribe in a suspicious emailThe methods above are for legitimate mailing lists from companies you recognise. If an email looks phishing-like or comes from a sender you don't recognise at all — don't click the unsubscribe link. Mark it as spam instead. Unsubscribe links in phishing emails can confirm your address is active.
2
Start with your Day 4 noise list

On Day 4 of Week 1, you identified your top 5 sources of email noise — the senders whose emails you consistently delete without reading. Open your notes and start there. These are your guaranteed unsubscribes: you already decided you don't want them.

After those five, keep going. A useful triage process for every sender you land on:

  • Unsubscribe immediately: Any sender whose last 3 emails you haven't opened. No deliberation needed — your behaviour already made the decision.
  • Unsubscribe immediately: Any retailer or brand sending promotional emails. You can visit their website when you want to buy something. You don't need their marketing.
  • Consider keeping: Newsletters you genuinely read and get value from. Not ones you intend to read — ones you actually do. The "intend to" list is where most subscriptions live and die.
  • Definitely keep: Transactional emails — order confirmations, shipping updates, account notices, receipts. These aren't marketing and should stay.
📧
Your actionSet a 25-minute timer. Start with your top 5 noise sources from Day 4, then keep going. Aim for a minimum of 20 unsubscribes. Use the fastest method your email client supports. Keep a running count — it's motivating to watch the number climb.
3
Bulk-delete old marketing emails after unsubscribing

Once you've unsubscribed from a sender, delete their historical emails in bulk rather than one at a time:

  • Gmail: Search from:sender@domain.com → Select All → Select all conversations matching this search → Delete
  • Outlook: Right-click the sender in your inbox → Find Emails from [sender] → Select All → Delete
  • Apple Mail: Search for the sender → Select All (Cmd+A) → Delete

Doing this for your top 10 senders can remove hundreds or thousands of old emails from your inbox in minutes — dramatically reducing the volume you'll need to process on Day 24 when you reach inbox zero.

4
The rule going forward

Unsubscribing is only as effective as your future behaviour with new subscriptions. Two habits that prevent the pile from rebuilding:

  • The "three emails" rule: If a new sender delivers three emails in a row that you don't open, unsubscribe immediately. Don't let it sit for another month hoping you'll get around to it.
  • Be more selective at the source: When a website asks for your email, ask yourself whether you actually want marketing from them. Untick the marketing checkbox that comes pre-ticked on checkout forms. Use a secondary email address for sign-ups where you expect marketing and don't want to give your primary address.
Key takeaway
Every unsubscribe is a permanent reduction in incoming noise. Twenty today means twenty fewer sources of email for the rest of your life — and the inbox you'll process tomorrow is already quieter because of today's work.
Day 23

Building your email system

A good email system isn't about checking constantly — it's about processing decisively.

The fundamental mistake most people make with email is treating the inbox as three different things simultaneously: a to-do list (tasks that need action), a filing cabinet (emails to keep for reference), and an arrival zone (new mail coming in). When one folder serves all three purposes, nothing works well. You can't see what needs action, you can't find reference material, and the "new" is buried in the "old."

The fix is a simple decision system that processes each email exactly once — and routes it to the right place. Once the system exists, email stops accumulating and starts flowing.
1
The inbox has one job

Your inbox is an arrival zone — like a physical letterbox. Its only job is to temporarily hold mail that hasn't been dealt with yet. Nothing should live in the inbox permanently. When you open the inbox, you're not reading — you're processing. Every email gets handled and moved out.

This distinction changes how email feels. An inbox with 400 emails is overwhelming because you're looking at 400 things that all silently demand attention. An inbox with 0 emails is calm, because it means all mail has been looked at and routed appropriately — nothing is waiting for you to decide what to do with it.

