Home Social networking Inside Social Media Watch With MeWe Founder

Inside Social Media Watch With MeWe Founder

2
0

Mark Zuckerberg’s philosophy on privacy is reflected in Facebook’s long history of questionable practices. And whistleblower and former employee Frances Haugen revealed that Facebook executives know the platform spreads violence, hatred and misinformation. Tap or click here for the full story – plus how you can say goodbye for good.

More recently, we learned that Facebook is bypassing user permissions on iPhone. Even if you turn off location permissions, Facebook can access your phone’s accelerometer, according to Forbes. It is a built-in tool that keeps track of how you tilt your iPhone.

Your accelerometer is made up of motion sensors that analyze your vibrations and movements. This is useful when using compass apps and even sleep apps. It’s also beneficial for technology companies that want to harvest your data.

Worse, there’s no way to stop this invasive tracking

You can only stop it by removing the offending apps.

Despite Zuckerberg’s disregard for privacy, other tech leaders see a better way. Take MeWe founder Mark Weinstein, for example. He’s a direct competitor of Zuckerberg, so he’s pretty familiar with Facebook’s tricks.

I spoke with him in my free podcast, Kim Komando Explains. He says we need a revolution to get our privacy back. But why is that? How could things have gone so wrong and what would a revolution look like?

You’ll find all of this and more in this episode.

I spoke with Mark about how your favorite apps follow, monitor, and spy on you. We are talking about the most important privacy issues with social media services. You’ll learn essential social media safety tips for teens, kids, parents, and more.

Everyone should prioritize their online safety because social media apps won’t do the heavy lifting for you. After this episode, you will learn all about surveillance capitalism. Mark and I will share the best tips and tricks for staying private online. Don’t miss out on these defense strategies.

for example

Keep reading


Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here