Mobile

Guide step

Settings can only do so much to protect you. Your security and privacy also comes from how you use the app. This guides covers short concrete advice on good practices to follow when using this app.

Guide step

You might sometimes connect from a device that is not yours, for example someone else's computer. We recommend you always log out after doing so, but if you forgot, you can view all active sessions in Account > Apps and sessions

Guide step

Two-factor authentication ensures that your account is not accessed even if your username and password have been stolen. This greatly improves your account security. Learn how to enable it on Twitter.

Guide step

Limiting how much information you share on Twitter by tightening the visibility of your post, who can find you, and your location.

Guide step

In this guide we will cover the privacy settings that are available on Viber, namely what information you share with other users and third parties.

Guide step

Protecting your account starts with the settings of your Viber account to tighten your privacy and limit risks. This guide addresses Chat backups and how to Deactivate your account.

Guide step

In this guide we take a look at profile settings, namely with whom you share your personal information. This information includes your e-mail, phone number, birthday, hometown, family relationships, workplace and more.
 

Guide step

Settings can only do so much to protect you. Your security and privacy also comes from how you use the app. This guides covers logged in devices and general good practices

Guide step

Telegram is an app running on your phone and as such may ask for permissions to access certain info such as location or contact. This guide shows you how to review these settings.

Guide step

Protecting your account starts with the settings of your Telegram account to tighten your privacy and limit risks. This guide addresses profile visibility, two step verification and account deletion.

Guide step

Settings can only do so much to protect you. Your security and privacy also comes from how you use the app. This guides covers chat history and general good practices

Guide step

Whatsapp offers some security features which are good to enable. It's also worth reviewing the permissions given to the app. This guide looks at fingerprint lock, security notifications, Whatsapp web and app permissions.

Guide step

Protecting your account starts with configuring the settings of your Whatsapp account to tighten your privacy and limit risks. This guide addresses backups, the primary risk in Whatsapp, profile visibility and two factor verification

Guide step

We suggest using Two-Factor authentication, as it provides an extra security step in order to access your account. This way, besides asking for your username and password, Instagram will verify your identity by sending a unique code to your device.

This can be done by SMS (text message) or using

Guide step

The screenshots below outline some steps you can take to minimise the data you share on WhatsApp. The company announced changes to group privacy (details here) but we are not currently (as of 14/05/19) able to see these changes (PI is UK-based).

It’s tough to minimise targeted ads on phones

Guide step

Uber appears to offer few options to limit data collection and it’s unclear how the data the company has about users is shared with third parties including advertisers, although there have been numerous reports about Uber’s data sharing activities. These screenshots show a few things you can do.

Guide step

TikTok is a short-form video app (owned by ByteDance) which allows advertising and sponsored content. Two thirds of TikTok’s over 113 million users (are reportedly aged 16-24) and it was the second most downloaded app in 2019, beaten only by WhatsApp’s 849 million). Like other tech platforms

Guide step

While Telegram says in its privacy policy that the company doesn’t “use your data for ad targeting or other commercial purposes”, the company says that “no third party bot developers are affiliated with Telegram” and that developers “should ask [users] for [their] permission before they access

Guide step

It’s tough to minimise targeted ads on phones because ads can be delivered based on data from the device level (such as what operating system your phone is using or based on unique numbers that identify your phone), browser level (what you search for within a browser), and within the apps you use

Guide step

Google dominates online search. The company also owns YouTube and Android, with the latter reportedly making up nearly 75% of the global smart phone market share. PI has written about the numerous problems that come from corporate concentration and the use of data by monopolistic companies, and