• Skip to content
logo logo
  • Blog
Login SIGNUP

privacy

Encrypting files: What kind of information should your company protect?

June 12, 2019 by HushApp Team

Encrypting files: What kind of information should your company protect?

Every time it becomes more common to hear that a company must pay a fine for not complying with data protection regulations in Europe in particular, the GDPR has become one of the major concerns of organizations. It is clear that data should be protected, the question is, what should we protect? And also, why encrypting files is the best way to protect your company?

Frauds, phishing, cyber attacks, data leaks, malware, among others, are terms that are becoming increasingly common; they are attacks to which any company or person is exposed to suffer at any time. To understand the consequences of this type of attack, you have to understand the causes of the problem, the information that the company deals with and how it is handled.

Personal data and privacy

Although it is not the only information that a company should protect, it can be considered the most valuable and at the same time vulnerable data that an organization manages. It is about everything that concerns the identity of a person, whether public or private, and each one decides whether it can be shared or not.

Everything that refers to personal data such as: contact data, physical characteristics, data related to your assets, biometric information, professional training, including ideological information, sexual life or ethnic origin, among others, refers to information that if reach the wrong hands, It could affect their reputation or safety.

It is not only about personal information but also about confidential information of the company that is also susceptible to a security breach and could cause serious financial problems.

What should be done with the information obtained?

It is the responsibility of the company to safeguard the integrity of the people from whom it handles such information. This refers to any type of action taken with these data: the way it is collected, processed, stored, transferred or even destroyed.

Therefore, the procedure should be:

  • Know the type of information handled.
  • Classify it according to its value, if it should be public, private and above all, who will have access or not.
  • Identify which are the possible threats and the possible consequences.
  • Apply the necessary tools for the protection of information, especially the most confidential one. In this step is where encrypting files is useful.

Encrypting files: Classification and examples of information that must be protected

Some examples of information that must be protected with encryption systems can be:

– Company files: sensitive data for the company such as business secrets, bank documents, including passwords that give access to confidential documents, corporate devices, credit cards, market studies, etc.

In the case of personal files could involve employees, customers or any other person related to the company. Some examples include:

– Employee files: personal data of employees (such as those mentioned above), identification documents, medical reports, etc.

– Client files: Identification documents, payment data, contact data, among others.

In the case of clients, it is important to understand the obligation to protect the data they are offering and should be used only for the purpose they decided. Therefore, if you are requesting a client’s email to subscribe to the company’s newsletter, it should be used only for that and not for other purposes. For example, to promote other products of another company, since this can be sanctioned in many countries.

Why encrypt the files?

Encrypting your files can be one of the best options to protect the sensitive information of a company. Nowadays, the most used and effective method to protect your data is an encryption system, in which you can secure that information is completely protected.

It is important to highlight the level of security offered by an encryption system. It is a much more powerful tool than a password since they only protect access. Encryption protects data directly, making it impossible to see the contents of files.

Encrypting files easily with HushApp

To comply with all data protection regulations that each country requires, it is important to use the appropriate security tools.

That’s why we introduce you the HushApp. It is a safe alternative to other file submission services, since it facilitates the daily protection of company data and helps safeguard your customer’s sensitive information.

How? Implementing high-level encryption methods in a simple and transparent way for the user without affecting the efficiency of business processes. Security, usability and a good user experience are all our priorities.

Using HushApp you will have the opportunity to offer additional value to your customers, protect your own confidential information and allow your work team to perform easily and safely actions.

We invite to try HushApp …

Filed Under: Cybersecurity Business Tagged With: confidential files, cybersecurity, data protection, encrypting, encryption, GDPR, HushApp, personal data, privacy

10 Cybersecurity measures to use Instagram safely without compromising your privacy

May 17, 2019 by HushApp Team

10 Cybersecurity measures to use Instagram safely without compromising your privacy

Recently we discussed the influence that social media have on our daily lives, particularly on Facebook. Instagram is a social media that has become increasingly popular, and the more popular it becomes, the more security risks we have when using it. Therefore, before starting to publish your favorite photos of your trips and your favorite dishes, take into account some security measures to use Instagram safely.

