Your data is out there

1 October 2019 Information Security

With the advent of GDPR and in-depth privacy settings, you would be forgiven for thinking that you have more control over your data than ever. But despite the familiar site message asking if you’re willing to accept cookies, many don’t realise what this entails – and it can be hard to keep track of what data you’ve given away.

A new tool from vpnMentor highlights the data different major websites holds on you, as listed in their privacy policies. With over 7,2 billion accounts held across the services studied, including platforms like Google, Facebook, Amazon, and Tinder, how many are aware of the finer details of the privacy policies that many automatically accept?

Your data, their rules

While it’s unlikely to come as a surprise that sites you’ve signed up for will hold the details you’ve given them, for many sites this isn’t all they track. With Facebook and Instagram being the biggest offenders, seemingly tracking as much as they can about their users, is it time that we thought twice about what we’re accepting within the terms and conditions? Some of the surprising details tracked include:

• Location – Of the 21 services within the study, 18 tracked your current location at all times when using the app. Some of these, such as Tinder, continue to track this even when the app is not in use, while Facebook and Instagram both not only track your location but also the location of businesses and people nearby, as well as saving your home address and your most commonly visited locations.

• Your messages – Think nobody will ever know about you sliding into someone’s DMs? Think again. Facebook, LinkedIn and Instagram use the information you share on their messaging services to learn more about you, while Twitter and Spotify both openly state they have access to any messages you send on their platforms.

• Device information – Seemingly harmless, but many services and apps track more of your device information than appears to be needed. Facebook and Instagram, for example, both track your battery level, signal strength, nearby Wi-Fi spots and phone masts, app and file names on your device and more. Meanwhile, Google and Amazon both keep hold of voice recordings from searches and Alexa respectively, and Apple Music confusingly tracks phone calls made and emails sent and received on the devices the service is used on.

No profile? Still a problem

On top of this, even if you don’t hold an account with these services this won’t stop your online moves being tracked. Google keeps track of your activity on third-party sites that use Google features like adverts, while Facebook partners (an enormous 8,4 million sites across the web) send both it and Instagram data collected through Facebook business tools like the ‘like’ button – regardless of whether or not you have a Facebook account or are logged in.

And for those among us who have taken the action to set up the ‘Do Not Track’ option offered by some browsers, which was created to stop sites tracking your information, this won’t help you either. Almost no major sites respond to the signal given, instead continuing to track you regardless. In fact, it’s not just third-party sites these companies are storing your data from, Facebook also holds any data provided about you from others – including if they upload your contact information without your permission.

Online data-ing disasters

With the technological takeover hitting all aspects of life, even dating, more of us are turning to online dating to find ‘the one’. In fact, there are over 2,6 million accounts held across the seven dating services vpnMentor reviewed – but how do they treat your data?

One of the key discoveries revealed that those dating sites within the Match.com umbrella (Match.com, Tinder, OKCupid and Plentyoffish) all share any data shared with one service with all of the others. On top of this, all of these services, with the addition of dating app Hinge, also have access to your private messages to potential suitors. Notably, Hinge also states that user data is accessible on a need-to-know basis by Hinge personnel, rather than completely anonymised.

Overall, the best dating app for those looking to keep their private data private appears to be Happn, which was the only service to note that it does not keep track of where users have travelled or where they are regularly. Instead, it only keeps track of when members are in close proximity and where they were when they crossed paths with another user. Happn also makes a point that messages are not accessed except by legal request, including by anonymised engines. This is markedly not the case with many other dating or social apps.

Internet security expert Gaya Polat from vpnMentor said: “The amount of data held online about users should make them wary about how their personal details are used. While the majority of this data usage is benign or necessary for services to function, knowing which companies hold which data about you is the only way to track your privacy, and how secure you really are.

“We recommend always reading the privacy policy to ensure you know what you’re agreeing to by signing up – but we hope this project will give something of an insight into what it all entails.”




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The role of safe storage in mitigating burglary and fire risk
Gunnebo Safe Storage Africa Products & Solutions Fire & Safety Smart Home Automation
Household burglary and fire remain amongst the most common threats to household assets in South Africa. Statistics South Africa’s 2024 Victims of Crime Survey reported approximately 1,5 million incidents of housebreaking in a single year.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Navigating a modern, layered security landscape
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
The convergence of perimeter control and access automation is driving demand for solutions that work together. This is the focus of HomeSec Expo 2026, which takes place on 4th and 5th March 2026 at the Gallagher Convention Centre in Johannesburg.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
Protecting high-value data from AI
CASA Software Infrastructure Information Security Products & Solutions
As artificial intelligence accelerates the speed and sophistication of cyberattacks, protecting high-value data, such as financial records, legal files, patient data, intellectual property, and compliance records, has never been more urgent.

Read more...
Integrated security key to protecting cloud applications
Infrastructure Information Security
Cloud-native applications have transformed the way businesses operate, enabling faster innovation, greater agility, and enhanced scalability. Yet this evolution brings an equally complex security landscape.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.