2
The four-action rule

Every email gets exactly one of four actions applied to it. No email leaves the inbox without an action. No email sits in the inbox after being read:

Do it — if the email requires a response or action that takes under 2 minutes, do it immediately, then archive the email. Replying to a quick question, confirming an appointment, forwarding something — all done in the moment.
Delegate it — if someone else should handle it, forward it with a clear instruction ("Can you look into this?") and archive the original. Move the tracking copy to your Waiting folder if you need to follow up.
Defer it — if it requires action that will take more than 2 minutes, move it to your Action Required folder. Don't leave it in the inbox "to remind yourself" — that's how the inbox becomes a to-do list. The Action Required folder is your real to-do list.
Delete or Archive it — anything that requires no action and isn't worth keeping gets deleted. Anything you want to be able to find later gets archived (moved out of inbox into the searchable archive, not deleted). When in doubt between these two: archive. Storage is cheap and search works well.
3
Create your three support folders

You need three folders outside your inbox to make this work. Create them now in your email client:

  • Action Required — emails that need something from you that takes more than 2 minutes. This is your task list derived from email. Review it daily. When an action is complete, move the email to archive.
  • Waiting — emails where you're waiting on someone else to respond or act. Review this once a week and follow up on anything overdue. When the response arrives, archive both the original and the response.
  • Reference — emails worth keeping for future reference but requiring no action. Receipts you might need, instructions, important contacts, anything you'll want to search for. This folder accumulates over time and rarely needs reviewing — it's just a searchable archive for things that feel too important to delete.

These three folders, plus your main archive, handle everything. You don't need 20 folders. The search function handles finding things within the archive more reliably than folder navigation does.

📁
Your actionCreate these three folders in your email client right now — Action Required, Waiting, Reference. Then spend 15 minutes practising the four-action rule on the most recent 20–30 emails in your inbox. Process each one completely before moving to the next.
4
How to check email without it taking over your day

The other half of a working email system is frequency. Most people keep their inbox open all day and check it every few minutes — which means they're constantly interrupted, never finish tasks cleanly, and spend the day reacting rather than working or resting.

A more effective approach:

  • Set two or three fixed email times per day. Morning (processing overnight mail), midday (quick check), and late afternoon (clearing before end of day) works well for most people. Outside these times, the inbox is closed.
  • Turn off email push notifications on your phone. Real urgency is rarely communicated by email — that's what calls and messages are for. Email notifications create false urgency and interrupt the rest of your day.
  • Process to zero every time you open it. The goal of each email session is to reach zero in the inbox — not to "check" email. You're not browsing. You're processing.

This won't suit every job or situation — some roles genuinely require faster response times. But even reducing from "always open" to "checked four times a day" is a meaningful improvement in both focus and anxiety.

Key takeaway
The inbox is an arrival zone, not a to-do list. The moment you treat every email as a decision — Do, Delegate, Defer, or Delete — the inbox stops accumulating and starts working the way it was designed to.
Day 24

Reaching inbox zero (for real)

Today you actually do it — and it takes less time than you're expecting.

Today is the day you actually get to inbox zero. If you have thousands of unread emails, this sounds impossible — but it isn't, because of one critical insight: you don't have to read or process every old email. You can archive the entire backlog in one move.

Archiving is not deleting. Everything moved to archive is still searchable and accessible — it's just no longer in your inbox demanding attention. The distinction between "inbox" and "archive" is not about what you can access, it's about what still demands a decision from you.
1
Archive the old backlog — all at once

The fastest path to inbox zero is to archive everything older than a certain date in one action, then process only what's recent. Choose a cutoff — 3 months ago is a reasonable starting point. Anything older than that: if it genuinely needed action, it's already overdue and either forgotten or handled through other means. Archive it without reading it.