Instagram is undoubtedly the social media preferred by young people today, for the large amount of visual content that is published, as well as the immediacy of their publications, especially on the Stories. However, it does not stop being a focus of attention for hackers if it is not used correctly.

How could the misuse of an Instagram account affect your security? Small details such as simply having an open account, or connecting from a public Wi-Fi can bring you serious consequences, such as being a victim of fraud or data leakage.

Therefore, it is better to take security measures, from the most basic to some specific settings of the application.

How to use Instagram safely?

  1. If you do not have an Instagram yet and you are thinking about having it on your mobile, the first thing you should do is to download it from the official stores (Play Store, Apple Store, etc). Avoid downloading it from another site.
  2. After having your account, or if you already have it, the basic rule to use Instagram safely is to use the private account mode, so only those who want you choose can access you. If you want to leave it public because you want to promote it, make sure you do not publish any personal information that could compromise your security such as travel photos where you and/or your relatives appear, photos of children, etc.
  3. As in other social media (and in real life), if your account is personal and not for any promotional purpose, just accept to be followed by people you know, remember there are false accounts. In the same way, these false accounts will try to write you by direct messages to try to connect with you, if you do not recognize them, you can reject the request and they won’t be able to contact you.
  4. This privacy option is also available for Stories, Instagram allows you to create a group called “Close friends”, with that option you can select who of your followers will be able to see your Stories.
  5. We have repeated many times how dangerous it can be to connect to a public Wi-Fi without taking the appropriate security measures. Avoid doing it this way, since this is the easiest way for hackers to steal your user and password and access your account.
  6. It is important to be careful with third-party apps, if you want to know is a third-party app is reliable, you should consider some important details, for example: when you register with third-party app, it must show you a URL like this “https://instagram.com/, as well as show you the typical Instagram form to enter username and password (it must be the same as the login of the original app). Do not enter anything if you do not comply with these conditions.
  7. To add more security and using your Instagram safely, activate two-factor authentication, so every time you log in your account, you must enter in addition to your username and password, a code that will be sent to your mobile.
  8. Check the information of doubtful accounts: one of the security options that Instagram has recently added is to be able to review information about accounts with very large audiences (not necessarily public brands or personalities). When entering the profile of these accounts you just have to click on the three points that are in the upper right corner, and there you can click on “About this Account” and access to this information.

This option is not available for all accounts, but those that do have it allow you to verify things like the country (which can help you know if it shows a false location in their posts) date joined, or former usernames.

  1. The blue checkmark is also a way of knowing that the account is verified and that it is indeed the personality or brand they claim to be.
  2. If, on the other hand, you would like to verify an account, you must send a request through Instagram, but take into account that sending the request will not guarantee that it will be verified. After your application has been reviewed, you will receive a confirmation or rejection notification in the notifications tab. Instagram will never request payment for verification or contact you in any way for you to confirm it.

If you still have doubts it is always good to consult the Instagram help center. The important thing is to know the risks to which you are exposed to using this network and how to use it responsibly to enjoy its advantages.

Filed Under: HushApp Tips Tagged With: cybersecurity, Facebook, Instagram, Instagram safely, privacy, social media, two factor authentication

Love vs cybersecurity: How to use dating apps and protect your privacy?

March 7, 2019 by HushApp Team

Love vs cybersecurity: How to use dating apps and protect your privacy?

Are you looking for love? Or rather an adventure? Whatever your preferences you surely want to take advantage of a large number of apps that exist in the market to facilitate or improve your search for the right person. Nowadays you can look for someone because of their tastes, their location, or whatever. The question is how secure are these dating apps? Can you protect your privacy enough by using them?

Like almost everything in the digital and interconnected world, these dating apps are also vulnerable to cyber attacks, and many people have suffered consequences, either because they have leaked files of their intimate life that have been exchanged through these applications, or worse, have been the victim of some fraud or criminals that are not the people who claim to be in these apps. So, how to balance your love or sexual life without endangering your security or privacy?

We do not want you to stay single for fear of being victim to an attack like these. If you follow some security measures in the digital or physical world, you can reduce the chances that your information will be used for other purposes than what you are looking for.

