Content of the material
- Adobe Support Community
- How do I deny TikTok access to contacts
- Lax security practices
- What does the Galaxy store app do
- Learn the Basics
- Guarding your privacy
- How to avoid granting excessive permissions
- How to protect your personal information
- How to check what apps are using data from your Facebook account
- How to check what apps are using data from your Google account
Adobe Support Community
Turn on suggestions Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type. Showing results for Show only | Search instead for Did you mean:
How do I deny TikTok access to contactsAnswered By: Hunter King Date: created: Jul 20 2021
Step 1: Tap the profile icon in the bottom-right corner of the screen. Step 2: Tap the three dots in the top-right corner of the screen. Step 3: Tap “Privacy and Safety.” Step 4: Tap the toggle to the right of “Allow Others to Find Me” to stop TikTok from giving other users the suggestion to follow you.Asked By: Simon Ward Date: created: Dec 10 2021
Lax security practices
Meanwhile, only a minority of apps implement certificate pinning at login: 8 percent of Android apps and 11 percent of iOS apps. What is certificate pinning? It’s a security precaution that helps prevent attackers intercepting supposedly secure communications. It does this by ensuring the app only communicates with a server using the correct security certificate.
However, there are differing opinions about certificate pinning. For example, Apple says it doesn’t recommend that apps do their own certificate pinning, as it’s an approach that can lead to overall fragility and problems in enterprise environments.
What does the Galaxy store app doAnswered By: Austin Gonzalez Date: created: Dec 29 2020
Enjoy a world of convenience right at your fingertips. Galaxy Apps is an app store that comes bundled on Galaxy and Gear devices. The Galaxy Apps store is also a go-to source for perks and deals offered only to Galaxy and Gear users.Asked By: Devin Anderson Date: created: Mar 12 2021
Learn the BasicsCheck out our Frequently Asked Questions page for information on Community features, and tips to make the most of your time here.
Guarding your privacy
How to avoid granting excessive permissions
Before you install an app:
- Read the permissions required for the app.
- Think about why an app needs the permissions it requests. If the permissions seem excessive, ask yourself if it’s likely they are there simply to acquire data about you.
If you have already installed the app:
- In the case of Android apps, you can remove unnecessary permissions by going to the Settings menu and then clicking on Permissions. Removing permissions may cause a poorly designed app to stop working. Well-designed apps will indicate if they need a permission when you attempt to perform the function that requires it.
- In the case of iOS apps, you can remove unnecessary permissions by going to the Settings menu and then clicking on Privacy.
How to protect your personal information
- Ideally, don’t sign into an app using your social networking site account. If you do, check what data the app will receive from the social network account.
- If you do sign into apps using your social network account, be frugal about how much information you provide in your public profile on social networking sites.
- When you post data to a social networking site from an app, think about whether you want the social networking site to have this information about your app.
How to check what apps are using data from your Facebook account
- Go to the small down-arrow at the top right of the homepage and select Settings.
- Select “Apps & Websites in the menu on the left to discover what apps are actively using your data.
- Select each app to view and edit the permissions on the data it uses.
How to check what apps are using data from your Google account
- Here you can review and edit what third-party apps have access to your Google account.
You can also review and edit which apps are using Google for sign in and what information is being shared with them.