  • Gmail: In the search bar, type in:inbox before:2025/02/01 (adjust the date to 3 months ago). Click the checkbox to select all visible results, then click "Select all conversations that match this search." Click Archive. This archives potentially thousands of emails in under 10 seconds. Nothing is deleted — it all moves to All Mail and remains searchable.
  • Outlook: Click the Inbox folder → Sort by Date (oldest first) → Select the oldest email → hold Shift and click the email from 3 months ago → right-click → Archive. Or use the search filter: "Received: Before [date]" → select all → Move to Archive folder.
  • Apple Mail: Sort by Date Received, oldest first → Select the oldest email → hold Shift and click the email from your cutoff date → use Message → Move to → Archive (or press Ctrl+Cmd+A).
📥
Your actionArchive everything in your inbox older than 3 months in one action. Watch the inbox count drop dramatically. If the number goes from 4,000 to 200, that's 200 emails you actually need to look at — not 4,000.
2
Process what remains using the four-action rule

With the old backlog archived, you should now have somewhere between zero and a few hundred recent emails to work through. Apply yesterday's four-action rule to every single one — Do, Delegate, Defer, or Delete/Archive. Work from oldest to newest (bottom to top in most clients sorted by date).

Tips for processing efficiently:

  • Don't open emails to delete them. In most clients you can select and delete without opening — much faster.
  • Batch similar emails together. If you see five emails from the same sender you're going to archive, select all five and archive at once.
  • Don't get stuck on individual emails. If an email needs more than 2 minutes of thought to decide what to do with, defer it to Action Required and keep moving. The goal is processing speed, not perfection.
  • Newsletters you haven't unsubscribed from yet: Delete them. Don't read them. You had plenty of opportunity to read them and didn't — that's your answer.
3
Handle multiple email accounts

If you have multiple email accounts — personal, work, an old address you still receive mail on — apply the same process to each one. Work through one account at a time:

  1. Archive the backlog (anything older than 3 months)
  2. Process recent mail with the four-action rule
  3. Reach inbox zero for that account before moving to the next

For accounts you barely use: consider whether you need to keep checking them. If the old address mostly gets spam and you haven't sent a meaningful email from it in years, setting up a forwarding rule to your primary inbox (or simply unsubscribing from everything it receives and stopping checking it) is a legitimate option.

4
What inbox zero actually feels like — and how to maintain it

When you see an empty inbox for the first time, you'll likely feel two things: satisfaction, and a slight anxiety that you've missed something. That second feeling passes quickly. What you've actually done is moved everything into a state where it has been consciously handled — either acted on, delegated, deferred with intention, or archived.

Maintaining inbox zero going forward requires only two things:

  • Process each email session to zero. Every time you open your inbox, process until it's empty. If you have 12 emails from this morning, work through all 12 before closing. This takes 5–10 minutes at most when your inbox is already under control.
  • Review Action Required daily. Your Action Required folder is now your task list derived from email. Check it once a day and work through what's there. When something is done, archive it. When something's no longer relevant, delete it.
🎯
Your actionGet to inbox zero today. Archive the old backlog, process what's recent, and hit zero. If you run out of time, finish the session by archiving everything remaining — you can properly process things later. The goal is to experience the empty inbox at least once today.
Key takeaway
Inbox zero isn't about obsessively checking email — it's about having a system where nothing is waiting for a decision. Once you've experienced it, maintaining it takes about 5 minutes per session and the inbox stops feeling like a thing to dread.
Day 25

The subscription cull

That list you made in Week 1? It's time to act on it — and find out how much you're getting back.

Pull out your subscription list from Day 5 of Week 1. You spent time finding every recurring digital charge — and you flagged the ones you thought might be worth cancelling. Three weeks have passed. The decisions are almost always clearer now: you've either used those services or you haven't. The ones you haven't touched in three weeks are almost certainly ones you won't start using.

Today you act on the list. This is one of the most satisfying sessions in the whole program.
1
The one question that cuts through rationalisation

For each subscription on your list, ask exactly this: "Would I sign up for this today, knowing what I now know about how often I actually use it?"

