# Facebook, Twitter, Google, Foursquare

## Facebook

| **VULNERABILITIES** |
| ------------------- |

1. Passwords
2. Public posts
3. Privacy Settings
4. Tags
5. Check-ins: Check-ins by you or people close to you can disclose your location
6. Messenger: auto pings location if you double click on a message
7. Phishing attempts
8. Photo Recognition

| **WHAT YOU CAN DO ABOUT IT** |
| ---------------------------- |

1. Log out when you are not using the account
2. Don’t upload any photos and ask anyone who takes a photo of you not to share
3. Disable automatic tagging of your name in status updates & in suggested photos
4. Disable the option for your friends to check you into places, and set your check-ins as visible only to you - read how[ here](http://lifehacker.com/5616395/how-to-disable-facebook-places).
5. Go to the privacy settings (see References) and set them to the highest level.
6. Deactivate location sharing for messenger app on your phone - see[ here](http://www.howtogeek.com/219611/how-to-turn-off-facebook-messengers-location-tracking-if-it-is-on/) for instructions.
7. Don’t login to your account on a public computerUse two-step verification
8. Click the padlock icon located in the top right corner and select the ‘More Settings’ link or log into facebook on your browser and follow this [link](https://www.facebook.com/settings) or[ see this video](https://www.youtube.com/watch?v=e66q4QBjSdo)
9. Use where you’re logged in to tell if someone else is logged into your account.

   ***High threat level:*** Download your profile information\\/data in case you need it as evidence in a legal case, then deactivate or delete your account.

### Privacy Settings

**Who can see my stuff?**

![](https://377093595-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LA9RFKQDuANU_s4gx6R%2F-LA9RMISav8rEUtoOxNl%2F-LA9RWe_LUwTm41ynZhV%2FFacebook%20-%20Who%20can%20see%20my%20stuff.gif?generation=1523814911891508\&alt=media)

**Who can contact me?**

![](https://377093595-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LA9RFKQDuANU_s4gx6R%2F-LA9RMISav8rEUtoOxNl%2F-LA9RWff3MhOcB4qDy_e%2FFacebook%20-%20Who%20can%20contact%20me.gif?generation=1523814910962801\&alt=media)

**How do I stop someone from bothering me?**

![](https://377093595-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LA9RFKQDuANU_s4gx6R%2F-LA9RMISav8rEUtoOxNl%2F-LA9RWgmsIqPNDQB6eaq%2FFacebook%20-%20Blocking.gif?generation=1523814910945238\&alt=media)

## Twitter

| **VULNERABILITIES** |
| ------------------- |

1. Password
2. Location Settings
3. Anyone else tagging you
4. Check-ins
5. Phishing attempts
6. Integrating apps
7. Harassment

| **WHAT YOU CAN DO ABOUT IT** |
| ---------------------------- |

1. Two-step verification
2. Granting apps to your Twitter account may leave you vulnerable - if someone hacks into an app, they can get your Twitter login details as well. Make sure to [revoke app access ](https://twitter.com/settings/applications)under ‘Apps’ on your Twitter account
3. Block harassers using [Block Together](https://blocktogether.org/) ; [The Twitter Safety Center](https://about.twitter.com/safety) ; [Guide to reporting on Twitter](https://support.twitter.com/groups/56-policies-violations/topics/238-report-a-violation/articles/15789-how-to-report-violations) ; [Abusive behavior and violent threats](https://support.twitter.com/forms/abusiveuser) ; [Private information](https://support.twitter.com/forms/private_information)

   ***High threat level:*** delete account

### Privacy settings

![](https://github.com/chayn/advanced-diy-privacy-for-every-woman/tree/8f17d47b88e5e5b5d5b3f02c1bddcfce14cc2a53/assets/Twitter%20-%20Security%20and%20privacy.gif)

## Google Account

| **VULNERABILITIES** |
| ------------------- |

1. Tracking
2. Location settings
3. Privacy settings
4. Phishing attempts&#x20;

| **WHAT YOU CAN DO ABOUT IT** |
| ---------------------------- |

1. Log out when you are not using the account Two-step verification
2. Don’t upload any photos and ask anyone who takes a photo of you not to share
3. Disable automatic tagging
4. Use highest security settings details in the References Section
5. Don’t login to your account on a public computer

   ***High threat level:*** delete account

## Foursquare or other check-in apps

| **VULNERABILITIES** |
| ------------------- |

1. Password
2. Anyone else checking you in
3. Check-ins

| **WHAT YOU CAN DO ABOUT IT** |
| ---------------------------- |

1. Delete/uninstall check-in apps from your phone
2. If you need to use it, access without an account


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://chayn.gitbook.io/advanced-diy-privacy-for-every-woman/facebook-twitter-google-foursquare.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