Advantages and disadvantages of dating apps and how to use them safely

  1. The duality between privacy and the veracity of information: One of the main problems that arise in these dating applications is knowing if the person is really who they say they are. Some of these apps allow users to register with Facebook, place work or study site, so this could allow the other person to see if this person, in a certain way, is “real”. The counterpart: the person being investigated, how can we know if they are really looking for an “appointment”? Our advice: limit information about yourself on the Internet to the one you want others to know about you, and with whom you want them to know about you, then you can introduce yourself as you like.
  2. The ideal, in this case, is to have common sense and not to share personal information immediately, as well as it is advisable to have the first dates in public places. Moreover not to give money: it is important to note that there are even people who have been victims of fraud, where their alleged “dates” have asked for money and for some reason there are those who have agreed.
  3. Another common feature of these applications is that they allow you to locate a person close to you, thanks to geolocation, there are also much more accurate, as they indicate how many times you have crossed with that person. It can be an advantage if you want to look for someone in your area, but also it is a disadvantage due to the fact that you are making it clear where you are, and even worse if you indicate each step you take. It is preferable to opt for applications that do not use this modality, which would only allow users to communicate directly so that they define where to find each other. Although it is not so exact, you have the power to determine where and when you want to meet that person.
  4. Secure communications: The problem with many of these dating apps is that they do not have secure communication channels between their users, and therefore they are victims of data leakage. When choosing the application, take into account that your app use encryption in your system to protect the privacy of its users.

For your part, add all the necessary layers of protection, connect to secure networks, use a VPN and an antivirus to protect the device you use.

Protect these photos that should not be exposed for any reason 🔥😈 using HushApp, there you can keep them protected in your Hushbox, without anyone else but you can access them, or sending it to your date in an easy and completely safe way. Nobody who you do not want can be able to access your privacy.

In HushApp we do not want to know about your private life, we want to help you to protect it.

We invite you to try Hushapp …

Filed Under: HushApp Tips Tagged With: ciberattack, cibersecurity, data breach, HushApp, HushBox, privacy, private life, Tags: dating apps

How to protect your privacy from spies in electronic devices

February 20, 2019 by HushApp Team

How to protect your privacy from spies in electronic devices

When we talk about spies you probably think about typical movie characters who take photos secretly from afar, but the reality is different. Spies can be very close to you, in your electronic devices which you use daily. The internet of things has come to solve many of our day-to-day activities, the problem is that any device connected to the Internet, no matter how harmless it may seem, can be an open window to access your information. So, how to protect your privacy from spies? protecting your information does not only have to do with installing an antivirus on your computer or mobile when even your smart refrigerator could also be vulnerable to a data leak.

It’s not just about protecting your information from potential hackers or cybercriminals, but from companies that want to obtain your data and then offer you products in a personalized way, without your consent.

Televisions, refrigerators, lamps, thermostats, voice assistants such as Alexa or Siri, and an endless number of appliances that need to be connected to the Internet, collect your personal information, use cameras or information from your home to work properly.

Tips to protect your privacy in technology and on the internet

  1. Let’s start with the basics: it is essential to read the terms and conditions of each service that we use, although they may seem long and incomprehensible, it is the only way to know what type of data the device collects and how it uses it.
  2. The most common victim of a spy is on mobile devices, through Spyware, but do not worry, there are always ways to control them, and here you can know how.
  3. If it is about spies, we can not leave out the ability of Google services to make you feel spied on. Here you can read how to control the access they have to your information and continue to use them.
  4. Generally, at home, we have a router to provide a connection to all the devices you have connected and which are in use. This means that if it is not well protected, this could be the first access to the information stored by ALL your devices. So the first device to protect your privacy is your router.
  5. The voice assistants are those that have caused more controversy, due to their powerful sensors and the capacity they have to listen and keep information since they are always in search of a command that orders some action. Therefore it is important to deactivate that constant listening and activate it only when necessary.
  6. The vast majority of these devices allow you to erase the data that you have been storing. In the case of Google, for example, your devices and applications have an activity page that allows you to delete them, as well as to register what interests you. That will make it possible for you to eliminate clues about your actions on these devices.
  7. Although we know that the only way that these devices are 100% secure and that they can not be accessed, is that they are disconnected from the Internet, but in this way, it does not make sense to use them. However, it is not necessary to connect every application the device has, all applications can be connected at the time of use, or only the applications or accessories needed or most used.
  8. You can add some of the firewalls created especially for the internet of things, these are small devices designed so that everyone who is connected can protect themselves from cyber attacks.
  9. Do not forget, of course, the need to protect our devices such as: mobiles, computers or tablets, which have a greater capacity to store data, either with their respective antivirus, using VPNs to connect or protecting your files in applications like HushApp that allow you to store and send your files easily and safely.

