Mainland, Lagos State, Nigeria
let's talk
Is Your Phone Spying on You? 4-Step Personal Security Audit

Your data is everywhere and you surely do need a personal security audit. Right now, AI systems are analyzing your photos, reading your messages, tracking your location, and learning your habits. Tech companies call this “personalization.” Privacy advocates call it surveillance. Whatever you call it, one thing is certain: you’re probably sharing more than you realize.

Here’s the uncomfortable truth—every app on your phone is collecting data about you. Some use it to improve their services. Others sell it to advertisers. Many feed it into AI training models that will exist long after you’ve deleted the app. And most people have no idea how much access they’ve granted or how to take it back.

The good news? You don’t need to be a cybersecurity expert or live off the grid to protect your privacy. You just need to spend a few hours conducting a personal security audit and making strategic changes to how you interact with technology. This guide walks you through a complete personal security audit to help you take back control of your data.

Why a Personal Security Audit Matters More Than Ever in 2026

You might be thinking, “I have nothing to hide, so why should I care?” That’s the wrong question. Privacy isn’t about hiding—it’s about control. It’s about deciding who knows what about you and how that information gets used.

The AI Training Problem

Every photo you upload, every message you send, and every search you make can potentially become training data for AI systems. Companies like Meta, OpenAI, and Google use user-generated content to train their AI models, which then become products they sell or license to others.

This creates a bizarre situation where your personal data—your words, your face, your creative work—becomes part of a commercial product without meaningful compensation or ongoing consent. Once your data enters an AI training set, it’s nearly impossible to remove, even if you later delete your account or change your mind.

AI is already shaping how businesses operate and how society functions at large.
Think AI is only about privacy risks? See how it’s transforming business and society-> Read now

The Data Broker Industry

Beyond the apps and services you use directly, there’s a massive industry of data brokers you’ve probably never heard of. These companies collect information from public records, purchase data from apps and websites, and compile detailed profiles about you—your income, shopping habits, health conditions, political views, and more.

They sell these profiles to advertisers, insurance companies, employers, and anyone else willing to pay. You never consented to this collection, you’re not compensated for it, and you likely don’t even know which companies have files on you.

Security Breaches and Identity Theft

The more places your data exists, the more opportunities for it to be stolen. Major data breaches happen constantly—millions of records exposed from companies that promised to protect your information. Once your data is out there, it can be used for identity theft, fraud, or harassment years later.

Protecting your privacy isn’t paranoia—it’s pragmatic risk management in an increasingly connected world.

Step 1: Start Your Personal Security Audit by Reviewing App Permissions

Your phone contains some of the most intimate details of your life, and you’ve likely given dozens of apps access to it without really thinking about why they need it. This step is one of the most important parts of your personal security audit, as it controls what apps can access

Conducting Your Permission Audit on iPhone

Open Settings and scroll down to see all your installed apps. Tap on each app individually and review what permissions it has. You’ll see categories like Location, Camera, Microphone, Photos, Contacts, and more.

Ask yourself the critical question for each permission: “Does this app genuinely need this access to function, or is it just convenient for data collection?” A navigation app needs your location. A flashlight app doesn’t need your contacts, camera, or microphone.

Mobile phone displaying app permission controls for location, camera, microphone, and contacts during a personal security audit for privacy management

Location Services: This is the biggest privacy leak on most phones. Go to Settings > Privacy & Security > Location Services. You’ll see which apps have location access and when they’re using it. Change unnecessary apps from “Always” to “While Using the App” or “Never.” Does your weather app really need to track you when it’s not open? Probably not.

Photos Access: Many apps request full photo library access when they only need to access one image at a time. On iOS 14 and later, choose “Select Photos” instead of “All Photos” whenever possible. This lets you share specific images without giving apps access to your entire photo history.

Camera and Microphone: Review which apps have camera and microphone access. Social media, video chat, and camera apps make sense. Random games and utilities don’t. Revoke access to anything that doesn’t need it. You can always grant temporary access when you actually want to use a feature.

Conducting Your Permission Audit on Android

Open Settings > Privacy > Permission Manager. This gives you a comprehensive view of all permissions categorized by type (Location, Camera, Microphone, etc.) rather than by app.

Tap each permission category to see which apps have access. Android gives you three main options: “Allow all the time,” “Allow only while using the app,” and “Don’t allow.” Be aggressive with downgrading permissions.

Background Location: This is particularly important on Android. Many apps request location access and then continue tracking you even when you’re not using them. Go through each app with location permission and ask whether it needs to track you in the background. For most apps, “Allow only while using” is sufficient.

