Browsing: what to do after a data leak