A third-party application is a product that’s not part of the main service that you’re using, but that has access to your main account or its credentials. For apps that you aren’t using regularly, consider revoking access to third-party application permissions from Twitter, Facebook and your phone.

3rdpartyaccessFor example, Hootsuite is a third-party application that works with Twitter. When you link up a third-party app with your Twitter account, you will see a screen asking for permission for the app to use your account. The third-party service will detail what the application will and won’t be able to do. Typically, apps can see your email address, read your Tweets, see who you follow, follow new people, update your profile, and even post Tweets. Most of these apps don’t actually do all of these things, but some third-party applications don’t have security standards as high as the ones the ‘mother’ service uses.

Check out Twitter’s explanation of which apps you may want to give your username and password to and which ones you might not want to trust with that information. Then revoke access for any unnecessary apps in the Applications tab of your settings page. Facebook has that information as well. (Be aware that revoking third-party app permissions may mean you’ll need to manually log into certain apps if you want to use them on your phone.)

Yael Grauer is a freelance tech journalist covering online privacy and surveillance for WIRED, Forbes, Slate, and other publications. Find her at http://yaelwrites.com or on Twitter @yaelwrites, and check out her free ebook on staying safer online at https://yaelwrites.com/saferonline.pdf.

Check out more digital hygiene tips:

  1. Removing public data
  2. Privacy protection on domain names
  3. Https everywhere
  4. Anonymous “Tor” cloak or VPN
  5. Prepare for a DDos attack
  6. Two-step verification
  7. Privacy plug-ins/cookies
  8. Third-party permissions
  9. Image “hidden pixels”
  10. Links and attachments
  11. Install patches and updates
  12. Use a password manager/strong password
  13. Strengthen security questions
  14. Encrypt hard drive/backup data
  15. Click to play
  16. Use end-to-end encryption

Published by michelleferrier

Executive Director, Media Innovation Collaboratory; Founder, Troll-Busters.com | Online Pest Control for Women Writers and Journalists;

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: