Social Media
Online communities have existed since the invention of the internet, giving people around the world the opportunity to connect, communicate, and share. Although these networks are a great way to promote social interaction and bring people together, they have a dark side - there are some serious privacy concerns with social networking services. Secure your account, lock down your privacy settings, but know that even after doing so, all data intentionally and unintentionally uploaded is effectively public. If possible, avoid using conventional social media networks.
0 out of 12 (0%) complete, 0 ignored
Done? | Advice | Level | Details |
---|---|---|---|
Essential | Social media profiles get stolen. To protect your account: use a unique and strong password, and enable 2-factor authentication. Never add your phone number in social media profiles: automatic scanners search by known phone numbers to find linked profiles. You can reset a Twitter account password with SMS even if 2FA is enabled, as long as a phone number exists on the account. | ||
Essential | Social media networks allow you to control your privacy settings. By default it would be too open, offering you to share your profile and actions with the entire world. Ensure that you are limiting what data you are currently exposing and to whom, also this should be discussed in your family circle: often non-public people are easily found through their relatives. | ||
Essential | No, the 'private' group is not really private. Every comment, like, and message are displayed to people and robots, and you cannot have control over it. Therefore, before uploading, posting, or commenting on anything, think, "Would I mind if this was totally public?". | ||
Essential | Pretty much every post, comment, photo, etc., is continuously backed up by third-party services, who archive scraped data and make it indexable and available for public or purchase. When you delete something, it's hidden from you, but not from moderators and admins – the data will remain there, and you cannot have control over it. | ||
Essential | Profile information creates a goldmine of info for hackers, the kind of data that helps them personalize phishing scams. Avoid sharing too much detail (DoB, Hometown, School etc). Posting your real email address or mobile number, gives hackers, trolls and spammers more munition to use against you, and can also allow to link your profiles in different systems. | ||
Essential | Media you upload can unintentionally reveal a lot more than you intended. This is especially relevant to photos and videos, which show things in the background. Most smartphones and cameras automatically attach a comprehensive set of additional data (called EXIF metadata) to each photograph. Even if application was denied access to your location, it will guess your city from your IP address. | ||
Essential | Many of the popular social networking apps will ask for permission to access your contacts, location, media library, etc. They don’t need this access, don’t grant it. | ||
Essential | If you sign up for accounts using a social network (Sign in with Twitter, Login with Facebook, etc.), you risk losing access to them if your profile is blocked due to a report or policy violation. Third-party integrations can download and cache your profile data and connections, making it difficult or impossible to remove later. Regularly check and revoke access to social apps you don't actively use, as they could be sold to a scam company along with all user data. | ||
Essential | If you still plan to share any content that reveals a location, then wait until you have left that place. Don't publish your plans in advance. This is particularly important when you are taking a trip, at a restaurant, campus, hotel/resort, public building or airport. Every international tourist is deemed a wealthy target by local criminals. | ||
Optional | If you just want to connect and comment and do not intend on being easy to find by all your ex-schoolmates: consider using an alias name, and false contact details. | ||
Advanced | Tools like Fawkes can be used to very subtly, slightly change the structure of faces within photos in a way that is imperceptible by humans, but will prevent facial recognition systems from being able to recognize a given face. | ||
Advanced | Social media is fundamentally un-private, so for maximum online security and privacy, avoid using any mainstream social networks. These social networking sites are owned by private corporations, and they make their money by collecting data about individuals, analyzing and selling that data, often to third-party advertisers. |