CyberShrekurity 2 Social Media Boogaloo: How to Fortify Your Phone and Social Media

CyberShrekurity 2 Social Media Boogaloo: How to Fortify Your Phone and Social Media

Once upon a time in the land of Far, Far Away, there lived Shrek the CyberShrekurity Advisor and his loyal friend, Donkey.

Have you ever had a conversation with a friend about a specific product or service, only to see an ad for it pop up on their social media the very next day?

It’s almost as if their phone is listening to them, right?

Well, that’s precisely what happened to Donkey, and he couldn’t shake the feeling that his phone was eavesdropping on his conversations.

One day, Donkey excitedly told Shrek about his newfound interest in gourmet waffles.

They spent hours discussing various recipes, toppings, and the best waffle houses in the kingdom.

Little did Donkey know, his phone was seemingly paying attention.

The next day, while scrolling through his social media feed, Donkey was bombarded with ads for waffle makers, waffle mixes, and even local waffle houses he had never visited.

At first, he brushed it off as a coincidence.

But then he started wondering, “Is my phone really listening to me?”

Worried, Donkey came to Shrek for advice.

Determined to find the root cause, Shrek began examining Donkey’s phone settings.

As it turns out, granting microphone access to certain apps on our smartphones can lead to this unnerving phenomenon.

Many popular apps request access to your device’s microphone, sometimes for legitimate reasons like voice commands or recording audio.

However, some apps take advantage of this permission to listen in on your conversations and serve targeted ads based on what they “hear.”

In Donkey’s case, Shrek discovered that he had given a popular social media app access to his microphone.

Moreover, Donkey constantly had Siri on, which meant that it was passively listening in the background.

Donkey never realized the potential consequences of granting this permission, and it left him feeling incredibly uneasy.

To regain control over his privacy, Shrek and Donkey decided to take action.

Shrek went through Donkey’s phone settings and reviewed the microphone permissions for each app.

Surprisingly, he found that many apps had access to Donkey’s microphone, even though they had no obvious need for it.

Shrek promptly revoked microphone access for any app that didn’t require it for its core functionality.

Additionally, he showed Donkey how to disable Siri’s passive listening feature.

Since then, Donkey has been much more cautious about the permissions he grants to the apps on his phone.

He’s also encouraged his friends and family in Far, Far Away to review their own app permissions and be more mindful of the potential privacy risks.

So, the next time your wonder if your phone is listening to you, remember that it just might be.

Safeguard your privacy by reviewing app permissions regularly.

It’s a small step that can make a big difference in protecting your personal information and keeping your conversations private.

And with Shrek the Cybersecurity Advisor and Donkey leading the way, the kingdom of Far, Far Away was just a little bit safer from prying digital ears.

In a world where technology is increasingly intertwined with our daily lives, it’s essential to take steps to protect our personal information and maintain our privacy.

So, without further ado, here are some valuable CyberShrekurity tips that can help you safeguard your digital life:

Review App Permissions

As we saw in Donkey’s case, it’s crucial to review the permissions you grant to apps on your phone. Only allow necessary permissions, and consider using alternative apps if you find that some request excessive access.

How to check your microphone permissions for iPhones:

  1. Go to Settings
  2. Click Privacy & Security
  3. Scroll to MicrophoneThose are the apps that are listening to you. Deselect the ones that aren’t totally necessary.
  4. Then go into Siri and Search
  5. Turn off “Hey Siri”

Disable Location Tracking

Turn off location services for your device or limit them to specific apps when necessary. Avoid sharing your location on social media and remove geotagging from your photos.

Use Secure Messaging Apps

Choose messaging apps that offer end-to-end encryption, such as Signal, to protect the content of your messages with an additional layer of obscurity.

Be Cautious with Public Wi-Fi

Avoid using public Wi-Fi networks for sensitive activities, such as online banking or accessing confidential information. Use a reliable VPN (Virtual Private Network) to encrypt your data on public networks.

Enable Two-Factor Authentication (2FA)

Enable 2FA for your social media and other online accounts to add an extra layer of security. Make sure it’s an app like Authy, not a SMS 2FA.

Review Privacy Settings

Regularly review and adjust the privacy settings on your social media accounts to limit who can access your information.

Be Wary of Third-Party Apps

Avoid connecting third-party apps to your social media accounts, as they may compromise your security.

Avoid Voice-Activated Virtual Assistants

Alexa is constantly passively listening for its wake word, which means it may inadvertently capture private conversations. Additionally, the data it collects is stored on servers, creating potential risks for unauthorized access or misuse of your personal information. However, Apple has implemented stricter privacy measures, allowing users to opt-out of Siri’s data storage and review their recordings to delete specific ones if desired.

Think Before You Click

Be extremely cautious of links in emails, messages, or social media posts, even from trusted contacts. Verify the source and use a link scanner to check for potential threats.

Use Strong, Unique Passwords

Create strong, unique passwords for each of your accounts and use a password manager to help securely store and manage them.

Keep Software Up-to-Date

Regularly update your phone’s operating system, apps, and security software to protect against known vulnerabilities.

By following these tips and staying vigilant, you can significantly reduce your risk of falling victim to surveillance, exploits, and hackers.

So, start taking control of your digital privacy today and encourage others to do the same.

Together, we can create a safer digital world for everyone.

Stay Curious,

Addie LaMarr

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply

Your email address will not be published. Required fields are marked *