Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
If it is free, then you are the product for sale. This is especially true for most of the online services we use. For example, Google’s main sources Income is advertising. They make money by collecting data about you and me and selling target ads to the company, and then show us products related to our interests.
You may have noticed that when you search for products on Google, you start seeing ads on Facebook. The same applies to applications like Instagram, Thread, and LinkedIn. In fact, research shows that the application that collects the most data about you is also one of the most widely used ones.
Let’s take a look at their top 20 and explore how to control your own personal information.
Get security alerts, expert tips – Sign up for Kurt’s newsletter – online coverage here
A man scrolls through his own app on his phone (Kurt “Cyberguy” Knutsson)
The app collects all kinds of data about you, but let’s do one thing directly. Not all data collection is bad. Some applications do require access to certain information to function properly. For example, Uber stores your location data to help you find a ride faster, while WhatsApp needs to access your contacts so you can send messages.
The real problem is data collection, with no other purpose than showing you ads or selling information to third parties. According to MarinMarinčić, the head of IT infrastructure nsoftthe top 20 most invasive applications collect data that their core features do not need.
What is artificial intelligence (AI)?
The leading list is Meta, all four Main applications. Facebook, Messenger, Instagram, and Threads share 68% of the data collected with third parties, while also using it for targeted advertising. LinkedIn follows, sharing about 37% of user data, third place with Amazon, followed by YouTube.
What makes this happen is how deep these applications are in our daily lives, it is almost impossible to find alternatives or avoid collecting data altogether.
The list also includes No. 5 Elon Musk’s X, followed by Uber Eats, PayPal, Uber, Google and Amazon Prime videos. Despite ongoing review of its data policies, it still ranks 14th. Despite many of these names expected, the surprising entrance is the mobile game Candy Crush, which uses 28% of ads to collect data. You can find the full list in the image below.
The top 20 most invasive applications (nsoft)
The hidden cost of free apps: your personal information
If you use the above application, it is almost impossible to avoid data collection. The only way to avoid these intrusive apps is to switch to an app that respects your privacy. While it seems impossible to replace some of the largest platforms, some alternatives collect almost no unnecessary data.
Switching to these alternatives may take some effort, but it is the best way to limit how much personal data is collected. Controlling privacy begins with making a conscious choice of the app you use.
Click here to visit Fox Business
Android phone’s home screen app (Kurt “Cyberguy” Knutsson)
How to get rid of bots with application and data deletion services
If you cannot delete the apps listed above, follow these simple steps to minimize the collected and shared information.
1. Review application licenses: Most applications require access to data they don’t actually need. Go to your phone settings and check app permissions on your phone iPhone and Android. Disable access to locations, microphones, contacts, and other sensitive data unless absolutely necessary.
2. Turn off ad personalization: Many companies track your online activity to display targeted ads. You can limit this by disabling ad personalization Google,,,,, Facebookand other accounts. This reduces the amount of data collected about your interests and behaviors.
3. Restrict social media tracking: Social media platforms track your activities even if you don’t use them. Adjust privacy settings Limit data collection.
4. Avoid signing with Google or Facebook: Many websites use Google or Facebook to provide login options. Although convenient, share more data with these platforms. Instead, use emails to create separate accounts whenever possible.
5. Use Virtual Private Network (VPN) and Private Browsing Mode: one VPN Hide your IP address, helps mask your location and online activity, making it harder for the website to track you. Combined with private browsing or invisibility mode, this reduces the amount of data a company can collect about online activities. Using VPN services can also enhance your privacy by encrypting internet traffic, which makes it harder for hackers and third parties to intercept your data, especially on public Wi-Fi.
While VPNs don’t directly prevent phishing emails, they reduce the exposure of your browsing habits and may use this data maliciously. With a VPN, you can safely access your email account from anywhere, even in areas with restrictive internet policies. For the best VPN software, see my expert review of the best VPN to browse the network privately Windows, Mac, Android and iOS devices
6. General application cleaning: Uninstall the application You no longer use it to reduce passive data collection.
How to delete private data from the internet
Protect your personal information on the popular platforms mentioned above with these basic privacy adjustments.
Subscribe to Kurt’s YouTube channel for quick video tips on how to use all your tech devices
The best way to reduce data collection for companies is to remove intrusive apps from your phone. Many applications request unnecessary permissions to track your activity, so removing them will limit exposure. Rather than downloading standalone apps, try using browser versions of popular social media platforms, as they usually have fewer permissions.
Click here to get the Fox News app
However, through cookies and fingerprint recognition, network tracking still exists, so please use A privacy-focused browser Like Brave, Firefox with enhanced tracking protection or Safari with Intelligent Tracking Prevention (ITP) can further reduce data collection. However, some applications are so deeply integrated that they are difficult to replace. For example, if you use an Android phone, it’s almost impossible to avoid Google’s ecosystem. On the other hand, Apple offers more privacy controls, giving users a better option to limit data collection.
Do you check application permissions before installing? How do you determine which permissions are acceptable? Let’s write to us cyberguy.com/contact
For more technical tips and security alerts on my free online coverage newsletter cyberguy.com/newsletter
Ask Kurt a question or let us know what stories you want us to cover
Follow Kurt on his social channels
Answer the most questioned online gu questions:
New things from Kurt:
Copyright 2025 CyberGuy.com. all rights reserved.