Protect your privacy on social media with three simple settings.
MP3•Episode home
Manage episode 508207919 series 3653598
Content provided by Andres Diaz. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Andres Diaz or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Summary: - The episode by Andrés Díaz explains three simple adjustments to protect privacy on social media without disconnecting from others. - Adjustment 1: Control profile and post visibility - Why it matters: public data in bio, photos, and old posts can reveal location, work schedule, and routines. - How to do it: adjust visibility settings (Public, Friends, Only me), review your friends list and bio, and consider making accounts private on platforms like Instagram. Clean up sensitive data in your bio and periodically update these options. - Practical action: review three recent posts and adjust audience or delete if needed. - Adjustment 2: App permissions and data accessed by your accounts - Why it matters: connected apps may request unnecessary permissions (location, contacts, posting on your behalf), creating exposure risks. - How to do it: review Connected Apps or Security settings, revoke access for unused apps, turn off unnecessary location permissions, and reassess which linked accounts and app permissions are reasonable. - Concrete action: list five connected apps and revoke access for at least half; review permissions for each and remove unnecessary ones. - Adjustment 3: Location, tagging, and extra security - Why it matters: geolocation reveals habits and frequent places; tagging can expose third parties without consent. - How to do it: turn off geolocation when posting, ensure locations aren’t shown if not relevant, manage tags (disable tagging without approval), review who tags you, and enable two-factor authentication. - Reflection: consider what sensitive data you should avoid sharing; before posting, ask if location or routine could be deduced. - Engaging points: - Breaches often come from excessive permissions and forgotten settings; small tweaks help a lot. - Two-step verification increasingly common and effective without burden. - Many posts contain location tags that could reveal weekly routines. - Practical action plan for today: - Spend 15 minutes reviewing profile and post visibility on a daily-used network. - Review permissions for five frequently used apps. - Disable location when posting and enable two-factor authentication; aim to complete all three in one block. - Conclusion: the process is accessible for most people; prompts about which adjustment was hardest and what change will have the biggest impact in a week. - Farewell: invites subscription, feedback, or sharing; contact info provided. Remeber you can contact me at [email protected]
…
continue reading
17 episodes