Technology
How to Use WhatsApp Privacy Settings for Maximum Control Over Your Information
Privacy-related concerns are among the serious issues in this digital age, necessarily in the use of WhatsApp or other instant messaging platforms. As a matter of fact, WhatsApp is one of the most downloaded message apps in the globe. It allows the user of this highly downloaded app to have several privacy features while keeping information from contacts within. The following tutorial pages will show how WhatsApp’s privacy settings can be used to provide it with full control over one’s personal information so that you can converse with your mind at ease.
Why WhatsApp Privacy Matters
That has never been more important than it is today, when incidents of cyberattacks and breaches of concerns continue to increase. WhatsApp is end-to-end encrypted out of the box, meaning that only the sender and recipient can read messages. But WhatsApp lets you adjust privacy settings that control who can see your activity and details about your profile.
By managing these settings, you can:
- Protect your personal data from prying eyes.
- Prevent unauthorized access to your profile and messages.
- Avoid being added to unwanted groups that expose your phone number and information.
In short, controlling your privacy on WhatsApp ensures your conversations and personal data stay protected.
Understanding WhatsApp Privacy Settings
WhatsApp also makes different privacy settings available to be enabled so that the amount of your personal information that is given out can be controlled. You open the app, go into Settings, then Account, and finally select Privacy. The following are the main WhatsApp features:
However, it’s worth noting that some users opt for third-party apps like WhatsApp GB to gain access to additional privacy features not available in the official app. WhatsApp GB or GBWA offers enhanced privacy controls, such as hiding your online status, blue ticks, and even typing indicators, without limiting your ability to see others’.
Last Seen and Online Status
Your “Last Seen” timestamp shows the last time you were active on WhatsApp. Full control over this feature at any time is important regarding questions of privacy.
- Who can see it: You can decide whether to share the Last Seen status with everyone, only your contacts, or even no one at all.
- Impact: If any person hides their Last Seen status, they will no longer be able to see others’ status.
Profile Photo Visibility
The profile picture is very often the first thing with which one interacts when using WhatsApp; thus, being able to control who can see it or not may be important for privacy.
- Who can see it: Choose whether everyone can see your profile photo, only your contacts can, or no one can.
- Why it matters: Don’t expose your profile picture to strangers or contacts you may not be able to trust. Limiting the visibility to close friends and family helps avoid this situation.
About Info Privacy
The “About” section on WhatsApp is where you share a brief status or description about yourself. Although it might seem trivial, this information can reveal a lot about you if not managed properly.
- Who can see it: Control whether your About information is visible to everyone, only your contacts, or no one.
- Why it’s important: Sensitive or personal information in the About section should be limited to those you trust.
Status Updates Privacy
WhatsApp Status Updates Like many social media stories, through WhatsApp status updates, you can post text photos and videos for as long as 24 hours. As they are not permanent, they still need to beLng given significant privacy control.
- Who can see it: The visibility option will give you a choice between making your status updates visible for all of your contacts, selected ones, or only one specific group.
- Why it is important: A status update contains personal content and should therefore only be shared with trusted contacts.
Controlling Group Privacy on WhatsApp
Group chats can sometimes be overwhelming, especially when added without your consent. WhatsApp gives you control over who can add you to groups.
Who Can Add You to Groups
This feature allows you to decide who can add you to WhatsApp groups, preventing strangers or unknown contacts from adding you.
- Options: Set it so only your contacts or select contacts can add you to groups.
- Benefit: Reducing unwanted group invites not only protects your privacy but also limits who can see your phone number and other details shared in groups.
Managing Group Info and Participation
When you are in a group, it is time to manage your participation. You will be able to view the phone number of the group members, and at times, other information about the member, depending on the set permissions within the group.
- Visibility control: Limit your visibility in groups by choosing not to share any details and by leaving/muting those groups where you’re uncomfortable.
- Personal info: Be mindful about what you share in group chats to protect your privacy.
Blocking and Reporting Contacts for Enhanced Privacy
Arguably, one of the most effective ways to be in control of your WhatsApp interactions is through blocking. This implies keeping unwanted contacts from messaging you, viewing your profile photo, or assessing your status.
How to Block Contacts
Blocking someone on WhatsApp is simple and highly effective.
- Steps: Go to the contact’s chat, tap their name, and select “Block.”
