Apps and internet enabled apps

Generating Passwords For App Access: Facebook

Revoking Access To Apps: Twitter

Do not trust emails asking for personal information, survey data, or anything else that could reveal information about you, no matter how professional it looks

The vast majority of websites do not need your personal data to provide their services, so be suspicious if they ask for it (besides, who cares what they want? It's not your responsibility to give them anything). If you think the request is legitimate, do not follow their supplied link: you should be able to do whatever you have to do by navigating their website in your browser. If you can't, they clearly have poor security practices and you should be suspicious of them in general!

Messaging apps

All of the following apply to you, any children you may have or anyone your abuser knows that could know your location.

Generally, most instant messaging apps (such as Skype or Viber) are not entirely safe. They store your data and have not been designed with user privacy in min. WhatsApp messages are now encrypted but metadata about who you chat with and for how long is collected and stored.

There are more secure alternatives - such as Signal, Pidgin, Jitsi (secure video chat for Microsoft/Linux), Tor Messenger if you need anonymity. You should consider using them instead of the more popular apps.

Here you can compare the security of the available messaging apps.

However, you can also take certain steps to ensure greater security and privacy while using more “traditional” apps.

Internet enabled apps

We’ve covered some of these applications in the sections above but here are some others that are easy to overlook. You can find exhaustive safety information for your mobile phone under Section 1: “Your Devices” above.

Google Maps

VULNERABILITIES

  1. Google logs your movements via your smartphone while it is running Google Maps

  2. Android is always logging your location\/movements

  3. Your movements can be accessed by anyone who has your password

WHAT YOU CAN DO ABOUT IT

  1. Disable Google Maps

  2. Never sign into your Google account when using Google maps

  3. Change your password

  4. Delete your location history.

Here’s how

  1. Set a time period to view — up to 30 days at a time.

  2. Select the period you want to delete.

  3. Click the “Delete history from this time period” link on the left side of this page.

  4. If you have multiple Google accounts, check the history for each one.

  1. Go to the Settings app.

  2. Scroll down and tap on the Location section.

  3. Tap Google Location Reporting.

  4. Switch Location History to “off.”

Note: For greater privacy, you can also turn off Location Reporting, but this will keep apps like Google Maps from working properly.

  1. Open the Settings app.

  2. Scroll down to Privacy, and select Location Services.

  3. Disable all Location Services by setting the top slider to “off” — or scroll down to disable specific apps one by one, such as Google Maps.

Cloud services (i.e. Dropbox, The Cloud)

VULNERABILITIES

  1. Location

  2. Sensitive information

  3. Password

  4. Logging in on an untrusted device/PC/laptop

WHAT YOU CAN DO ABOUT IT

  1. Use app like SpiderOak, Peerio or Onionshare which offer extremely secure file sharing

  2. Change your passwords for all your cloud service apps

  3. Never log in at an untrusted PC/laptop/phone

Hotspot Providers

VULNERABILITIES

Public Wi-Fi hotspots are extremely easy to infiltrate

WHAT YOU CAN DO ABOUT IT

Use a VPN (see References) when connecting to a public hotspot

Fitness Training Apps or devices

VULNERABILITIES

Uses GPS location trackingEnables “friends” who also use the app to see where you exercise outdoors

WHAT YOU CAN DO ABOUT IT

Disable location settingsDisable what friends can see on the app

Last updated