The Dangers of Sharing Passwords: Protecting Yourself from Digital Revenge

2023-11-12 06:45:00

More than half of French people share their passwords for their social networks both on the phone and computer, with their partner. This observation nevertheless raises questions.

Two thirds of French people know their partner’s passwords. As long as we’re a couple, everything is fine. But when you break up, the damage can be colossal to your digital data.

64% of French people share their passwords as a couple

Everything obviously depends on the conditions of the separation, but when things go wrong, clearly, it is better not to forget to change your password. 64% of French people share their passwords with their significant other.

And above all, in the event of a breakup, half of French people do not change their password and 14% still know the password of a former partner and therefore have access most of the time to their social network accounts, those of the mailbox or even those of banking information.

According to a recent study, a third of French people suspect their ex of having already used their password for bad purposes, and this even rises to one in two in the 35-44 year old bracket, which is the most suspicious.

The abuses observed or at least suspected vary. We may observe in particular a modification of the parameters of your account, a change of password and blocked access, sending of spam to your friends or more serious. Using information to geolocate you or impersonate you or to pay from your bank accounts.

Revenge can go far and clearly digital technology is a formidable weapon.

How to protect yourself from “digital revenge”?

You can activate double authentication, with fingerprints or sending an SMS, especially for the most sensitive services.

Turn off app geolocation. Reset the list of devices allowed to connect to your accounts. You will receive an alert if a connection attempt is made from a device that is not registered.

In the most extreme cases, also pay attention to spyware applications, even if we get into cases that go very far, they exist.

So-called “stalkerware”, software for “stalking”, digitally monitoring the person of their choice.

Let us remember from the outset that this is completely prohibited: it constitutes an invasion of the privacy of others and is a criminal offense. That doesn’t stop these spy applications from proliferating, there are dozens of them.

Many don’t even know they exist, and yet there are dozens of them. It’s an extremely lucrative business and for good reason: they allow you to easily and discreetly monitor the every move of the person of your choice.

All you need is access to your phone for two minutes. Discreetly, we download the application onto the phone of the person in question.

From this moment on, you can, from your own smartphone, monitor all your activities. We have a dashboard that shows where it is, using GPS. You can read SMS, emails, Facebook publications, call history all remotely, see photos, internet browsing history.

It can even be used remotely with the phone’s speaker to listen to non-telephone conversations, anything that happens around the person wearing the phone, a meeting for example.

Signs of spying in progress

The problem is that you can completely disappear the icon of the phone you want to spy on, or hide it in the submenus where the person being spied on will never look.

Some clues: if your battery discharges very quickly or the phone runs slowly.

Because these applications are energy hungry because they constantly send files from one device to another.

Solutions to protect yourself: protect your smartphone in advance and never lend it. If in doubt, the simplest solution is to check all the applications on your smartphone.

If there is an icon that you do not know, that you did not install yourself, it is suspicious, use an antivirus which will detect, through a scan, the “stalkerware”.

Top Articles

1699772013
#Sharing #passwords #couple #wrong #idea

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.