Most of the privacy problems arise because of spyware applications, which let a person secretly monitor and record information about your phone activity
Smartphones have been created primarily to improve people’s way of communicating with each other. They have modernised the way we used to communicate, with messaging, calls, video chats and apps that allow people to instantly get in touch with anyone across the globe. Although there are many advantages that smartphones have brought in, there are plenty of other noticeable disadvantages like poor social interaction, distraction, uncensored content, addiction, and privacy loss.
Of all the above, privacy loss is more alarming and there is a possibility that we are being manipulated, and we need better choices. If not, technology companies can ethically steer people’s thoughts, a handful of people and a handful of technology companies through their choices can steer what a billion people are thinking today.
It’s all common nowadays that privacy is violated by States and companies. People are not being informed about the monitoring we are under, the way our personal data is collected, analysed and shared, nor are we given the opportunity to question these activities.
We all have become unpaid interns to Facebook, Twitter, Instagram and Google, who have unprecedented access to information on almost everyone. For hackers and stalkers, it’s a buffet lunch and there could be unsuspecting attacks anytime and anywhere they want.
Most of the privacy problems arise because of spyware applications, which let a person secretly monitor and record information about your phone activity. These spywares normally come along with free applications like social media, scanners, VPN, wallpapers, games, flashlights, weather reports, news and cache cleaners that are invasive, intrusive and dangerous.
• Protect yourself from identity theft
• Protect yourself from financial information
• Protect yourself from freedom of thought
• Virtual Private Network: Use VPN on your phones, it keeps all data that you send and receive on your phone encrypted, private, and secure
• Browsers: Use Privacy Conscious Browsers as TOR, Brave or Duck Duck Go, just in case you don’t have the luxury to subscribe for VPN software. Alternatively use other browsers in incognito mode
• Be wary of unknown sources : Applications downloaded from non-trusted sources usually have malware within the applications. Download apps only from legitimate sources i.e., App Store / Play Store
• Check app permissions: Be doubly sure when you grant permissions for mobile apps. If you think an application is asking for greater permissions than necessary (i.e., Scanner seeking access to location or microphone), look for an alternative application that takes your privacy more seriously; never blindly accept requests of app permissions
• Use PIN/Finger Scan: Locking your phone prevents random strangers from being able to get into it and keeps your data private in the event that your phone is stolen or one of your friends or colleagues ‘borrow’ it
• Stay Away from Public and Free Wi-Fi networks: Free Public and Wi-Fi hotspots are more desirable for hackers as it requires no authentication to establish a network connection. This creates an easy opportunity for the hacker to get unlimited access to unsecured devices on the same network
• Two-factor authentication: It is referred to as dual-factor authentication, is a security process in which users provide two different authentication factors to verify themselves. The first factor is the password credentials and the second factor is usually either a security token or a biometric factor – fingerprint or facial scan
• Screen Notification: Disable lock screen notifications on your smartphone, it helps you keep your privacy by not letting others know your communications
• End-to-end encrypted Messengers: The information will be transmitted using a secret code rather than insecure plain text between the sender and receiver which is utmost importance as privacy to safeguarded
• Child Protection: Enable Parental Control, Safe Search, and Play It Safe features on children’s electronic gadgets
• Storage: Never use public storage for private information purposes, use legitimate cloud locations to store data that are encrypted and properly protected
• Antivirus: Use original antivirus software that protects you from unknown dangers
• Charging: Never charge your phones in public places, you could be a victim to phishing or juice jacking
• QR Code: Never scan QR Codes, unless you are sure what it is meant for
• https://www.apple.com/in/privacy/control/
• http://android.com/security-center
• https://www.facebook.com/help/445588775451827
• https://help.twitter.com/en/safety-and-security/how-to-make-twitter-private-and-public
• https://help.instagram.com/116024195217477
• https://www.linkedin.com/help/linkedin/answer/66?lang=en
Stay Tuned to Cyber Talk to know more on internet ethics and digital wellness brought to you by Anil Rachamalla, End Now Foundation, www.endnowfoundation.org
Now you can get handpicked stories from Telangana Today on Telegram everyday. Click the link to subscribe.
Click to follow Telangana Today Facebook page and Twitter .