It is not necessary to go back to the past and reuse the old devices and home appliances to protect your privacy, there are ways to take advantage of the technology by using them in a responsible and safe way.

Filed Under: HushApp Tips Tagged With: cibersecurity, data protection, firewalls, hackers, privacy, spies, spyware, terms and conditions, voice assistants, VPN

How to succeed in choosing a secure VPN connection?

January 10, 2019 by HushApp Team

How to succeed in choosing a secure VPN connection?

Previously we had commented in one of our post what is a VPN, its functions and the advantage of having it when using the Internet safely. However, this system may also have its cons that you should consider when making sure to choose a secure vpn.

As mentioned above, these networks allow the web browsing data remain incognito for the internet provider, but not for the company that manages the VPN. This means that we must trust whoever offers us this connection. How to know what service we can trust? Although the question seems difficult to answer, there are some tips that you can take into account to choose the most appropriate VPN, as well as the best quality.

Secure VPN: Free or paid version?

One of the main characteristics to take into account when choosing a secure vpn is to know if it is free or paid. Obviously, our first option will be free version, however, these versions usually have certain limitations, and although they cost nothing, the rest there is much to say …

Generally the speed is not adequate, they are also unreliable in terms of privacy. Since some VPN store data and the activity of its users, which can then be used to display personalized advertising or for illegitimate purposes.

Therefore, if what concerns you is security and confidentiality, it is better to make the investment in a paid version, with which you will have a range of options on the web.

Other aspects to consider

We are clear that we will have to invest to have a secure VPN, now the task is to define which fits our needs:

You can start by evaluating the reputation of the company behind the VPN, review user comments, blog or specialized forums , etc.

Take into account the location of your servers: as well as the laws that exist in the country where you are located and if they could affect your privacy. It is advisable to look for those that have a great worldwide presence.

Another basic point to choose a vpn is the speed: Generally the paid versions do not limit in this, however, it is important to consider the latency, rise and fall speed.

The type of data stored: Even if it is paid, it is possible to store some data such as the source IP or the time to which you have connected.

The protocols used by the VPN, since not all are equally safe. The most common are: PPTP, L2TP / IPSec, OpenPVN and SSTP. The PPTP is perhaps the least secure with some vulnerabilities discovered.

Of course, it does not hurt to compare prices and the forms of payment they offer, to know which one suits your pocket better.

Filed Under: HushApp Tips Tagged With: cybersecurity, Cybersecurity Tips, privacy, Secure VPN, VPN, VPN connection

Today’s Big Thing, “Big Data”: What You Need to Know

December 17, 2018 by HushApp Team

Today’s Big Thing, “Big Data”: What You Need to Know

We invite you to read Hogan Injury’s post, our special guests:

It is projected that by 2020, 1.7 megabytes of data will be generated for every person in the world, every single second; and the proportion of data that needs to be protected is growing faster than the digital universe itself. All the data coming in large volumes from different places is called Big Data.

Big data basically means sets of structured or unstructured data whose volumes are so large and so complex that traditional data processing software cannot process them within a reasonable amount of time. The information mined from these sets are then analyzed and put to good use. Big data involves more than just the volume and complexity of data, however. Doug Laney laid out the definition of big data in 3 V’s.

Volume: Data is collected from everyone, everywhere. From social media activity to online shopping, data can be farmed from everywhere.