Special App Access: Don’t forget about special permissions. Go to Settings > Apps > Special App Access to review things like “Notification access,” “Display over other apps,” and “Usage access.” These powerful permissions can be exploited for tracking and should only be granted to trusted apps that genuinely need them.

The Permission Minimization Principle

Going forward, adopt the principle of minimum necessary permissions. When installing new apps, deny all permissions by default. Use the app and see what breaks. When a feature doesn’t work, the app will request the specific permission it needs, and you can make an informed decision in context.

This approach feels annoying at first but quickly becomes second nature. You’ll be surprised how many apps work perfectly fine with zero permissions, and you’ll catch the data-hungry ones immediately when they request access to everything.

Step 2: Opt Out of AI Training on Social Media

Tech companies have quietly updated their terms of service to use your content for AI training. Unless you explicitly opt out, your posts, photos, and messages are fair game. As part of your personal security audit, limiting how your data is used for AI training is critical.

Opting Out on Meta Platforms (Facebook and Instagram)

Meta has been particularly aggressive about using user content for AI training. To opt out on Facebook, go to Settings > Privacy > Privacy Center. Look for a section about “How Meta Uses Information for Generative AI Models” or similar wording (Meta frequently changes menu locations).

You’ll need to submit a form explaining why you’re opting out. This is intentionally cumbersome—they don’t want you to do it. Be persistent. State that you don’t consent to your content being used for AI training and want your data excluded from training datasets.

For Instagram, the process is similar: Settings > Privacy > Data Use for Generative AI. Submit your opt-out request. Note that Meta may take weeks to process these requests, and you may need to follow up.

Important limitation: Opting out prevents future use of your content but doesn’t remove data that’s already been collected. There’s no way to “untrain” an AI model that’s already learned from your posts. This is why acting quickly matters.

Opting Out on X (Twitter)

X uses your posts to train Grok, their AI chatbot. Go to Settings > Privacy and Safety > Data Sharing and Personalization. Look for options related to “Allow use of your data for AI training” or “Grok data sharing” and disable them.

X has also changed settings locations frequently, so if you don’t find these exact options, search their help center for “AI training opt out” to find current instructions.

Opting Out on LinkedIn

LinkedIn uses member data to train AI features. Go to Settings > Data Privacy > Data for Generative AI Improvement and toggle it off. LinkedIn makes this relatively straightforward compared to other platforms, likely due to professional users being more privacy-conscious.

Managing AI Training on Other Platforms

Many platforms don’t offer clear opt-out mechanisms yet. For platforms without obvious settings:

Check Terms of Service updates: Companies often announce AI training policies in ToS updates that users click through without reading. Search the terms for “AI,” “machine learning,” or “training data.”

Submit privacy requests: Under GDPR (if you’re in Europe) or similar privacy laws, you can submit formal requests asking companies not to use your data for AI training. Companies are legally required to respond, though enforcement varies.

Consider reducing your footprint: If you can’t opt out of AI training on a platform you use, consider what you share there. Avoid posting personal photos, proprietary work, or creative content on platforms that claim ownership for AI training.

The same data used for AI training isn’t just for ads—it powers real-world applications.
AI isn’t just tracking your data—it’s transforming how your health is managed. See how here.

Reddit’s Special Case

Reddit has struck deals to license user content to AI companies. There’s no opt-out for this licensing. Your comments and posts from years ago are being used to train commercial AI models. Your options are limited: you can delete your account and request data removal under privacy laws, but content you’ve already posted may persist in AI training sets.

This illustrates an important principle: once data is collected and used for AI training, it’s extremely difficult to truly erase your contribution. Prevention is far more effective than remediation.

Step 3: Strengthen Your Personal Security Audit with Two-Factor Authentication

Passwords alone are no longer sufficient security. If your password is compromised in a data breach—and millions are every year—your account is wide open unless you have two-factor authentication (2FA) enabled. No personal security audit is complete without securing your accounts with two-factor authentication.

Understanding Two-Factor Authentication

Two-factor authentication requires two different types of verification to access your account: something you know (your password) and something you have (your phone, a security key, or an authentication app). Even if someone steals your password, they can’t access your account without the second factor.

This dramatically improves security. According to Microsoft, enabling any form of 2FA blocks 99.9% of automated account attacks. It’s the single most effective security measure most people aren’t using.