Not "could I imagine using it more in the future." Not "it's only $X a month so it doesn't really matter." Not "I might need it for that project I'm planning." The question is specifically about today, with honest knowledge of your actual usage.

If the answer is no — cancel. The rationalisations that keep unused subscriptions alive are predictable:

  • "I might use it more." If you haven't in three months, you won't. Usage doesn't increase without a specific trigger, and "meaning to" is not a trigger.
  • "It's only $X/month." This is exactly the pricing psychology subscriptions exploit. $15/month feels trivial. $180/year feels like money. They're the same thing.
  • "I'd have to set it up again if I want it back." Most subscriptions can be restarted in 2 minutes. If you ever genuinely need it again, you'll restart it — and pay only from that point, not continuously for the months in between.
  • "Cancelling is a hassle." Almost all subscriptions can be cancelled in under 3 minutes. The ones that make it harder are exploiting friction deliberately — which is itself a reason to cancel.
2
How to cancel each type efficiently

Cancellation processes vary significantly by service. Here's what to expect:

  • App Store subscriptions (iPhone/iPad): Settings → [your name] → Subscriptions → tap the subscription → Cancel Subscription. This cancels billing immediately; you keep access until the current period ends.
  • Google Play subscriptions (Android): Google Play → Profile → Payments & subscriptions → Subscriptions → tap the subscription → Cancel subscription.
  • Direct website subscriptions: Log in → Account Settings or Billing → Cancel or Manage subscription. If you can't find it, search "[service name] cancel subscription" — most services have a help article with exact steps.
  • Services that make cancelling hard: Some services (gym apps, certain streaming platforms, Adobe) route you to a phone call or live chat to cancel. For these: have your cancellation reason ready ("I'm not using it enough"), decline retention offers firmly, and be prepared for a 5–10 minute conversation. The money saved is worth the time.
  • Annual subscriptions: If you've paid for the year, you typically keep access until the renewal date — but cancel now so you're not automatically charged again. Note the access end date.
💳
Your actionWork through your subscription list and cancel everything that fails the "would I sign up today" test. Do the easy ones first (App Store and Google Play are fastest), then tackle the direct website cancellations. Don't skip the hard ones — they're often the most expensive.
3
Calculate your annual saving

Once you've cancelled everything, do the arithmetic:

  1. Add up the monthly cost of everything you cancelled
  2. Multiply by 12 to get the annual figure
  3. Write it down somewhere visible — this is the amount you're recovering per year from today

The annual figure is almost always larger than expected. Most people who go through this exercise save between $200 and $800 per year — often more if they've had multiple streaming services running simultaneously or hadn't reviewed software subscriptions in a few years.

$273
Average annual spend on forgotten or unused digital subscriptions (research estimate)
$0
Value received from a subscription you don't use — regardless of what it costs
4
What to do with subscriptions you want to keep but use less

Not everything is a clear cancel. Some subscriptions fall into a middle category — you use them, but maybe not enough to justify the current tier. Consider these options:

  • Downgrade instead of cancelling: Many services have cheaper tiers. If you're on a premium plan for one or two features you rarely use, the standard plan might cover everything you actually need at half the price.
  • Share instead of paying solo: Streaming services often allow family or household plans at little extra cost. If you're paying individual price for something a partner, family member, or housemate also uses, a shared plan is straightforwardly better.
  • Seasonal pause: Some services (particularly fitness apps and streaming) offer pause or hibernation options — you stop billing without losing your account history. Useful for something you use heavily for a few months per year but not year-round.
  • Set a review reminder: For anything you decide to keep but that felt borderline — set a calendar reminder 3 months from today to reassess. If you still haven't used it meaningfully by then, cancel at that point.
Key takeaway
Cancelling subscriptions you don't use isn't deprivation — it's recovering money that was leaving your account every month in exchange for nothing. The annual total you wrote down is yours to keep, every year from now on.
Day 26

Old devices: secure them, clear them out

That drawer full of old phones is a privacy issue, not just clutter. Today you deal with it properly.