Velocity: The speed at which data streams in near-real time thanks to RFID tags, sensors, and smart metering.

Variety: Big data comes in different formats—emails, texts, videos, forms, business transactions, etc.

Some real world uses for big data include:

  • Retail organizations and commercial companies monitor social media activities to find out emerging trends in the market. This way, they can ride the trend and start selling things people are clamoring for at that point in time.
  • Financial organizations analyze data from their clients to organize them into different groups. This categorizing results in more optimized programs that can better serve the needs of their clients. Data analyzed from their clients’ activities could also help detect fraud.
  • Hospitals analyze patient data to foresee which patients would most likely be readmitted and plan treatment programs that will prevent the patients from needing to be readmitted.
  • Industrial companies use machines that gather data that allows them to figure out when a certain machine would need upkeep or replacement.

Data extracted from big data can be very helpful in a lot of ways for many people and organizations. However, as a now famous fictional uncle once told his nephew, “with great power comes great responsibility.” There are two major considerations when trying to build a business around big data. One is data ownership — who has the rights to an individual person’s data and what rights do the government, financial, commercial or health institutions have to them.

The other is data protection. Once an institution or business has access to their clients’ data, how do they protect the private information that go through their systems on a daily basis?

With the scandal of data leaked or sold by such a large social media company as Facebook, more and more people are becoming aware of the dangers of leaving their personal data unprotected. Realizing that something as innocuous as answering online quizzes could actually be used for data mining is somewhat worrying.

Having a good grasp of the legal implications of going into big data is very important. Big data is still an emerging and growing market. If you have any concerns about the legality of anyone, be it an individual or an institution, using and keeping personal data, it is best to get in touch with a lawyer that understand the legalities surrounding data rights, privacy, and protection.

Contact us at Hogan Injury for expert legal advice.

Original text here

Filed Under: Cybersecurity Business Tagged With: big data, data, data leaked, data protection, data rights, information protection, privacy, private information

8 reasons why you should use HushApp in your day to day

November 27, 2018 by HushApp Team

8 reasons why you should use HushApp in your day to day

We have talked a lot about Hushapp and how it can help you in different aspects of your work. Now we want to show you that our application not only serves for labor issues, it can also be present in your day to day activities to add more protection and security to your digital life in a very simple way. Therefore, here are 8 very simple examples of how you can use HushApp in your everyday.

Basic uses: easy and safe

  1. Every day we accumulate more and more information, and need to find a safe place to store it. With HushApp this problem is easily solved because you can store data on your mobile device, keeping it handy and protected. HushApp easily secures all your files with important information, such as bank data, passwords, personal documents, etc. If you need to send a file to someone, you can do it from the app and they will be protected from the time you send them until your recipients receive it.  
  2. It is not only about protecting what we commonly consider confidential information, in HushApp you can store and send any type of file including photographs, videos, audio, etc. Remember that cyber attacks are becoming increasingly popular and anyone can be a victim. Suppose you lose your phone, if someone unwanted manages to access your device, they can not see anything within your HushBox, so your personal memories will be safe.

HushApp to protect your family:

  1. If we talk about photographs and privacy, surely the first thing that comes to mind are your precious family pictures. It is very common for parents to share those special moments with their little ones in social media for their birthdays, their first steps, when they said their first words and many more things. The issue lies in who can access the image of your kids, and what could they do with those files. When children have access to the internet, the danger is greater, since criminals take advantage of their innocence, they could contact them. Do not neglect yourself! Take charge and keep your minors safe by using safer alternatives like Hushapp to share these special moments.
  2. Children are getting smarter every day and frequently learning new ways to accessing your device. To prevent your children from accessing important files (for example your work documents and deleting them by mistake), keep them safe in your Hushbox and this will not cause you a unneeded headache with your boss 🙂
  3. As you take care of your children, you also can take care of your friends and aditional family, by capturing those special moments. Your Christmas photos, photographs, memories, etc. everything you can store and share with them (even if they do not have the application) is easily secured.

