Social Media Privacy Settings on Mobile: Complete Guide

How to tighten privacy settings on Instagram, Facebook, TikTok, and LinkedIn on your iPhone or Android — reducing data collection, limiting audience, and protecting your account security on every major platform.

Social media privacy settings mobile guide
1Instagram and Facebook

Instagram and Facebook: Tightening Meta's Privacy Controls

Instagram and Facebook — both owned by Meta — are among the most data-intensive apps on any smartphone. Meta's advertising business is built on building detailed profiles of users' interests, behaviours, relationships, and activities. The data collected by Meta apps extends far beyond what you explicitly share: it includes your location history, device identifiers, browsing behaviour on other websites (via the Meta Pixel tracking technology), contacts lists if you've granted access, face recognition data from photos, and cross-app tracking data shared by other apps in Meta's advertising network.

On Instagram, go to Settings → Account → Privacy and enable "Private Account" if you want to control who sees your posts. Under Security, enable "Two-Factor Authentication" using an authenticator app (not SMS). Navigate to Settings → Ads → Ad preferences → Ad Settings and disable "Ads based on data from partners" and "Ads based on your activity on Facebook Company Products." Go to Settings → Account → Sharing across profiles to review what data is shared between Instagram and Facebook accounts.

Facebook's privacy settings are extensive and intentionally complex to navigate. The most impactful changes are: Settings → Privacy Settings → "Who can see your future posts?" → Friends only; Settings → Face Recognition → disable; Settings → Location → Location History → disable; Settings → Ad Preferences → Advertisers and businesses → clear your ad interaction history; Settings → Your Facebook Information → Off-Facebook Activity → "Manage Future Activity" → disable "Future Off-Facebook Activity." Off-Facebook Activity is particularly important: it controls whether websites and apps that use the Facebook Pixel can send your browsing data to Facebook for ad targeting.

  • Private Instagram account: Instagram → Settings → Account → Privacy → Private Account — controls who can see your posts and follow you.
  • Instagram 2FA: Instagram → Settings → Account → Security → Two-Factor Authentication → use Authenticator App, not SMS.
  • Disable off-Facebook Activity: Facebook → Settings → Your Facebook Information → Off-Facebook Activity → Manage Future Activity → disconnect from all apps.
  • Facebook ad preferences: Settings → Ad Preferences → disable personalised ads based on partner data and cross-app activity.
  • Disable face recognition: Facebook → Settings → Face Recognition → Off — prevents Meta from building a facial recognition model from your photos.
  • Revoke unnecessary app permissions: In iOS Settings → Privacy → Camera/Microphone/Location, restrict Instagram and Facebook to the minimum required access.
Manage all social media app permissions →
Instagram Facebook privacy settings
2TikTok Privacy Settings

TikTok: Privacy Settings for Hong Kong Users

TikTok is one of the most widely used social platforms among Hong Kong's younger demographic. It has also been subject to significant scrutiny regarding its data collection practices, data storage, and the potential for its parent company ByteDance (based in Beijing) to access user data. TikTok's privacy policy acknowledges that it collects device identifiers, IP addresses, browsing history, location data, biometric identifiers (from facial and voice features in videos), keystroke patterns, and content of your clipboard — among many other data points. The company has acknowledged that some China-based employees had access to US user data in the past.

TikTok privacy configuration: go to Settings → Privacy and set "Account Privacy" to Private. Under "Safety," enable "Filter DMs" to only receive direct messages from followers, and disable "Suggest your account to others" to limit profile discoverability. Under "Ads," go to Ads Preferences and disable "Ad personalisation" and "Personalised ads based on off-TikTok activity." Under "Data," request and review your data download to understand exactly what TikTok holds about you — this can be revealing. Set up two-step verification at Settings → Security → 2-step verification → use Authenticator App.

For iOS users, the most effective privacy measure against TikTok's extensive data collection is to revoke unnecessary permissions. In iOS Settings → Privacy → go through each category and ensure TikTok only has access to what's strictly needed for the features you use: Camera (for recording videos), Microphone (for recording audio), Photos (for uploading from your library only). Revoke TikTok's access to Contacts and Location entirely unless you have a specific reason. Consider using TikTok via its web interface in Safari rather than the app, which slightly limits the data that can be collected at the OS level.

  • Private TikTok account: Settings → Privacy → Private Account — only approved followers can see your content.
  • Disable personalised ads: Settings → Privacy → Ads → Personalisation → disable "Personalise ads based on off-TikTok activity."
  • 2-step verification: Settings → Security → 2-step verification → Authenticator App — protects your account from takeover.
  • Revoke location access: In iOS/Android device settings, deny TikTok location permission unless you specifically use location-based features.
  • Revoke contacts access: TikTok does not need your contacts — deny this permission in your device's privacy settings.
  • Review data practices: Consider whether TikTok's data collection risk profile is acceptable given your professional context — government employees, executives, and lawyers should be particularly careful.
Comprehensive mobile data privacy guide →
TikTok privacy settings guide
3LinkedIn Privacy Settings

LinkedIn: Managing Professional Privacy and Security

LinkedIn is a unique social media platform from a privacy perspective: it exists specifically for professional networking and is expected to contain professional information including your employer, job title, career history, and educational background. However, the extent of LinkedIn's data collection and the granularity of its profile building extends well beyond the professional data you intentionally share. LinkedIn tracks your browsing activity across non-LinkedIn websites (via the LinkedIn Insight Tag, which is widely implemented across business websites), your profile viewing habits, your job search behaviour, and your engagement with content — all of which feeds into its advertising and talent acquisition products.

