Archives - Apps


Know all your apps

Be sure to review and understand the details of an app before downloading and installing it. Be aware that apps may request access to your location and personal information and determine what information you want the app to be sharing or transmitting. Delete any apps that you do not use regularly to increase your security.

Don’t assume an app is safe just because it came from an official app store

Downloading apps from official sources such as the Apple App Store and Google Play is far safer than sideloading apps or buying them from third-party stores. Still, even official apps can have their security compromised or be problematic for privacy. The best way to mitigate your risk is to check the permissions the apps ask […]

Use encrypted messaging apps instead of SMS when possible

Text messages, sent via carrier SMS, are fixtures of mobile communications. But they’ve lost ground to over-the-top (i.e., internet-based) services such as Apple iMessage, WhatsApp and Telegram. Those alternatives are not only more richly featured, but many have end-to-end encryption as well – something SMS and even its successor, RCS, do not support.

Explore alternatives to Facebook’s main mobile apps

Facebook and Messenger are two of the most common mobile apps, but they both ask for extensive permissions and consume a lot of battery. One alternative is to use the Facebook mobile website, which is less resource-intensive and minimalist. You can also find third-party messaging clients like Friendly that handle all of Messenger’s functionality in […]

Be wary of third-party applications on social platforms

Third-party applications may provide entertainment or functionality, but use caution when deciding which applications to enable. Avoid applications that seem suspicious, and modify your settings to limit the amount of information the applications can access.

Use end-to-end encryption for sensitive communications

End-to-end encryption means a message is protected throughout its entire journey from sender to receiver. Many common forms of communication, from email to many chat apps, don’t enforce it, though. Look for apps that provide a detailed explanation of their encryption measures, and explore encrypted email if you are worried about the contents of your […]