Search
Content type: Guide step
The information you (consciously or not) share with Telegram can be very revealing. It can also be (mis)interpreted by government agencies and used to profile individuals. Once installed on a device, depending on your settings, the Telegram app may have access to information such as your location, contact information and media stored on the same device. All of this data can be potentially be accessed remotely using cloud extraction technology.
Your Telegram app generates a lot of data that can…
Content type: Guide step
The information you (consciously or not) share with Facebook can be very revealing. It can also be (mis)interpreted by government agencies and used to profile individuals. Once installed on a device, depending on your settings, the Facebook app may have access to information such as your location, contact information and media stored on the same device. All of this data can be potentially be accessed remotely using cloud extraction technology.
Your Facebook app generates a lot of data that can…
Content type: Guide step
The information you share on WhatsApp can be very revealing. Once installed on a device, the app potentially has access to information such as your location, contact information, and media stored on the same device.
Your WhatsApp app generates a lot of data that can also be stored on your device and elsewhere. It’s important for you to be able to understand the types of data that apps like WhatsApp generate. Government agencies may seek access to this data through at least two routes: they…
Content type: Guide step
Introducción
Pi-hole es un bloqueador de anuncios de uso general que cubre toda la red y la protege de los anuncios y los rastreadores sin que sea necesario configurar cada uno de los dispositivos. Tiene la capacidad de bloquear anuncios en cualquier dispositivo de la red (por ejemplo, electrodomésticos inteligentes) y, a diferencia de las extensiones del navegador, Pi-hole bloquea los anuncios en cualquier tipo de software.
La configuración general funciona de la siguiente manera (Fig. 1).…
Content type: Guide step
Las redes de distribución de contenidos (CDN) son redes geográficamente distribuidas de servidores proxy que buscan ofrecer funciones como mejorar la disponibilidad y el rendimiento de los sitios web. Aunque el objetivo es loable, también implica que los proveedores de CDN reciben metadatos vinculados con los sitios web que visitas (donde están instalados). Sabiendo esto, quizá sea conveniente sacrificar estas ventajas adicionales y prescindir de los grandes proveedores de CDN (como Google y…
Content type: Explainer
Where are my communications stored?
Text messages/phone calls: Traditional cellphone communications happen over the cellular network. You usually access those with the text message and phone call apps that are provided as standard on your phone. While phone calls aren’t stored anywhere, text messages are stored locally on your and the recipient’s devices. They might also be temporarily stored by the network provider.
Messaging apps: Messaging platforms enable fairly secure communication…
Content type: Explainer
Where is my phone's location data stored?
Your phone can be located in two main ways, using GPS or mobile network location:
1. GPS
GPS (that stands for Global Positioning System) uses satellite navigation to locate your phone fairly precisely (within a few metres), and relies on a GPS chip inside your handset.
Depending on the phone you use, your GPS location data might be stored locally and/or on a cloud service like Google Cloud or iCloud. It might also be collected by any app that you…
Content type: Video
You can listen and subscribe to the podcast where ever you normally find your podcasts:
Spotify
Apple podcasts
Google podcasts
Castbox
Overcast
Pocket Casts
Peertube
Youtube
Stitcher
And more...
Episode notes
Useful info
How to minimise targeted ads: privacyinternational.org/act/minimise-targeted-ads
Protect yourself from online tracking: privacyinternational.org/act/protect-yourself-online-tracking
Social media account settings: privacyinternational.org/act/protect-…
Content type: Guide step
Google is enormous and is expert at accumulating data. Its main source of revenue is advertising. The company dominates search, has a dominant web browser Chrome, owns YouTube (and many other companies), is the designer/develop of Android, the operating system that runs on nearly 75% of global smart phones.Below is a set of steps you can take if you wish to minimise ad targeting when using Google.1. Go to gmail.com and sign in