Advanced DIY Privacy for Every Woman
  • Introduction
  • Before we start
  • 1 - Identify your security risks
  • Security areas to prioritise
  • 2- Document security violations
  • Safety and security strategies
  • Securing a mobile phone or a tablet
  • FAQ on mobile phones
  • Securing your laptop/other connected devices?
  • 3 - Securing your connections
  • 4 - Securing your apps, software and internet services
  • 5 - Browsing the web
  • Social engineering and phishing
  • Internet browser, search engine and passwords
  • IP address, WIFI and emails
  • Social media: what to pay attention to!
  • Facebook, Twitter, Google, Foursquare
  • Apps and internet enabled apps
  • Online banking, billing account and other accounts
  • Protection measures
  • 6 - Documenting privacy violations
  • Voice calls and keeping a diary
  • 7 - Advanced security resources
  • Anti-virus, Firewall and Spyware
  • Secure internet browsing
  • Authentification
  • Encryption
  • Deleting your information
  • 8 - Glossary
  • How we put this guide together
  • Final words
Powered by GitBook
On this page
  • Generating Passwords For App Access: Facebook
  • Revoking Access To Apps: Twitter
  • Messaging apps
  • Internet enabled apps
  • Google Maps
  • Cloud services (i.e. Dropbox, The Cloud)
  • Hotspot Providers
  • Fitness Training Apps or devices

Apps and internet enabled apps

PreviousFacebook, Twitter, Google, FoursquareNextOnline banking, billing account and other accounts

Last updated 7 years ago

Generating Passwords For App Access: Facebook

Revoking Access To Apps: Twitter

Do not trust emails asking for personal information, survey data, or anything else that could reveal information about you, no matter how professional it looks

The vast majority of websites do not need your personal data to provide their services, so be suspicious if they ask for it (besides, who cares what they want? It's not your responsibility to give them anything). If you think the request is legitimate, do not follow their supplied link: you should be able to do whatever you have to do by navigating their website in your browser. If you can't, they clearly have poor security practices and you should be suspicious of them in general!

Messaging apps

All of the following apply to you, any children you may have or anyone your abuser knows that could know your location.

However, you can also take certain steps to ensure greater security and privacy while using more “traditional” apps.

Internet enabled apps

We’ve covered some of these applications in the sections above but here are some others that are easy to overlook. You can find exhaustive safety information for your mobile phone under Section 1: “Your Devices” above.

Google Maps

VULNERABILITIES

  1. Google logs your movements via your smartphone while it is running Google Maps

  2. Android is always logging your location\/movements

  3. Your movements can be accessed by anyone who has your password

WHAT YOU CAN DO ABOUT IT

  1. Disable Google Maps

  2. Never sign into your Google account when using Google maps

  3. Change your password

  4. Delete your location history.

Here’s how

  1. Set a time period to view — up to 30 days at a time.

  2. Select the period you want to delete.

  3. Click the “Delete history from this time period” link on the left side of this page.

  4. If you have multiple Google accounts, check the history for each one.

  1. Go to the Settings app.

  2. Scroll down and tap on the Location section.

  3. Tap Google Location Reporting.

  4. Switch Location History to “off.”

Note: For greater privacy, you can also turn off Location Reporting, but this will keep apps like Google Maps from working properly.

  1. Open the Settings app.

  2. Scroll down to Privacy, and select Location Services.

  3. Disable all Location Services by setting the top slider to “off” — or scroll down to disable specific apps one by one, such as Google Maps.

Cloud services (i.e. Dropbox, The Cloud)

VULNERABILITIES

  1. Location

  2. Sensitive information

  3. Password

  4. Logging in on an untrusted device/PC/laptop

WHAT YOU CAN DO ABOUT IT

  1. Change your passwords for all your cloud service apps

  2. Never log in at an untrusted PC/laptop/phone

Hotspot Providers

VULNERABILITIES

Public Wi-Fi hotspots are extremely easy to infiltrate

WHAT YOU CAN DO ABOUT IT

Use a VPN (see References) when connecting to a public hotspot

Fitness Training Apps or devices

VULNERABILITIES

Uses GPS location trackingEnables “friends” who also use the app to see where you exercise outdoors

WHAT YOU CAN DO ABOUT IT

Disable location settingsDisable what friends can see on the app

Generally, most instant messaging apps (such as Skype or Viber) are not entirely safe. They store your data and have not been designed with user privacy in min. messages are now encrypted but metadata about who you chat with and for how long is collected and stored.

There are more secure alternatives - such as, , (secure video chat for Microsoft/Linux), if you need anonymity. You should consider using them instead of the more popular apps.

you can compare the security of the available messaging apps.

View your.

Use app like , or which offer extremely secure file sharing

WhatsApp
Signal
Pidgin
Jitsi
Tor Messenger
Here
location history using Google’s web page
SpiderOak
Peerio
Onionshare
To turn off location tracking in Android:
How to turn off location tracking in iOS