We do not want to know about your private life, we just want to protect it:

  1. Let’s be honest, everyone has secrets that they desire to be kept hidden. We are not all saints and we have a dark side, whatever it is, nobody can force you to expose your privacy. At HushApp we want to protect your private life, regardless what you do, because we have no way of knowing. We use zero knowledge technology therefore we can not access your files or your passwords.

Facilitate your work from home: 

  1. As mentioned previously, HushApp is clearly not just a business tool, however for the many times work does accompany us home, 
    Encryption is easy with HushApp!
    DOWNLOAD
    you might be asked to send documents to customers or suppliers. Or maybe you forgot something and decided to finish it out of the office. Or even you might be self-employed and work from home. HushApp is there to accompany you at all times. 
  2. If you are a fan of technology, and want to be at the forefront of everything that is the digital world, do not get stuck in the past. It is no longer necessary to have complex programs that only computers know how to use. Hushapp uses military grade encryption and even with such a complex system it remains super easy to use!

Encryption is easy …

We invite you to try Hushapp …

Filed Under: HushApp News Tagged With: encryption, HushApp, privacy, secure send files, send documents, send files, send files securely, share documents., share files, share files securely

What is end-to-end encryption and how do we use it in HushApp?

October 23, 2018 by HushApp Team

What is end-to-end encryption and how do we use it in HushApp?

Have you ever heard about end-to-end encryption? If you use applications such as Whatsapp or Telegram, you are already using this type of technology. This term has become recognizable thanks to these applications, but not only do they use this system, and besides the people who do not understand it, some have the ability to understand it is associated with a higher level of security. What is end-to-end encryption and what is it for?

What is end-to-end encryption?

Known in English as End-to-end encryption (E2EE), it is a communication system where only the users who communicate can read the messages. In principle, it prevents potential spies, including telecommunications service providers, the internet or any communication service, from accessing the cryptographic keys necessary to decipher the conversation. It is designed to overcome any attempt of surveillance or undesired alteration, since no third party will be able to decipher the data that is being communicated or stored.

To explain it in a simpler way, it is an encryption system that keeps the information protected in all phases of the process meaning that the only people who have access are the sender and the receiver.

Advantages and disadvantages

The main advantage of this type of system is to protect your information and privacy. Including anybody behind a service provider, only you and the recipient you choose will be able to access those files.

One of the great advantages is that companies that use end-to-end encryption can not deliver their clients’ text messages to authorities.

This brings a possible moral issue, that being that criminals may use such security to commit criminal activities. Although the debate may be extended, the advantages in terms of privacy may outweigh the concern of criminal activity.

Why do we use end-to-end encryption in HushApp?

Many messaging tools use this type of encryption to make communications more secure and private. However, it is important to note that this encryption system only offers a high level of security as long as it is implemented correctly. There are cases of recognized messaging companies who make promotions for using end-to-end encryption but aren’t even using it. They have suffered serious security breaches, due to the implementation they have made of this type of encryption. 

Give HushApp a Try!
BOOK A DEMO

To strengthen your security we use the passphrase, this is where we protect your files and transfers, the passphrase is the key used to authenticate the user. When you register on your device, a secret key is generated that will help you decipher the encrypted content you receive and or send.

This secret key is created and stored in the user’s device. Thus, only those who know the passphrase can recover the secret key which unlocks the content. When you log in again, you will be asked for your passphrase and the encrypted secret key will be decrypted with this same passphrase.

With HushApp you are the one in charge of giving more security to your files because the more complex the security passphrase you choose, the higher the level of protection. You can even know if your passphrase is sufficiently robust and complex to be deciphered, because the application assigns your profile a yellow (if regular) or green (if strong) shield based on this criterion.

That is why it is important that you do not forget your passphrase. Our application implements zero knowledge protocol, meaning we have no way to access your files, passwords or passphrases. So, if you cannot remember your phrase, you will not be able to recover your files.

We invite you to try HushApp …

Filed Under: HushApp News, Sin categorizar Tagged With: cybersecurity, E2EE, encryption, end to end encryption, passphrase, privacy

How to prevent Google from spying on your information?

October 18, 2018 by HushApp Team

How to prevent Google from spying on your information?