Smartphone displaying two-factor authentication setup with QR code and security key options during a personal security audit for account protection

Choosing the Right Type of 2FA

Not all 2FA is equally secure. Here’s the hierarchy from least to most secure:

SMS-based 2FA (least secure):You receive a code via text message. This is better than nothing but vulnerable to SIM-swapping attacks where hackers convince your phone carrier to transfer your number to their device. Use this only if no better option exists.

Email-based 2FA: Similar to SMS but uses email. Vulnerable if your email account gets compromised. Only slightly better than SMS.

Authenticator Apps (good security): Apps like Google Authenticator, Microsoft Authenticator, or Authy generate time-based codes on your device. Much more secure than SMS because hackers can’t intercept the codes. This is the sweet spot of security and convenience for most people.

Hardware Security Keys (best security): Physical devices like YubiKey that you plug into your device or tap via NFC. Nearly impossible to phish or hack remotely. Ideal for your most important accounts (email, banking, password manager), though they cost $25-50 and can be lost.

Setting Up 2FA on Critical Accounts

Start with accounts that, if compromised, would cause the most damage or could be used to compromise other accounts:

Email:Your primary email is the master key to your digital life. Most password reset flows send recovery emails. If someone controls your email, they can reset passwords for everything else. Enable the strongest 2FA your email provider offers—preferably authenticator app or security key.

Password Manager: If you use a password manager (you should), protect it with 2FA. A compromised password manager means all your accounts are vulnerable.

Banking and Financial Services: Enable 2FA on all bank accounts, investment accounts, PayPal, Venmo, and any other financial services. Many banks default to SMS, but check if they offer authenticator apps.

Social Media: Protect your social media accounts, especially if you use them for business or have a large following. Compromised social accounts are often used for scams targeting your followers.

Cloud Storage: Google Drive, iCloud, Dropbox, and similar services likely contain sensitive documents, photos, and backups. Enable 2FA to prevent unauthorized access to your stored data.

The Recovery Code Safety Net

When you enable 2FA, services provide backup recovery codes—usually 8-10 random codes you can use if you lose access to your primary 2FA method. These are critical. If you lose your phone and don’t have recovery codes, you could be permanently locked out of your accounts.

Download recovery codes immediately when enabling 2FA. Store them securely—either in a password manager, a encrypted file on a separate device, or printed and kept in a safe place. Don’t keep them in the same place as your phone (that defeats the purpose).

Managing 2FA Across Devices

Use an authenticator app that syncs across devices (like Microsoft Authenticator or Authy with backups enabled) or use your password manager’s built-in authenticator feature. This ensures you don’t lose access to all your accounts if your phone dies or gets lost.

If using Google Authenticator, be aware it doesn’t sync by default in older versions. If you get a new phone, you’ll need to manually transfer accounts or have recovery codes ready.

Step 4: Review and Minimize Your Digital Footprint

Beyond app permissions and 2FA, reducing your overall digital footprint limits how much data exists about you in the first place.

Delete Unused Accounts

You probably have accounts on dozens of services you haven’t used in years. Each one is a security risk and privacy liability. Go through your email and identify services you’ve signed up for but no longer use. Delete those accounts entirely.

Many services make account deletion deliberately difficult. Search for “[service name] delete account” to find instructions. Some hide the delete option deep in settings or require emailing support. Be persistent.

Why this matters: Unused accounts often have outdated passwords and no 2FA. They’re easy targets for hackers. Once compromised, they can be used for spam, scams, or as entry points to other accounts if you reused passwords.

Audit Browser Extensions

Browser extensions can access everything you do online—every website you visit, every
password you enter, everything you type. Many extensions track this data for advertising or sell
it to third parties.

Review your installed extensions. Keep only ones you actively use from developers you trust.
Look for extensions from established companies or open-source projects with good reputations.
Remove anything you installed once and forgot about.

Check extension permissions. Click the extension icon and look at what data it can access.
Does your coupon finder need permission to “read and change all your data on all websites”?
That’s excessive. Find alternatives with minimal permissions.

Control Your Search Engine Data

Google’s business model is tracking your searches to build an advertising profile. Consider
alternatives like DuckDuckGo or Brave Search that don’t track or profile you.

If you prefer Google’s results, at least use privacy-focused settings. Go to
myactivity.google.com and review what Google has recorded. You can delete your search
history and disable future tracking (though this impacts personalized results).

Manage Social Media Privacy Settings

Even if you’re keeping social media accounts, lock down privacy settings. On Facebook, review
who can see your posts (Friends vs. Public), who can find you in searches, and who can send
you friend requests. On Instagram, consider switching to a private account if you don’t need
public visibility.