Pull out the device inventory you made on Day 6 of Week 1. Each device on that list is still holding personal data — photos, messages, saved passwords, account sessions — and will continue doing so until it's deliberately cleared. Leaving devices in a drawer isn't a neutral act: it's ongoing exposure.

Today you start working through the list. The process is the same for every device: confirm what's on it, extract anything you want to keep, factory reset, then decide what happens to it.
1
Before you reset anything: check what's on it

Before resetting any device, spend 5 minutes checking what's actually on it. This matters for two reasons: you might find photos or data you want to save that isn't backed up elsewhere, and knowing what was there is reassuring once it's wiped.

  • Old phones: Power it on. Check the Camera Roll for any photos that might not have been backed up to cloud. Check Contacts if you want them, though they're usually synced already. Check any apps for data you'd want (notes, specific app data).
  • Old laptops: Open and check the Documents folder, Desktop, and Downloads for anything that didn't make it into your new file structure. Check the browser bookmarks if there's anything irreplaceable. Check any locally stored emails if you used a desktop email client.
  • External hard drives: These often contain complete backups from years ago. Browse the top-level folders to understand what's there. Anything that's also in your current backup can be erased. Anything unique that matters should be copied to your current system first.
  • USB drives: Plug in and check contents. Usually safe to wipe — but spend 60 seconds looking at what's there first.
2
How to factory reset each device type

A factory reset is the only reliable way to remove your personal data from a device. "Deleting" files doesn't work — deleted files remain recoverable on most storage types. A factory reset overwrites the storage in a way that makes recovery extremely difficult or impossible.

  • iPhone: Settings → General → Transfer or Reset iPhone → Erase All Content and Settings. The phone will ask for your Apple ID password to disable Activation Lock — this prevents the next owner from being locked out. Make sure you know your Apple ID password before starting.
  • Android: Settings → General Management (or System) → Reset → Factory Data Reset. On Samsung: Settings → General Management → Reset → Factory Data Reset. The path varies slightly by manufacturer.
  • iPad: Same as iPhone — Settings → General → Transfer or Reset iPad → Erase All Content and Settings.
  • Mac: macOS Ventura and later: System Settings → General → Transfer or Reset → Erase All Content and Settings. For older macOS: restart in Recovery Mode (hold Cmd+R on startup) → Disk Utility → Erase the main drive → Reinstall macOS.
  • Windows PC: Settings → System → Recovery → Reset this PC → Remove everything. Choose "Remove files and clean the drive" for maximum security (takes longer but is more thorough).
  • External hard drives: Connect to your computer → on Mac, use Disk Utility → Erase with the "Security Options" set to at least one pass. On Windows, right-click the drive in File Explorer → Format → check "Quick Format" is unticked for a full overwrite.
⚠️
iPhone/iPad: Sign out of iCloud before resettingBefore erasing an iPhone or iPad, go to Settings → [your name] → Sign Out, or the reset process itself will ask you to enter your Apple ID. If you don't know your Apple ID credentials, resolve this first — a device with Activation Lock enabled is difficult to sell or donate and useless to a new owner.
3
What to do with the device after resetting

Once a device is reset, it's clean and ready for its next chapter. Your options:

  • Sell it: A factory-reset device can be sold on eBay, Facebook Marketplace, Gumtree, or through trade-in programs from Apple, Google, Samsung, and major carriers. Check current resale values before deciding where to sell — trade-in values are usually lower but faster and easier.
  • Give it away: To a family member, friend, or charity. Many community organisations and schools accept donated tablets and phones. Ensure it's been fully reset before handing over.
  • Recycle it properly: Electronic waste (e-waste) contains materials that shouldn't go in general rubbish. Most electronics retailers (JB Hi-Fi, Harvey Norman, Apple Store) accept devices for recycling. Some councils run e-waste drop-off days. In Australia: recyclingnearyou.com.au lists local drop-off points.
  • Keep as a spare: If you want to keep an old phone as a spare or dedicated device (music player, kid's device, travel phone), that's fine — but remove your accounts and set it up fresh. Don't leave your personal accounts signed in on a device that's not in regular use.
📱
Your actionWork through at least one device from your Day 6 list today. Check what's on it, save anything not backed up elsewhere, factory reset it, then decide what happens to it. If you have multiple devices, work through as many as time allows — each one completed is a security and clutter win.
4
USB drives and memory cards