Have you ever happened to visit a place, see a product that catches your attention and minutes later see an advertisement with that same product on your phone? Yes, you’re not the only one who feels spied on. There is no doubt that Google knows more about us than  we know. They have the ability to listen to what you say and even store your password information. To prevent Google from spying on your information, follow some tips and make some simple configuration changes to some of its tools.

How to prevent Google from spying on you: Start with the basics

– You can use an anonymous search engine instead of Google Search, such as DuckDuckGo.

– Log out of your Google account whenever you are not using it (although it can be a bit tedious, this small measure can change your privacy)

– Use an other DNS than Google

– Block Google Adsense ads with an ad blocker.

Protect your passwords: Chrome can also save them 

The version of Chrome 69 not only made aesthetic changes, but automatically starts logging into users’ Google account by saving their passwords. To avoid remaining with your passwords, follow these steps:

– Open Chrome and copy this address in the search bar chrome: // flags /

– Then click on “Enter”

– In the search engine that appears, type: # account-consistency

– In the option “Identity consistency between browser and cookie jar” select the “Disable” drop-down.

– Below, the following message will appear: “Changes will be applied the next time you restart Google Chrome.” Then click on “Relaunch now” and the browser will restart.

Google can spy on you using your microphone: 

The microphone of your mobile is also an open door for the technological giant to hear and spy on you. To further protect your privacy, follow some of these tips:

Disable the “Ok Google”: If you use Google Assistant, it is almost certain that it is activated when you hear “Ok, Google”. For that, it is necessary that the application be 100% alert, always listening. The way to avoid being constantly heard is like this:

– Go to “Settings”.
– Go to “Google”.
– Access the “Search” option.
– Click on “Voice.
– Enter “Voice Recognition”.
– And finally, disable the “Ok, Google” option.

2) Prevent Google from saving your audio history

By authorizing Google to collect your personal information (which you have surely done by accepting, but not actually reading the terms and conditions) you should know that practically all the commands that you dictate to your mobile are registered. It’s like the search history on the Internet but in audio format.

You can also deactivate them in this site, go to the section “Voice and Audio Activity” and finally disable the scroll.

3) Block Google from your microphone:

You can also prevent Google from using the microphone completely by following these steps:-Go to Settings

-Select Applications.
– Scroll until you find the Google app and access it.
– Select Permission and deactivate Microphone.

What to do so that Google Maps does not follow your steps? 

Another way to prevent Google from spying on you is through Google Maps. You can follow your steps to all the places you went thanks to this tool. Although there are many advantages, such as recommending places according to your taste or providing you the most efficient mode of transportation. In actuality, it can be problematic because this method is one of the main tools used to collect your information. To prevent this from happening, you have some options that you can apply:

  • Use the Google Maps offline and download the maps beforehand, this will also help you limit the amount of data you spend.
  1. Open Google Maps
  2. Click on the button of the 3 vertical bars in the upper left corner
  3. Press “your chronology”
  4. Then in the upper right corner, press the button of the 3 vertical bars
  5. Select settings – application settings
  6. Press ” the location is activated “and change it to” NO “

You can also delete the history from the computer: 

Start using HushApp today.
SIGN UP

  1. Enter the google maps website
  2. Enter your email account
  3. Select menu -” Your chronology “
  4. Click on the wheel located at the bottom right
  5. Select “Delete all location history” – Accept

Although many of these tools are mainly designed for the usability and comfort of each person, if you do not take the appropriate measures for their use your information and privacy will be exposed without you noticing.

Filed Under: HushApp Tips Tagged With: Google, Google Assistant, Google Maps, Google spy, ok Google, passwords., privacy

logo HushApp made in EU

HushApp allows to protect and send files safely without complications, in any platform. Sign up for HushApp and enjoy the peace of mind of end-to-end encryption.


Product
Features Pricing Android App iOS App coming soon Web App
Users
Book a demo FAQ Guide Support
Business
Hush for Business GDPR Use cases
About
About us Jobs Terms of Use Privacy Policy Legal
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Read More
Privacy & Cookies Policy
Necessary Always Enabled