Share on Social Media:

How to Remove Your Digital Ex

Divorce or breakup can be heartbreaking. And the heartbreak can prove all the more intense if we’re unable to avoid contact with our exes- or reminders of life with them. So if you’ve suffered a breakup, then, how can you remove your ex from your digital life?

Wisconsin Court System - Court services - For the public - Self-help law  center

Block or Unfollow Your Ex

This would seem to be elementary. Most of us, though, find it difficult to suppress curiosity about our exes. Still, we have to discipline ourselves to avoid searching their profiles. If we do search them, we train the Facebook, Twitter, or Instagram algorithms to show us more about them, and this is also true of inquiries on browser search engines such as Google, Safari, or Firefox.

You may also have to mute friends or family members (temporarily, of course) who often share photos of your ex. This tells the algorithms you want to avoid these people, and your feed will feature different posts.

Remove Memories from Your Tablets, Phones, and Social Media

If you own one of the newer iPhones, this will be easy. In iOS 14, you’ll find a tool labelled Suggest Fewer Memories Like This. To activate it, open the Photos tab. Tap the For You icon, and you’ll find a list labelled Memory. Choose one you want to eliminate. You’ll find three dots next to your choice. Hit these, and you’ll be shown two options: Delete Memory and Suggest Fewer Memories Like This.

In Facebook, you’ll find the Hide People option on the left side of the Memories page.

Google Photos offers the options of hiding people, pets, or even particular dates- so you can avoid painful reminders of anniversaries. Find the Photos app, scroll to Photo Settings, and open the Memories tab. When you find it, hit the Hide People or Pets or Hide Date icons.

Monitor Your Smart Home Devices

If you neglect this step, you’re begging for trouble. Out of concern for privacy, we recommend NOT acquiring an Alexa or Siri device in the first place. If you do have one, though, and you can’t bear to part with it, at least exercise caution with it. An ex could activate the device remotely- even when you’re away from your home.

Kim Komando, a web expert who bills herself “Your Digital Goddess”, says she’s heard more stories than she can count about exes connecting to WiFi systems of old mates and bugging their routers. Even worse, it’s legal in most jurisdictions to hack WiFi.

Remove or Audit Old Accounts

Some web services, such as iCloud and Google Drive, allow access by exes to sensitive data, including text and photos, so you may have to contact the provider to remove your ex’s access. Exercise special vigilance in monitoring shared paid services, and ejecting your ex if necessary.

Change Your Passwords and Security Questions

Kim Komando suggests changing your passwords to any old accounts if there’s even a chance your ex still has them. And don’t forget the security questions. Even in a casual relationship, partners are likely remember important events in each other’s histories.

For paid services, such as Netflix, you may need additional steps after changing passwords. Check the box marked Require All Devices to Sign in Again with New Password. You’ll have to log in again, but your privacy- and avoiding additional expense- is worth the inconvenience.

************************************************************************************

If you want to remove your ex from your online activity, these suggestions will help. Remember: eternal vigilance is the price of privacy.

1-855-216-0185

One of the most important aspects of online security is a reliable internet connection. For the best deals in internet service, contact Satellite Country. We can help. Call now.

1-855-216-0185

Share on Social Media:

CONNECTED DEVICES & PRIVACY

Image result for cat dog conspiracy

Can you keep a secret? No, you can’t, at least not for long. With ever more of your electronic devices, appliances, utility meters, fitness trackers, and home security systems connected to the internet, it’s nearly certain that at least one of them will rat on you sooner or later.

Could Your Devices Be Subpoenaed?

Allison Berman, writing for Singularity Hub, warned that the connected devices in your home could be subpoenaed as witnesses against you. She cited a 2015 murder case, for which police asked Amazon to turn over cloud-based data sent by an Alexa-enabled Echo device in the home of James Andrew Bates, in whose hot tub detectives had found the body of his colleague, Victor Collins. On the night of the murder, the device had been used for streaming music. The Echo device, equipped with seven mikes, listens constantly for the ‘wake word’ that will activate it, making it receptive to commands. Just before and after sensing the wake word, Echo begins recording sound and transmitting it to Amazon’s cloud.

Police believe the Echo device may have recorded audio germane to their investigation.

In the near future, police may solve crimes by interrogating refrigerators, thermostats, TV sets, stereos, phones, tablets, and security systems. With multiple electronic witnesses, they can obtain fairly accurate and comprehensive pictures of the crimes, as they seek to do by interviewing multiple witnesses to an auto accident.

Privacy laws regarding connected devices are very weak. Because the information is stored in the cloud, the owner or user of the devices doesn’t own the data they transmit. It’s not protected to the same degree that documents in his house are.

Could Your Connected Devices Be Hacked?

Of course, any connected device can be hacked. If Alexa is hacked, could a hostile party listen to everything you say in your home? And if you have twenty connected devices in your home, a hacker might obtain eerily accurate and complete information about what you do all day. Could he use it to blackmail you? What could a stalker do if he knows where you’ll be, when, and for what reason?

Hackers could also hijack your devices to spread false information about you. Patrick Frey, who blogs as ‘Patterico’, suffered a ’SWATting’ attack in 2011 after a hacker ‘spoofed’ his cellphone number to place a midnight 911 call. Pretending to be Frey, the caller said he had shot his wife.

Sheriff’s deputies pounded on Frey’s door and rang his doorbell. When he opened the door, they pointed their guns at him and told him to put his hands up. The deputies handcuffed Frey and placed him in a squad car. Then they awakened his wife, led her downstairs, and frisked her. After ascertaining that the children were safe, the police finally left.

The incident could easily have cost Frey his life. Cops are likely to be nervous in confronting a man they believe to be armed and to have just committed a murder.

Can You Trust Browsers and Social Media?

Loss of privacy need not require either hacking or law enforcement inquiry. Certain browsers, such as Google, and social media, such as Facebook, offer overly complicated terms of service– as long as 30,000 words. Few, if any, users read them. The rules are nearly inscrutable for a reason. They’re meant to protect providers from liability, not to protect your privacy.

Since you don’t pay for Google and Facebook services, you are their product. They earn their money through sale of advertising, so they want as much data about you as possible. Their advertisers demand it.

Two years ago, Facebook faced a media firestorm after the discovery that it had been manipulating the emotional states of thousands of users. Facebook had learned that the emotional impact of the images it showed users would affect the character of their posts. With this information, it could reinforce advertising messages.

You reveal far more through social media than you’d guess. MIT’s ‘Gaydar’ project confirmed that one could reliably infer that a particular subject was gay, based solely on his social media posts, even if he had never admitted it openly, and even if he was trying strenuously to keep it hidden. Another MIT project, called ‘Psychopath’, tracked social media posts to determine presence or absence of schizophrenia.

Can You Trust Your Smart TV Set?

On Monday, February 6, Vizio settled a lawsuit over claims that it had violated consumer privacy. The plaintiffs had alleged that Vizio’s connected ‘smart’ TV sets had been tracking ‘second by second’ data about customer viewing habits. To this, Vizio had allegedly added specific demographic information: age, sex, marital status, size of household, income, home ownership, and household value. The company is alleged to have sold this information to third parties. The third parties would use it to enable targeted advertising.

LG and Samsung have also been accused of collecting viewer data through their connected TV sets.

What Can You Do?

What can you do to protect yourself? Update your passwords often. Encrypt what you can. Always stay aware of when your connected devices are switched on.

It may help to assume that everything you do will become public- and live accordingly.

(For the most reliable connection, talk to us. We can help.)