USB drives and memory cards are easy to overlook because they're small, but they travel widely and get lost or misplaced constantly. Handle each one:

  • Plug in and check contents quickly — is there anything on here not backed up elsewhere?
  • If yes: copy what matters to your file system, then format the drive
  • If no: format immediately — right-click in Windows/Mac → Format. Choose a full format rather than quick format for drives you're discarding
  • Label drives you're keeping with a small label or piece of tape indicating what they're for — unlabelled drives are how things get lost again
  • Drives that have no ongoing use: physically destroy before discarding (snap the casing, cut with scissors through the connector end) or include in e-waste recycling
Key takeaway
A factory reset takes 10 minutes and permanently closes a door that's been quietly open. Each device you process today is one less piece of your personal data sitting on hardware you no longer control.
Day 27

The 10-minute weekly reset

You've done the hard work. Now build the one habit that makes it permanent.

Everything you've built over the past 27 days — the file system, the backup, the password manager, the empty inbox — will degrade without a maintenance habit. Digital clutter has a natural entropy: it returns unless actively managed. Not because you're doing anything wrong, but because digital life generates new things every single day.

The 10-minute weekly reset is the habit that makes everything else permanent. Without it, you'll be back near the starting point in six months. With it, today's clean state becomes the new normal — maintained with a fraction of the effort it took to build.
1
Why weekly is the right frequency

Daily maintenance would be ideal but isn't realistic — the per-session overhead isn't worth it. Monthly is too infrequent — a month of accumulated files, photos, and emails takes more than 10 minutes to clear, and the pile starts to feel like a project again. Weekly hits the sweet spot:

  • The Desktop and Downloads stay manageable. A week's worth of downloads is typically 5–20 files — clearable in 2 minutes. A month's worth starts to resemble what you just spent a week cleaning up.
  • Photos stay roughly sorted. Clearing one week of Camera Roll photos takes 3 minutes. Clearing a month's worth of photos is a project.
  • The inbox stays at or near zero. Daily email sessions keep it empty day-to-day, but the weekly reset is a final sweep to confirm nothing slipped through and Action Required is current.
  • The habit stays automatic. Weekly is frequent enough that the habit doesn't fade. Monthly tasks tend to get skipped, forgotten, and eventually abandoned.
2
The complete weekly reset checklist

Five items, 10 minutes total. Run through them in this order — each one is quick when the previous week's session left things in good shape:

Clear Desktop and Downloads (2–3 min) — Apply the three-decision rule to everything that's landed since last week: file it, archive it, or delete it. Desktop should be empty. Downloads should contain only the last 7 days.
Process inbox to zero (2–3 min) — Apply the four-action rule to any emails that arrived since your last daily email session. Check Action Required and Waiting folders — anything overdue? Archive anything completed.
Sort this week's photos (2 min) — Open your Camera Roll and scroll through the last week. Delete obvious duplicates, blurry shots, and screenshots that don't belong in your photo library. Move the best shots to the appropriate album. Star anything exceptional.
Check for unexpected charges (1 min) — Glance at your bank or card's recent transactions for any new recurring charge you don't recognise. New subscriptions often appear quietly without prompting an email notification you'd notice.
Add new accounts to password manager (1 min) — Any new sign-ups from this week? Open your password manager and check if they're saved with a generated password. If you signed up for anything using a temporary password you typed manually, update it now.
3
How to make the habit stick

The research on habit formation is consistent: the most reliable way to stick with a new behaviour is to attach it to an existing one, at a fixed time, with no decision required about when to do it.