Essential LinkedIn privacy settings: go to Settings → Visibility → Profile viewing options and choose "Private mode" (anonymous) when browsing other profiles if you don't want them to see that you visited. Under Visibility → Who can see your connections → Only you — this prevents competitors or recruiters from mining your network. Under Data privacy → Manage your data and activity → clear your search history periodically and review what LinkedIn has collected about you in "Get a copy of your data."

LinkedIn account security deserves specific attention: go to Settings → Sign in & security → Two-step verification → set up with an authenticator app. Review Active sessions (Settings → Sign in & security → Where you're signed in) and sign out from any unfamiliar devices or locations. LinkedIn is a common target for Hong Kong: Prevention Guide">business email compromise (BEC) attacks — attackers use LinkedIn to research targets before launching spear phishing attacks that impersonate colleagues, executives, or clients. Never click links in LinkedIn direct messages from people you don't know, and verify any unusual requests from LinkedIn contacts via another channel.

  • Anonymous profile viewing: Settings → Visibility → Profile viewing options → Private mode — browse other profiles without them seeing you.
  • Hide your connections: Settings → Visibility → Who can see your connections → Only you — prevents connection list scraping.
  • LinkedIn 2FA: Settings → Sign in & security → Two-step verification → Authenticator App. Essential for an account that contains your professional network.
  • Disable LinkedIn Insights tracking: Settings → Data privacy → LinkedIn Insights Pixel → opt out of being tracked across non-LinkedIn websites that implement this pixel.
  • Review active sessions: Settings → Sign in & security → Where you're signed in — sign out from any unrecognised devices.
  • Message link scepticism: Treat LinkedIn DM links with the same suspicion as email links — spear phishing via LinkedIn is a common business email compromise vector.
Identify phishing attacks through social media →
LinkedIn privacy settings security
4Universal Best Practices

Universal Social Media Security Practices for Mobile

Beyond platform-specific settings, several security practices apply across all social media platforms and are particularly important for mobile users. Strong, unique passwords combined with authenticator app two-factor authentication are the foundation of social media account security. Social media account takeovers — where attackers hijack accounts to run scams, spread malware, or harass the account owner's contacts — are extremely common. An account protected by a strong unique password and TOTP 2FA is dramatically more resistant to takeover than one protected by a reused password and SMS 2FA.

Review what you share on social media from a social engineering risk perspective. Your social media posts collectively create a detailed profile that attackers can use to craft targeted phishing messages, password reset questions, and impersonation attacks. Posts revealing your home neighbourhood, workplace, regular schedule, upcoming travel, pets' names, family members' names, and vehicle details provide material for social engineering. This doesn't mean you must avoid posting about your life — but being mindful of high-value social engineering data (mother's maiden name, childhood pet, first school — common password reset questions) is sensible.

App permissions for social media on mobile should be reviewed and restricted. The most important permissions to deny or restrict: Location (deny precise location; use approximate only while using the app); Contacts (deny entirely unless using contacts for friend finding — this prevents your contacts from being uploaded to the platform); Microphone (grant only when actively recording audio content); Camera (grant only while using the app). On iOS, the App Privacy Report shows you exactly when Instagram, TikTok, and other social apps access your microphone and camera — review this after enabling it in Settings → Privacy & Security.

  • Unique passwords per platform: Use a password manager (1Password, Bitwarden, or Apple Keychain) to generate and store unique strong passwords for every social media account.
  • Authenticator app 2FA on all platforms: Every major social platform supports TOTP 2FA — enable it on all accounts, starting with your primary professional and personal accounts.
  • Review app permissions quarterly: Check which social apps have access to your location, camera, microphone, and contacts in device Privacy settings — revoke what isn't needed.
  • Mind what you share: Be aware of social engineering data in your posts — details that could be used to answer security questions, guess passwords, or craft targeted phishing.
  • Third-party app access: Go to each platform's settings and review connected apps ("Login with Facebook/Google" connections) — revoke access from apps you no longer use.
  • Monitor active sessions: All major social platforms show where you're logged in — review monthly and immediately revoke any unrecognised sessions.
Set up authenticator app 2FA on all your accounts →
Universal social media security practices
Social Media Privacy Is Mobile Privacy

Social Media Privacy Is Mobile Privacy

Social media apps are among the most data-intensive on your phone. Combine these platform settings with our device-level privacy guide for comprehensive protection.

Related VPN Articles