Beginner

Guide step

Settings can only do so much to protect you. Your security and privacy also comes from how you use the app. This guides covers short concrete advice on good practices to follow when using this app.

Guide step

Staying on top of your settings is important to protect your privacy, but the way you interact with Twitter can also expose a lot about you. In this guide we present some simple practices to keep in mind when you are using the app.

Guide step

You might sometimes connect from a device that is not yours, for example someone else's computer. We recommend you always log out after doing so, but if you forgot, you can view all active sessions in Account > Apps and sessions

Guide step

Limiting how much information you share on Twitter by tightening the visibility of your post, who can find you, and your location.

Guide step

In this guide we will cover the privacy settings that are available on Viber, namely what information you share with other users and third parties.

Guide step

Protecting your account starts with the settings of your Viber account to tighten your privacy and limit risks. This guide addresses Chat backups and how to Deactivate your account.

Guide step

Updating your settings is important to protect your privacy, but the way you interact with Facebook can also expose a lot about you. In this guide we present some simple practices to keep in mind when you are using the app.

Guide step

In this guide we take a look at profile settings, namely with whom you share your personal information. This information includes your e-mail, phone number, birthday, hometown, family relationships, workplace and more.
 

Guide step

This Guide Step covers the settings you can apply to your posts on Facebook, mainly who can see your posts.

Guide step

Settings can only do so much to protect you. Your security and privacy also comes from how you use the app. This guides covers logged in devices and general good practices

Guide step

Telegram is an app running on your phone and as such may ask for permissions to access certain info such as location or contact. This guide shows you how to review these settings.

Guide step

Protecting your account starts with the settings of your Telegram account to tighten your privacy and limit risks. This guide addresses profile visibility, two step verification and account deletion.

Guide step

Settings can only do so much to protect you. Your security and privacy also comes from how you use the app. This guides covers chat history and general good practices

Guide step

Whatsapp offers some security features which are good to enable. It's also worth reviewing the permissions given to the app. This guide looks at fingerprint lock, security notifications, Whatsapp web and app permissions.

Guide step

Protecting your account starts with configuring the settings of your Whatsapp account to tighten your privacy and limit risks. This guide addresses backups, the primary risk in Whatsapp, profile visibility and two factor verification

Guide step

A lot of third-party apps ask you to get access to your Instagram data. This is the case with social media managing apps for example. The more apps have private information on you, the more likely it is that information can be misused. So it is important to make sure that you only allow Instagram

Guide step

Even with the tightest privacy settings it's important to acknowledge that the way you and others use the app can still be compromising in terms of sensitive data being shared. In addition to in-app settings there's a few good practices that you should keep in mind:

 

  • Let people know that you
Guide step

We suggest using Two-Factor authentication, as it provides an extra security step in order to access your account. This way, besides asking for your username and password, Instagram will verify your identity by sending a unique code to your device.

This can be done by SMS (text message) or using

Guide step

Blocking someone on Instagram will make them unable to find your profile, stories and posts. When you block someone, they do not get a notification about your action. Blocking someone means you will stop getting notifications from that person. You cannot follow an account you have blocked. Keep in

Guide step

This is the first step in improving your privacy on Instagram. When you first create your account, it is set as "public" by default, meaning anybody can find it and see what you share.

Making your account private lets you share your content with a select group of people that you care about

Guide step

The screenshots below outline some steps you can take to minimise the data you share on WhatsApp. The company announced changes to group privacy (details here) but we are not currently (as of 14/05/19) able to see these changes (PI is UK-based).

It’s tough to minimise targeted ads on phones

Guide step

Uber appears to offer few options to limit data collection and it’s unclear how the data the company has about users is shared with third parties including advertisers, although there have been numerous reports about Uber’s data sharing activities. These screenshots show a few things you can do.

Guide step

Twitter plays an increasingly important role as a space facilitating democratic engagement, debate and dissent. However, Twitter's track record in relation to protecting people's data has in some instances fallen short of expectations. In August 2019, for example, Twitter revealed that it had shared

Guide step

TikTok is a short-form video app (owned by ByteDance) which allows advertising and sponsored content. Two thirds of TikTok’s over 113 million users (are reportedly aged 16-24) and it was the second most downloaded app in 2019, beaten only by WhatsApp’s 849 million). Like other tech platforms

Guide step

While Telegram says in its privacy policy that the company doesn’t “use your data for ad targeting or other commercial purposes”, the company says that “no third party bot developers are affiliated with Telegram” and that developers “should ask [users] for [their] permission before they access

Guide step

It’s tough to minimise targeted ads on phones because ads can be delivered based on data from the device level (such as what operating system your phone is using or based on unique numbers that identify your phone), browser level (what you search for within a browser), and within the apps you use

Guide step

Facebook has been in the news over the past few years for failing to protect users’ data (here are some examples). Facebook can be an important tool in facilitating democracy and provides the potential to spread messages and ideas around the globe. For these reasons, it’s not possible for some

Guide step

Google dominates online search. The company also owns YouTube and Android, with the latter reportedly making up nearly 75% of the global smart phone market share. PI has written about the numerous problems that come from corporate concentration and the use of data by monopolistic companies, and

Guide step

uBlock Origin (do not mistake with uBlock which a completely different project) is an independant and open-source ad-blocker relying on a currated list of servers. It prevents your browser from connecting to these servers to serve you ads. We recommand it over AdBlock Plus which authorise certain

Guide step

uBlock Origin is an independant and open-source ad-blocker relying on a currated list of servers. It prevents your browser from connecting to these servers to serve you ads. We recommand it over AdBlock Plus which authorise certain ads to be displayed according to its "Acceptable Ads program". It is