Mobile

Guide step

Your Telegram app stores a lot of information about you in the cloud. Here we show you how to gain access to it.

Guide step

Your Facebook app stores a lot of information in the cloud. Here we show you how to gain access to it.

Guide step

Your WhatsApp stores a lot of information about you in the cloud. Here we show you how you can gain access to it.

Guide step

This cloud guide enables you to obtain the data stored about you and to limit the amount of data being collected by the Uber app.

Guide step

Until recently, advertisers have been able to track users across their iPhones and the web using the Identifier for Advertisers (IDFA), a unique identifier that could be accessed by the apps you used and the site you visited. From version 14.5 of iOS, Apple gives you the option to opt out of tracking that apps would normally try to do. This guide shows you where to find these settings on your phone, and how to tweak them to keep pesky data hungry companies off the radar.

Guide step

DNS level content blocking prevents your device from connecting to servers that serve you unwanted ads and that track you, which can minimise the amount of data you share with third parties. In this guide, you'll learn how to setup a DNS level content blocker to block Ads and Trackers across your iOS device.

Guide step

DNS level content blocking prevents your device from connecting to servers that serve you unwanted ads and that track you, which can minimise the amount of data you share with third parties. In this guide, you'll learn how to setup a DNS level content blocker to block Ads and Trackers across your Android device.

Guide step

Android offers a way for advertisers to uniquely identify you in order to track your activity across applications and websites you consume on your mobile device. In this guide you'll learn how to hinder tracking on your Android device either by periodically resetting your Ad ID or by opting out completely.

Guide step

Settings can only do so much to protect you. Your security and privacy also comes from how you use the app. This guides covers short concrete advice on good practices to follow when using this app.

Guide step

You might sometimes connect from a device that is not yours, for example someone else's computer. We recommend you always log out after doing so, but if you forgot, you can view all active sessions in Account > Apps and sessions

Guide step

Two-factor authentication ensures that your account is not accessed even if your username and password have been stolen. This greatly improves your account security. Learn how to enable it on Twitter.

Guide step

Limiting how much information you share on Twitter by tightening the visibility of your post, who can find you, and your location.

Guide step

In this guide we will cover the privacy settings that are available on Viber, namely what information you share with other users and third parties.

Guide step

Protecting your account starts with the settings of your Viber account to tighten your privacy and limit risks. This guide addresses Chat backups and how to Deactivate your account.

Guide step

In this guide we take a look at profile settings, namely with whom you share your personal information. This information includes your e-mail, phone number, birthday, hometown, family relationships, workplace and more.
 

Guide step

Settings can only do so much to protect you. Your security and privacy also comes from how you use the app. This guides covers logged in devices and general good practices