It’s much harder to keep a secret in a digital age. Why? Well, everyone’s got receipts. Gaslighting will not work because everyone’s got a screenshot of everything. Even if you delete the post or the conversation/message in question, you have no way of knowing if they have a screenshot.

Not only that, but even the information you never shared can be revealed.

Spy apps are more sophisticated than ever before and they can infiltrate your network, your device, or your account.

Most horrifyingly, there are so many online investigators with nothing but time and motivation on their hands. These are able to spot even the tiniest irregularities in your behavior and routine and come up with a detailed report of everything that happened, sometimes more accurate than your own memory (even though you were there and they were not).

With all these odds stacked against you, here’s what you can do to keep a secret safe in the digital age.

1.Never give anyone your device

If you give someone your device or allow them to get access to it, you’ll fall into the risk of falsely assuming that they had no time to find what they were looking for. Well, guess what? It doesn’t take that much time to install a spy app or a keylogger on your phone.

It might also be a good idea to learn the names of a few prominent spy apps so that you can recognize them if you ever spot them on your device. Just keep in mind that they’ll probably delete the app icon but the app will keep running in the processes. 

See also  Boosting Productivity and Efficiency: The Role of CRM Platforms

You might want to routinely check your app after giving it to someone (even though we’ve advised against it) or after leaving it unattended. Also, remember, it doesn’t have to be a complete stranger, it could be someone you trust (like a partner or a family member).

2.Protect your WiFi

A person connected to your WiFi could upload illegal content on the internet or use so much of the internet that you feel like you’ve been cheated by your internet service providers. Even worse, they could engage in the act of digital eavesdropping, which would leave you completely exposed to a malicious third party whose presence you may not even be aware of.

The most important thing you need to do is create a strong WiFi password. In some jurisdictions and when dealing with some ISPs, you might even be required by law to do so.

You might also want to do some counterspying yourself. Just find out how to figure out how to check if someone else’s been using your WiFi and what for. 

3.Use VPN

By using a VPN, you’re getting that extra layer of encryption you need to keep all your correspondences safe. Some of these VPNs are completely free, while others require a low fee (which is more than worth it). So, all you need to do is look up a list of the best VPN apps and pick one from the list.

One of the first things that a VPN does is actually protect your physical location and your IP address from malicious third parties. Now, sometimes, this is the secret that you’re trying to protect, and for a very good reason. There are no instances of people befalling physical harm (being assaulted or swatted) because of an online argument.

See also  Beyond the Basics: Innovations in Emergency Management Systems

Someone could even use this to blackmail you (they might threaten to dox you if you don’t comply).

By using a VPN, you’ll get an extra layer of protection. Not to mention that you can use this to post things anonymously (which is almost as good as keeping a secret). You can also use it to bypass geo restrictions and do much, much more. 

4.Be careful of your chats (all of them)

When chatting, you never know the intentions of the person on the other end of the line. This is true even in face-to-face conversations, but it seems like people need reminders even in the digital world. 

You’re not safe even in vanish, private, or safe modes. Sure, you’ll get notified if someone screenshotted the conversation, but so what? They’ve already screenshotted it.

You won’t be notified if they’ve memorized it, and when it comes to some information, just possession is enough; no investigation or verification is necessary.

Do you know what else you won’t be notified of? If someone used another phone to take a photo of your screen.

A while back, there was an exploit on Android where a vanishing photo (the “bomb” photo in Instagram chat) could be recorded via a screen recorder. Later on, someone can just replay it and screenshot it in their own gallery. Sure, this was fixed, but how many other such exploits are out there? 

We’re not just talking about your social media DMs and IM chats. Even while playing online games, you risk revealing more than it’s smart. 

The most dangerous part is that, unlike with real-life conversations, you never know who’s on the other end of the line. It might not be the person you think or they might not be alone.

5.Be careful what you post on social media

People online are more cunning than you think and they’re willing to invest so much work into drama and seemingly trivial analytics. 

See also  Unveiling the Power: 10Gbps Servers for High-Traffic Sites

In order to see exactly what we’re talking about, you need to read about one of the most epic games of capturing the flag in history. Users of 4chan managed to locate a flag that a popular actor Shia LaBeouf, posted on stream by analyzing the night sky and flight orders and then triangulating on the position with an SUV honking. 

Not to mention the fact that someone can learn everything about you by just going through your social media feed.

On the post with your dog, you likely have their name. You’ve also probably uploaded a photo of your kids blowing candles on their birthday cake. From the date when it’s uploaded, they can easily deduce their birthdays. They can do the same with your anniversary. Since they see all your cousins and relatives on social media, they can easily figure out your mother’s maiden name and the street you grew up on.

The reason why we listed all this (seemingly random) information is because it’s what a lot of people use for their social media passwords. This means that they could access your most sensitive data with ease.

Keeping a secret safe online is a 21st-century survival skill

We live in a world that’s mostly digital. This is why so many threats come from the digital world, yet we still lack the skillset to protect ourselves from these threats. Why? Well, mainstream media is spending millions on documentaries teaching you how to protect yourself from sharks and how to deter hyenas from attacking you, and they just can’t take a minute to talk about these things you’re using every day. 

When it comes to keeping your phone, WiFi, and chats safe, you rely on blog posts and YouTube videos. We hope that we’ve, at least partially, managed to right this wrong and shed some light on this issue.