Skip to main content

How To Stop People From Being Able To See That You Read Their Facebook Message

We all probably have a friend or two with an iPhone who chooses to leave their "Read receipts" on so you can tell when they've read a text. A lot of people think read receipts are the worst, which is why it's great that Apple allows you to turn them off.
Facebook however, does not. When you read someone's Facebook message, they'll always know, seeing the specific time or just the date of when you read the message, depending on when they look back at it themselves.
Quite frankly, sometimes you just want to be able to let someone assume that you missed their note. But that "Seen" check-mark makes it impossible to fake:
Turns out, there actually is a way to disable Facebook read receipts, though not technically through Facebook.
You can't avoid read receipts on mobile, but there are a few ways to essentially turn them off on desktop. W
Unseen is a free Facebook app that will let you secretly read messages without the sender knowing:


Facebook Unseen is a Google Chrome extension with great reviews that lets you manually mark each message as either read or un-read.

Comments

Popular posts from this blog

IoT’s Biggest Challenges : Privacy and Security

E verything today from your mobile to refrigerators to cars are interconnected, which made our life easier. This device collectively called IoT. But they have also created new vulnerabilities for hackers. IoT devices are poised to pervasive in our lives than mobile phones and they have access to sensitive personal data may be your credit card number, banking information and many more. As number of IoT devices constantly increase, security risk also increases. Device manufacture’s doesn't care much regarding device security and consumer have to suffer may he can be hacked and there may be severe consequences. A single security concerns on single device can cause multiple concerns when considering multiple IoT devices interconnected together. IoT devices use some form of cloud service and a mobile application use to access and control device remotely. So it’s very important to understand security risk. Current Scenario : Security Risks Privacy Concerns Many devices co...

Internet of Threats!

T he Internet of Things (IoT) is continuing to gain traction with an ever-increasing number of connected devices coming to market. But as tech-savvy consumers begin investing in their first devices for a connected home, what is to stop them becoming a cyber attacker's next target? While still uncommon, we know that cyber attackers are going after connected consumer devices, demonstrated on a massive scale by the group of Russian hackers who published thousands of live-streaming webcam footage from over 250 countries. Unless the manufacturers of connected devices take a holistic approach to bolstering their cyber security efforts, these types of attacks will increase in number. To gain a greater understanding of the cyber security risks that consumers could be exposing themselves to, research was conducted into the cyber security posture of six ‘always-on’ consumer IoT devices. The results were unsettling. Veracode carried out a set of uniform tests across all the...

Beginning of Hacking

Before Hollywood took the hacking phenomena under its wing, unless you were a clued-in techy, the world of hacking would be unfamiliar territory. In recent years, movies like The Girl with the Dragon Tattoo, The Matrix and The Italian Job have managed to glamourize the high-tech thrill of breaking into servers, cracking door codes and hijacking security networks. But before television brought the hacker technology into our general knowing, hacking was still an occurring reality for some. So what is the history of hacking and where did today's sophisticated hacking begin? Late 1950s – The MIT Start Off with a Bang Hacking wasn’t always about computers. In fact, the first ‘hackers’ were roof and tunnel hackers, which the Massachusetts Institute of Technology was instrumental in introducing. These were people who entered roof and utility tunnel spaces without authorization, in other words getting into a place they shouldn’t be in – which is where computer hacking go...