- Impact: Once blocked, they can no longer send you messages or see your profile photo or Last Seen.
Reporting Suspicious Contacts
You can report unwanted or suspicious messages to WhatsApp.
- When to report: Spam, harassment, or any other abusive messages.
- What happens: WhatsApp will investigate this report then take necessary action if needed, thus helping one to keep a safe chatting environment.
Two-Step Verification for Added Security
Two-step verification adds an extra layer of security to your WhatsApp account by requiring a PIN whenever you register your phone number.
Enabling Two-Step Verification
Enabling two-step verification is easy, and it’s a surefire way to ensure only you can register your phone number with WhatsApp.
- steps: Go to WhatsApp settings, find something related to data sharing there, and opt out of it.
- Why it matters: By limiting any data-sharing at all, you retain a larger level of control over your personal information and are constraining focused advertisements through Facebook.
Managing Data Sharing Permissions with WhatsApp and Facebook
WhatsApp, owned by Facebook, has always brought up questions about the data shared between the platforms. The data shared doesn’t include your messages, but other personal info definitely does, such as phone numbers and device information.
Opting Out of Data Sharing with Facebook
You can manage your data sharing permissions to prevent WhatsApp from sharing your information with Facebook.
- Steps: In WhatsApp settings, look for the data-sharing options and opt-out.
- Why it’s important: Reducing data sharing helps you retain more control over your personal information and limits targeted ads from Facebook.
How to Secure Chats with End-to-End Encryption
WhatsApp’s default feature is end-to-end encryption, meaning only you and the person you’re communicating with can read your messages.
Verifying Encryption for Specific Chats
To ensure your chats are encrypted, you can verify the encryption status.
- Steps: Open a chat, tap the contact’s name, and select “Encryption.” You’ll see a code that ensures your messages are secure.
- Importance: Verifying encryption gives you peace of mind that your messages are protected from third parties.
Best Practices for WhatsApp Privacy
Maximizing your privacy on WhatsApp requires ongoing attention. Here are some best practices to keep in mind:
Regularly Update Your App
WhatsApp updates its privacy features regularly, so keeping the app updated means you have access to the latest security tools.
- Why it matters: Updates often include critical privacy enhancements to protect your data.
Be Mindful of Shared Links and Media
Shared media, like photos and videos, can expose personal information if you’re not careful.
- Tips: Only share content with trusted contacts, and be mindful of what’s visible in your photos or videos.
Conclusion: Take Control of Your Privacy on WhatsApp
WhatsApp has other powerful features with regard to privacy: basically, the right for users to decide with whom they share their personal information and where their data spreads. From settings controlling your Last Seen, enabling two-step verification-these set-ups give you ways to make sure your data is kept secure. Thus, be sure that your information is going to stay safe, protected by your choice, when you go through your privacy settings and update them from time to time.
Frequently Asked Questions (FAQs)
Is there a way that I can hide my WhatsApp profile photo from someone?
Go to Settings > Account > Privacy > Profile Photo and select “My Contacts Except.” to exclude the photo from certain people.
What happens if I block a person on WhatsApp?
The blocked contact cannot see your Last Seen, profile photo, and even cannot send you messages.
Can I somehow stop adding me to different groups without asking for my permission?
Yes, you can. To do this, go into Settings -> Privacy -> Groups, and then select either “My Contacts” or “My Contacts Except.”
How do I know my chat in WhatsApp is encrypted?
To verify the security code, making sure that end-to-end encryption is enabled, tap on the name of the contact in the conversation, then on “Encryption”.
What does two-step verification do, and why should I enable it?
Two-step verification works by first providing an extra layer during WhatsApp’s registering process, whereby one has to create a PIN, which offers additional security to prevent unauthorized access to the account.
Technology
Lagos’ Team Nevo Wins 3MTT Southwest Regional Hackathon
By Adedapo Adesanya
Lagos State’s representative, Team Nevo, won the 3 Million Technical Talent (3MTT) South-West Regional Hackathon, on Tuesday, December 9, 2025.
The host state took the victory defeating pitches from other south west states, including Oyo, Ogun, Osun, Ekiti, and Ondo States.
This regional hackathon was a major moment for the 3MTT Programme, bringing together young innovators from across the South-West to showcase practical solutions in AI, software development, cybersecurity, data analysis, and other key areas of Nigeria’s digital future.