  • Pick a specific day and time now. Not "sometime on the weekend" — a specific slot. Sunday evening while dinner is cooking. Monday morning with your first coffee. Friday at 4:45pm before you close your laptop. Write it down.
  • Set a recurring calendar event. Label it "Digital Reset — 10 min." Put it on the calendar so it appears every week without you having to remember. The calendar notification is your trigger.
  • Keep the checklist visible. Bookmark this page, write the five items on a Post-it note near your desk, or add them to a notes app. Having the list means you don't have to remember the steps — you just follow them.
  • Don't skip, even when you're busy. The weeks where it feels like there's no time are usually the weeks where the most has accumulated. Ten minutes is almost always available. If you genuinely can't — do a 5-minute version. Something is always better than nothing.
📅
Your actionSet a recurring weekly calendar event right now, before you close this page. Pick the day and time, label it "Digital Reset — 10 min," and set it to repeat weekly. Then run through the complete five-item checklist once today, as your first official session. You're not starting a new habit — you're doing the second session of one you already started on Day 14.
4
The annual review: once a year, go deeper

The weekly reset keeps everything maintained at the surface level. Once a year — pick a date that's easy to remember, like the first Sunday of January, your birthday, or tax time — do a slightly deeper review:

  • Security audit: Open your password manager's security report. Update any weak or reused passwords that have accumulated. Check haveibeenpwned.com with all your email addresses for any new breaches.
  • Account review: Spend 20 minutes going through your password manager's full list. Delete entries for services you've closed. Close any accounts you've stopped using but haven't formally deleted.
  • Subscription review: Check your bank statements for any new subscriptions that have crept in since your Week 4 cull. Apply the same "would I sign up today" test.
  • Archive review: Open your Archive folder in Documents. Delete anything you archived 12+ months ago and haven't opened since. If you didn't need it in a year, you won't.
  • Backup check: Verify your backup is still running. On Mac, open Time Machine preferences and check the last backup date. For cloud backup, check that the service is still active and current. Backups silently stop working sometimes — the annual check catches this before it matters.
Key takeaway
The 10-minute weekly reset is the single habit that turns a one-time declutter into a permanently different way of managing your digital life. Everything else in this program built the foundation — this habit keeps it standing.
Day 28

Your digital life, reclaimed

28 days. Look at what you've built — and write the "after" paragraph that closes the loop on Week 1.

On Day 7, you wrote a "state of my digital life" paragraph — the messiest parts, what surprised you, what you were looking forward to fixing. Find that paragraph now and read it before you do anything else today.

Today you write the after. Not as an exercise — as a record of something real you did. Twenty-eight days of daily sessions, actual changes to how you store files, protect accounts, manage email, and spend money. The paragraph you write today is the honest account of where that took you.
1
Run the final 30-second test

Before writing, do the concrete version of the before-and-after. Go back to the 30-second test from Day 3 and Day 14, and run it one final time. Without using the search function, find:

  • Your most recent tax return or a key financial document
  • A photo from a specific event in the last 12 months
  • A work document you created in the last 3 months

Then compare: how long did it take on Day 3, when you first ran this test? How long did it take today? That gap — the time saved, the friction removed — multiplied across every time you search for a file for the rest of your life, is what this program actually produced.

