FACEBOOK KNOWS YOUR SECRETS, AND IS SELLING THEM AWAY.

The internet is one spiral network that has diversified in almost all spheres of life. As you are reading this
right now, you are using the internet, and guess what, your information is on the loose. This is not meant to scare you though. When we say information, we don’t just mean pictures, location, bank account or password logins only, but also your activity, click-throughs, scrolls and browsing engagements.

In this digital era, data is one of the major sources of wealth. Data is the backbone of various researchers, determines a lot of decisions made by companies, spearheads campaigns and most of all can be a base for projecting outcomes in any firm.

As Kahill Insights, content creation and distribution being the main dish that we serve, we would like to emphasize that you should be aware of the levels of privacy of your data on social media, how it is used with or without your knowledge and how to prevent this.

Following the recent scandal between Facebook & Cambridge Analytica, many users have lost trust in Facebook. Over the past weeks, you must have seen or encountered the hashtag #DeleteFacebook, (ironically even on Facebook) which had a lot of people contributing to why they are now against the biggest social media platform in the world – but no significant number of users has been mentioned to have actually deleted the pages.

There are allegations that the information users are viewing on the application could be biased and may psychologically affect opinions and behaviour of users over time – which we believe is true. And as an ordinary Facebook user you should be wondering the extent to which this could affect you, and if at all there’s any way it can be resolved.

We believe that the facts below will be very helpful.

Have you heard about Facebook developers?

These are programmers, who have access to the Facebook platform as third-party users to whom
tools and necessary services are provided in order to create their own applications and use Facebook
data to run their services.

A simple example is the CandyCrush App. After you install it on your phone the first time, the app asks for you to sign-up through your Facebook. By asking that, CandyCrush app’s developers will be a third-party with access to your Facebook data, hence the name “Facebook developers.”

Just like Facebook, other social networking platforms too have developers. These developers are
regulated on how to use your data, and there exist clear policies on the level to which they can use it.
These policies are all designed in favour of both the user and the developer, and it all encompasses
around you the user giving them permission to do so. (Click here to review Facebook policies)

Beyond the applications that access your Facebook data, there exist several other applications/websites
to which you give access to your data. Whenever you accept to log into an application/website using your Facebook, Twitter, Instagram, Google Plus or any other social networking app, your data is accessed by that application. This application/website takes a copy of your data provided via your social media account. All this is made known to you before accepting to use it, and this application/website is added to the list of all those third-party applications that are linked to your social media account.

https://www.wikihow.com/Link-Social-Media-Accounts-on-Flipboard

 Kasomi of Kahill Insights’ screenshot of apps logged in with his Facebook details.

More to the above, some social networking applications have access to your phone contacts, gallery/media files, messages, location, camera, microphone, Device ID, Wi-Fi connection information, the list is endless.

All this information is enlisted on the application permission list, which you have to accept before installing the application on your phone. Harbouring an application implies that you have allowed it to access that information.

 

Source: http://crambler.com/truth-about-facebook-messenger-app-privacy/

This cycle of data access makes your information vulnerable to all these applications, some of which are malicious applications.

Many of the times, users never take initiative to know how safe using a certain application is, and how it may affect their online activity. This is why people find information posted on their platforms not by them and they wonder how or why that happened.

Here is what you can do to protect yourself from these digital misfortunes.

  1. Review the various application permissions before granting them access to your social connection applications.

These shall be enlisted before you accept them to access your profile, they always include the examples of things the application will or will not be able to do with your account.

  1. Revoke access to any application you find duplicitous.

Every social networking application has a way of cancelling access from any third-party application linked to your account. If you discover that an application is not suiting your preferences anymore, or has misused your account improperly, you can revoke its access in two ways.

You can either edit how much information they can have about you or completely remove them from the applications list that is linked to your account.

Click on the links below to know how.

(Facebook | Twitter | Instagram)

  1. Change your privacy settings

You might not want third-party users like developers to have access to your information, therefore visiting and updating your privacy settings for all your different platforms helps you prevent certain information about you from being used.

Privacy settings also help you customize what you want to see, what you want to be seen about you and that which you don’t. Protecting your information and platform from unauthorized use which may affect you or your followers gives you an option of browsing the internet safely.

Kasomi of Kahill Insights’ privacy setting and tools

Otherwise, if you don’t want to delete your account or application, be keen on what you share and what you allow to be shared with you. This is your information, so protect yourself even online.

No Comments
Post a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.