diy:social-media-security
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
diy:social-media-security [2024/05/21 16:13] – [The Strategy] Humphrey Boa-Gart | diy:social-media-security [2024/08/06 05:48] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | {{wst> | ||
- | |||
====== Social Media Security ====== | ====== Social Media Security ====== | ||
- | Decades ago, in the expanding internet social media lands, securing one’s online presence, while keeping yourself safe IRL, was far less complex. Now, times have changed, as many social media gathering places are littered with bad actors and other hostile threats. Almost everyone uses social media daily, WE, the Anonymous collective comprised of individuals, | + | Decades ago, in the expanding internet social media lands, securing one’s online presence, while keeping yourself safe IRL, was far less complex. Now, times have changed, as many social media gathering places are littered with bad actors and other hostile threats. Almost everyone uses social media daily, WE, the Anonymous collective comprised of individuals, |
Separating your RL identity and securing your personal info from your social media presence, is quickly becoming more crucial. Many people still use a handle which closely resembles their RL identity, and this can be a grave mistake, with harsh lessons being learned from it. Whenever you consider starting up a new social media account, it’s highly advisable that you separate the RL person from the online one and also any older " | Separating your RL identity and securing your personal info from your social media presence, is quickly becoming more crucial. Many people still use a handle which closely resembles their RL identity, and this can be a grave mistake, with harsh lessons being learned from it. Whenever you consider starting up a new social media account, it’s highly advisable that you separate the RL person from the online one and also any older " | ||
- | ===== | ||
===== The Strategy ===== | ===== The Strategy ===== | ||
- | The first course of action before even starting an account, should be to do up a plan of it’s purpose, what qualities you want to express with the identity, and what information you are or aren’t willing to divulge. While most social media sites ask for a name and other personal info, this doesn’t mean you *have* to provide them with the real info. Plan out a name, birthdate, place of work and other details that you find acceptable to expose, but none of them real and based off yourself, or anyone you know. Use an entirely different email address as well to start each new social media acct. I can’t express enough how important it can be to separate each SM presence as it’s own unique identity. Ideally, this strategy should be used for every social media account you create. | + | The first course of action before even starting an account, should be to do up a plan of it’s purpose, what qualities you want to express with the identity, and what information you are or aren’t willing to divulge. While most social media sites ask for a name and other personal info, this doesn’t mean you *have* to provide them with the real info. Plan out a name, birthdate, place of work and other details that you find acceptable to expose, but none of them real and based off yourself, or anyone you know. Use an entirely different email address as well to start each new social media account. I can’t express enough how important it can be to separate each SM presence as it’s own unique identity. Ideally, this strategy should be used for every social media account you create. |
+ | |||
+ | The only exception to this should be if you’re intentionally using the same handle over different platforms. Even if this is your plan, still use different email address, “real” name and DOB etc in setting the accounts up. That way, even if ONE account somehow becomes compromised, | ||
+ | |||
+ | All this use of fictional information in your account, might be tricky to remember for some, so you can (and should) create a text file or something for reference. Keep this info secured, preferably on a backup drive or USB stick along with any other password files or account recovery info. | ||
+ | |||
+ | ===== Your Social Media Presence & Actions ===== | ||
- | The only exception to this should be if you’re intentionally using the same handle over different platforms. Even if this is your plan, still use different email address, “real” name and DOB etc in setting the accounts | + | Now that you've gotten |
- | ===== Your Social Media Presence | + | There are many different ways in which you can limit who sees and interacts on your social media spaces. For example, on Facebook and Twitter, you can limit who can see your posts/ |
- | Now that you've gotten your intended social media account actually set up, you're going to start posting on it, so the first rule of thumb should be considered: NEVER presume anything that you say or do on social media, is " | + | Choose your content and words wisely with the understanding that nothing really is private and that you might not be able to completely delete all traces |
- | Choose your content and words wisely with the understanding that nothing really is private. A good habit is just to avoid discussions regarding where you went to school, past jobs, details about RL family or friends and absolutely includes posting personal pictures. Images posted on an account can always be downloaded and reverse image searches can produce quite good results, tracing you to your other social media spaces. So if you've posted an image on a secured account and also on a personal acct with your RL name, those two might be connected if someone decides to dig up info on the image. Suddenly, they' | + | {{tag> |
- | {{tag> | + |
diy/social-media-security.1716308019.txt.gz · Last modified: 2024/08/06 05:53 (external edit)
Find this page online at: https://bestpoint.institute/diy/social-media-security
Find this page online at: https://bestpoint.institute/diy/social-media-security