Authentication privacy by default means the system guards you without begging for extra settings, toggles, or policies. It means that from the first moment a new user signs up, their credentials, tokens, and every sensitive interaction are locked down. No opt-in, no “advanced” switch—just security baked into the foundation.
When privacy is a switch, someone will forget to turn it on. When it’s the default, attackers have nothing to exploit from oversight. For authentication, that default should include encrypted storage for identifiers, short-lived tokens, salted password hashes, enforced TLS, and restricted metadata exposure. It should also exclude silent leaks like verbose error messages or hidden profiling endpoints. You ship all of this as the baseline, not the upgrade.
Privacy by default is not a feature—it's a contract. Once authentication is deployed, the default state must preserve the user’s anonymity in logs, block unscoped access in APIs, limit data retention, and reduce any information footprint without relying on the developer to remember to turn it on. Token scopes should start at least privilege. Every request should validate both intent and identity. Cookies and local storage must never reveal secrets directly.