Regularly review your followers and friends lists. Remove people you don’t actually know.
Periodically check what’s visible on your profile by viewing it while logged out or using
Facebook’s “View As” feature.

Computer displaying privacy dashboard with connected apps, data access permissions, and security settings during a personal security audit for digital footprint management

Review Connected Apps and Services

Most platforms let third-party apps access your data. Go to security settings on major platforms
and review connected apps:

Google: myaccount.google.com/permissions - shows apps and services with access to your
Google account
Facebook: Settings > Security > Apps and Websites - shows apps you’ve logged into using
Facebook
Apple: Settings > [Your Name] > Sign-In & Security > Apps Using Your Apple ID
Microsoft: account.microsoft.com/privacy > Apps and services

Remove anything you don’t recognize or no longer use. When apps request access to your
accounts, think carefully about whether they genuinely need it or if you could create a separate
account instead.

Step 5: Implement Ongoing Privacy Practices

Security and privacy aren’t one-time tasks—they require ongoing vigilance. Build these
practices into your routine.

Monthly Privacy Check-In

Set a recurring calendar reminder to review your privacy settings monthly. Spend 15 minutes
checking:

  • New app installations and their permissions
  • Recent account activity on important services (most have security logs)
  • Privacy settings on platforms (companies change these regularly)
  • Checking for data breaches involving your email addresses at haveibeenpwned.com

This regular review catches problems early and keeps privacy top of mind rather than forgotten
until something goes wrong.

Use Different Emails for Different Purposes

Create multiple email addresses for different use cases:

  • One for important accounts (banking, healthcare, government)
  • One for shopping and newsletters
  • One for social media
  • Disposable addresses for one-time signups

This compartmentalization limits damage when breaches occur. If your shopping email gets
compromised, it doesn’t affect your bank. Services like Apple’s “Hide My Email” or SimpleLogin
make creating unlimited forwarding addresses easy.

Practice Good Password Hygiene

Use a password manager (Bitwarden, 1Password, or your browser’s built-in manager) to
generate and store unique passwords for every account. Never reuse passwords across sites.

Enable password manager autofill but review what it’s filling. Phishing sites try to trick password
managers by mimicking legitimate domains. Always verify the URL before entering credentials.

Change passwords immediately if a service you use experiences a breach. Check
haveibeenpwned.com periodically to see if your email appears in known breaches.

Be Skeptical of “Free” Services

If you’re not paying for a product, you are the product. Free services fund themselves through
advertising, which requires collecting and analyzing user data. Before using free services,
understand their business model and what data they’re collecting.

Consider paying for privacy-respecting alternatives to popular services. Email providers like
ProtonMail or Fastmail, search engines like Kagi, and cloud storage like Tresorit prioritize
privacy because they’re funded by user subscriptions, not advertising.

Stay Informed About Privacy Issues

Privacy threats evolve constantly. Follow privacy-focused news sources and organizations like
the Electronic Frontier Foundation (EFF), Restore Privacy, or Privacy Guides to stay informed
about new risks and protection strategies.

When apps or services announce policy changes, actually read what’s changing (or at least
read summaries from privacy advocates). Companies often slip new tracking or data sharing
into updated terms, hoping users won’t notice.

The Privacy Paradox: Balancing Convenience and Control

Let’s be honest: maximum privacy requires sacrifices. The most privacy-respecting approach is
using no technology at all. But that’s not realistic or desirable for most people. The goal is
finding your personal balance between convenience and privacy.

Deciding Your Privacy Priorities

Not all privacy is equally important. Your banking information and health records warrant
stronger protection than what movies you watch on Netflix. Identify your highest-priority privacy
concerns and focus efforts there.

Some people care most about government surveillance. Others worry about corporate data
collection. Some focus on preventing identity theft. Your threat model—what you’re most
concerned about and who you’re protecting against—should guide your decisions.

The real challenge isn’t just setting boundaries—it’s sticking to them in a world designed to keep you engaged.
Trying to cut screen time but failing? Here’s why your strategy isn’t working.

Privacy as a Spectrum

Think of privacy as a spectrum rather than binary. You don’t need to be perfectly private in all
areas. Maybe you use privacy-respecting tools for sensitive communications but don’t worry
about tracking on entertainment sites. That’s fine. Imperfect privacy protection is infinitely better
than none.

The Network Effect Challenge

Many privacy-respecting alternatives lack the network effects that make mainstream platforms
valuable. You might prefer Signal’s privacy to WhatsApp, but if everyone you know uses
WhatsApp, switching means losing connections.