2
What you've actually built across 28 days

This is a concrete inventory — not aspirational, but describing what actually exists now:

A working file system — six folders, three-click maximum depth, Desktop clear, Downloads cleared weekly. Any file findable in under 30 seconds without search.
A real backup — phone photos backing up automatically to cloud, computer backed up to external drive or cloud backup service. At least two independent copies of anything irreplaceable.
A consolidated cloud situation — one primary cloud service with a clear folder structure. No more hunting across four services to find a file.
A password manager running — unique, generated passwords on all critical accounts. One master passphrase to remember. The security audit showing green on what matters most.
2FA on email and banking — the most important accounts protected by a second layer that makes a stolen password alone insufficient to compromise them.
Old accounts deleted — at least 5–10 old accounts properly closed, reducing your breach exposure surface. The "Sign in with Google/Apple" list reviewed and trimmed.
App permissions audited — location, camera, microphone and contacts access trimmed to what's actually needed. Ad tracking opted out.
Inbox at zero — old backlog archived, unsubscribed from 20+ mailing lists, email system with three folders and the four-action rule. Inbox processed to zero at least once.
Subscriptions culled — unused subscriptions cancelled, annual saving calculated and known. Only paying for what you actually use.
Old devices cleared — at least one old device factory reset; data removed, fate decided. The drawer of old phones is no longer a security liability.
Weekly reset running — recurring calendar event set, five-item checklist practised, annual review planned. The habit that makes all of the above permanent.
3
Write your "after" paragraph

Find your Day 7 paragraph and read it. Then write the response. Answer these three questions — the mirror of what you wrote on Day 7:

  • What changed? Be specific. Not "things are more organised" — what can you actually do now that you couldn't do easily before? What does it feel like to open your inbox compared to Day 1? What specific problem from your Day 1 frustration list has been solved?
  • What surprised you most? Was there something harder than expected? Something that turned out to be much simpler than you'd built it up to be? A discovery (a forgotten subscription, a breach result, a device with data on it) that changed how you think about your digital life?
  • What do you feel differently about? The anxiety — is it quieter? The inbox — does it feel different? The security question ("could someone get into my accounts?") — does that question feel different now than it did four weeks ago?

Keep this paragraph somewhere you'll find it in a year. Next January, or at your annual review, read both paragraphs — Day 7 and Day 28. Then write a third one. The habit is maintenance, not a one-time effort.

✏️
Your actionWrite your "digital life after" paragraph. Read your Day 7 paragraph first, then answer the three questions: What changed? What surprised me most? What do I feel differently about? Be specific — the specificity is what makes it worth reading in a year.
4
What comes next — the ongoing picture

The program ends today. The systems don't. Here's what ongoing maintenance looks like — and it's much lighter than what you've just done:

  • Every week: The 10-minute digital reset. Desktop, Downloads, inbox, photos, unexpected charges, new accounts into password manager. Already scheduled. Already practised.
  • Every month: 20 minutes on one month of old photos (working backwards through the backlog). Any new passwords that slipped through the weekly reset — update them now.
  • Every year: The annual review — security audit, account review, subscription check, archive clear, backup verification. An hour, once a year, keeps everything sharp.
  • Ongoing: Every new account gets a generated password from the manager. Every newsletter that you don't open twice in a row gets unsubscribed. Every new device you stop using gets factory reset before being passed on. These aren't special tasks anymore — they're just how you do things.

The goal of this program was never to get you to a perfect state once. It was to change how you relate to your digital life — to make good habits the default, so the entropy that accumulated over years doesn't accumulate again.


Week 4 complete — and so is the program

28 days. Your digital life, reclaimed.

Files organised and backed upFindable in 30 seconds, two independent copies of everything irreplaceable
Accounts securedPassword manager running, 2FA on email and banking, old accounts closed
Inbox at zeroA decision system, not a pile — 20+ sources of noise removed permanently
Subscriptions culledOnly paying for what you actually use — annual saving calculated and kept
Old devices clearedFactory reset, data removed, security liability resolved
Weekly reset running10 minutes a week — the habit that makes everything else permanent
What comes next: The weekly reset keeps everything maintained. The annual review keeps it sharp. Every new account gets a generated password. Every device gets wiped before it leaves your hands. The program ends here. The calm doesn't.