Advanced DIY Privacy for Every Woman
  • Introduction
  • Before we start
  • 1 - Identify your security risks
  • Security areas to prioritise
  • 2- Document security violations
  • Safety and security strategies
  • Securing a mobile phone or a tablet
  • FAQ on mobile phones
  • Securing your laptop/other connected devices?
  • 3 - Securing your connections
  • 4 - Securing your apps, software and internet services
  • 5 - Browsing the web
  • Social engineering and phishing
  • Internet browser, search engine and passwords
  • IP address, WIFI and emails
  • Social media: what to pay attention to!
  • Facebook, Twitter, Google, Foursquare
  • Apps and internet enabled apps
  • Online banking, billing account and other accounts
  • Protection measures
  • 6 - Documenting privacy violations
  • Voice calls and keeping a diary
  • 7 - Advanced security resources
  • Anti-virus, Firewall and Spyware
  • Secure internet browsing
  • Authentification
  • Encryption
  • Deleting your information
  • 8 - Glossary
  • How we put this guide together
  • Final words
Powered by GitBook
On this page
  • Facebook
  • Privacy Settings
  • Twitter
  • Privacy settings
  • Google Account
  • Foursquare or other check-in apps

Facebook, Twitter, Google, Foursquare

PreviousSocial media: what to pay attention to!NextApps and internet enabled apps

Last updated 7 years ago

Facebook

VULNERABILITIES

  1. Passwords

  2. Public posts

  3. Privacy Settings

  4. Tags

  5. Check-ins: Check-ins by you or people close to you can disclose your location

  6. Messenger: auto pings location if you double click on a message

  7. Phishing attempts

  8. Photo Recognition

WHAT YOU CAN DO ABOUT IT

  1. Log out when you are not using the account

  2. Don’t upload any photos and ask anyone who takes a photo of you not to share

  3. Disable automatic tagging of your name in status updates & in suggested photos

  4. Disable the option for your friends to check you into places, and set your check-ins as visible only to you - read how.

  5. Go to the privacy settings (see References) and set them to the highest level.

  6. Deactivate location sharing for messenger app on your phone - see for instructions.

  7. Don’t login to your account on a public computerUse two-step verification

  8. Click the padlock icon located in the top right corner and select the ‘More Settings’ link or log into facebook on your browser and follow this or

  9. Use where you’re logged in to tell if someone else is logged into your account.

    High threat level: Download your profile information\/data in case you need it as evidence in a legal case, then deactivate or delete your account.

Privacy Settings

Who can see my stuff?

Who can contact me?

How do I stop someone from bothering me?

Twitter

VULNERABILITIES

  1. Password

  2. Location Settings

  3. Anyone else tagging you

  4. Check-ins

  5. Phishing attempts

  6. Integrating apps

  7. Harassment

WHAT YOU CAN DO ABOUT IT

  1. Two-step verification

  2. High threat level: delete account

Privacy settings

Google Account

VULNERABILITIES

  1. Tracking

  2. Location settings

  3. Privacy settings

  4. Phishing attempts

WHAT YOU CAN DO ABOUT IT

  1. Log out when you are not using the account Two-step verification

  2. Don’t upload any photos and ask anyone who takes a photo of you not to share

  3. Disable automatic tagging

  4. Use highest security settings details in the References Section

  5. Don’t login to your account on a public computer

    High threat level: delete account

Foursquare or other check-in apps

VULNERABILITIES

  1. Password

  2. Anyone else checking you in

  3. Check-ins

WHAT YOU CAN DO ABOUT IT

  1. Delete/uninstall check-in apps from your phone

  2. If you need to use it, access without an account

Granting apps to your Twitter account may leave you vulnerable - if someone hacks into an app, they can get your Twitter login details as well. Make sure to under ‘Apps’ on your Twitter account

Block harassers using ; ; ; ;

here
here
link
see this video
revoke app access
Block Together
The Twitter Safety Center
Guide to reporting on Twitter
Abusive behavior and violent threats
Private information