You can still make privacy-respecting choices within mainstream platforms by adjusting settings,
limiting what you share, and using privacy tools like VPNs. Perfect is the enemy of good—take
the privacy wins you can get without completely isolating yourself.

Complete Your Personal Security Audit in 30 Days

This article covered a lot. Don’t try to implement everything at once—you’ll get overwhelmed
and quit. Here’s a realistic 30-day plan to gradually improve your privacy.

First Week: Audit and 2FA

  • Day 1-3: Conduct app permission audit on all devices
  • Day 4-5: Enable 2FA on email and password manager
  • Day 6-7: Enable 2FA on banking and top 3 most-used accounts

Second Week: Social Media and Accounts

  • Day 8-10: Opt out of AI training on all social platforms
  • Day 11-12: Review and tighten social media privacy settings
  • Day 13-14: Identify and delete 5 unused old accounts

Third Week: Digital Footprint

  • Day 15-17: Review and remove unnecessary browser extensions
  • Day 18-19: Audit connected apps on Google, Facebook, Apple accounts
  • Day 20-21: Check haveibeenpwned.com and change compromised passwords

Forth Week: Ongoing Practices

  • Day 22-24: Set up password manager with unique passwords for all accounts
  • Day 25-27: Create alternate email addresses for different purposes
  • Day 28-30: Set up monthly privacy check-in calendar reminders

By the end of 30 days, you’ll have dramatically improved your privacy posture without
overwhelming yourself with changes all at once.

Your personal security audit extends beyond security settings—it includes how you spend your time and attention. Learn how to be more intentional with technology in our guide on digital intentionality and screen time management, and discover how AI tools can enhance productivity while respecting your data.

FAQ About Privacy Protection

Will protecting my privacy make apps and services stop working properly?

Some functionality might break, but less than you’d think. Most features work fine with tightened
permissions—apps request more access than they need because more data equals more profit.
You might need to grant temporary permissions for specific features, but core functionality rarely
requires constant access to everything. Start strict and loosen only what’s necessary. You’ll be
surprised how much works perfectly with minimal permissions.

Is it too late if my data is already in AI training models?

For data already collected, yes—there’s no “undo” button for AI training. However, limiting future
data collection is still valuable. It prevents further contribution to datasets, reduces your attack
surface for breaches, and gives you more control going forward. Think of it like exercise: starting
today won’t erase past inactivity, but it absolutely improves your future health. Every step
toward better privacy helps.

Do I really need two-factor authentication if I have strong passwords?

Yes, absolutely. Even complex passwords get compromised through no fault of
yours—company breaches, keyloggers, phishing, and database leaks expose passwords
constantly. You can’t control whether services you use get hacked, but you can control whether
hackers can access your account even with your password. 2FA is your last line of defense
when everything else fails. The question isn’t whether to use it, but which type to use.

Aren’t privacy measures only necessary for people doing something wrong?

This “nothing to hide” argument is fundamentally flawed. Privacy isn’t about hiding
wrongdoing—it’s about control, dignity, and preventing misuse of your information. You lock
your bathroom door not because you’re doing anything wrong, but because some things are
private. Your data can be used against you through identity theft, discrimination, manipulation,
or simply making you uncomfortable. Privacy is a right, not something you must justify.

How can I protect my privacy without spending money on paid services?

Many effective privacy measures are completely free: reviewing app permissions, enabling 2FA
with authenticator apps, opting out of AI training, using strong passwords, deleting old accounts,
and adjusting privacy settings costs nothing but time. Free tools like Signal, DuckDuckGo, and
Bitwarden offer excellent privacy protection. Paid services provide additional features and
convenience, but you can achieve solid privacy on a zero budget if you’re willing to invest effort
instead of money.

Additional Resources for Privacy Protection

Electronic Frontier Foundation (EFF) Surveillance Self-Defense -
Comprehensive expert guides on protecting yourself from digital surveillance, covering
everything from basic account security to advanced encryption techniques, maintained by
leading digital rights advocates.

Privacy Guides - Community-driven resource providing
unbiased recommendations for privacy-respecting tools, services, and software across all
platforms, regularly updated with the latest privacy developments and threats.

Have I Been Pwned - Free service that lets you check if
your email or phone number has been exposed in known data breaches, helping you identify
which accounts need immediate password changes and security attention.

Leave a Reply

Your email address will not be published. Required fields are marked *

Scroll to Top