Launched by the Federal Ministry of Communications, Innovation, and Digital Economy, the hackathon brought together talented young innovators from across the Southwest region to showcase their digital solutions in areas such as Artificial Intelligence (AI)/Machine Learning, software development, data analysis, and cybersecurity, among others.
“This event not only highlights the potential of youth in South West but also advances the digital economy, fosters innovation, and creates job opportunities for our young people,” said Mr Oluwaseyi Ayodele, the Lagos State Community Manager.
Winning the hackaton was Team Nevo, made up of Miss Lydia Solomon and Mr Teslim Sadiq, whose inclusive AI learning tool which tailors academic learning experiences to skill sets of students got the top nod, with N500,000 in prize money.
Team Oyo represented by Microbiz, an AI business tool solution, came in second place winning N300,000 while Team Ondo’s Fincoach, a tool that guides individuals and businesses in marking smarter financial decisions, came third with N200,000 in prize money.
Others include The Frontiers (Team Osun), Ecocycle (Team Ogun), and Mindbud (Team Ekiti).
Speaking to Business Post, the lead pitcher for Team Nevo, Miss Solomon, noted, “It was a very lovely experience and the opportunity and access that we got was one of a kind,” adding that, “Expect the ‘Nevolution’ as we call it, expect the transformation of the educational sector and how Nevo is going to bring inclusion and a deeper level of understanding and learning to schools all around Nigeria.”
Earlier, during his keynote speech, the chief executive officer (CEO) of Sterling Bank, Mr Abubakar Suleiman, emphasised the need for Nigeria’s budding youth population to tap into the country’s best comparative advantage, drawing parallels with commodities and resources like cocoa, soyabeans, and uranium.
“Tech is our best bet to architect a comparative advantage. The work we are doing with technologies are very vital to levelling the playing field.”
Technology
re:Invent 2025: AWS Excites Tech Enthusiasts With Graviton5 Unveiling
By Aduragbemi Omiyale
One of the high points of the 2025 re:Invent was the unveiling of Graviton5, the fifth generation of custom Arm-based server processors from Amazon Web Services (AWS).
Many tech enthusiasts believe that the company pushed the limits with Graviton5, its most powerful and efficient CPU, frontier agents that can work autonomously for days, an expansion of the Amazon Nova model family, Trainium3 UltraServers, and AWS AI Factories suitable for implementing AI infrastructure in customers’ existing data centres.
Graviton5—the company’s most powerful and efficient CPU
As cloud workloads grow in complexity, organizations face a persistent challenge to deliver faster performance at lower costs and meet sustainability commitments without trade-offs.
AWS’ new Graviton5-based Amazon EC2 M9g delivers up to 25% higher performance than its previous generation, with 192 cores per chip and 5x larger cache.
For the third year in a row, more than half of new CPU capacity added to AWS is powered by Graviton, with 98 per cent of the top 1,000 EC2 customers—including Adobe, Airbnb, Epic Games, Formula 1, Pinterest, SAP, and Siemens—already benefiting from Graviton’s price performance advantages.
Expansion of Nova family of models and pioneers “open training” with Nova Forge
Amazon is expanding its Nova portfolio with four new models that deliver industry-leading price-performance across reasoning, multimodal processing, conversational AI, code generation, and agentic tasks. Nova Forge pioneers “open training,” giving organizations access to pre-trained model checkpoints and the ability to blend proprietary data with Amazon Nova-curated datasets.
Nova Act achieves breakthrough 90% reliability for browser-based UI automation workflows built by early customers. Companies like Reddit are using Nova Forge to replace multiple specialized models with a single solution, while Hertz accelerated development velocity by 5x with Nova Act.
Addition of 3 frontier agents, a new class of AI agents that work as an extension of your software development team
Frontier agents represent a step-change in what agents can do. They’re autonomous, scalable, and can work for hours or days without intervention. AWS announced three frontier agents—Kiro autonomous agent, AWS Security Agent, and AWS DevOps Agent. Kiro autonomous agent acts as a virtual developer for your team, AWS Security Agent is your own security consultant, and AWS DevOps Agent is your on-call operational team.
Companies, including Commonwealth Bank of Australia, SmugMug, and Wester Governors University have used one or more of these agents to transform the software development lifecycle.
Unveiling Trainium3 UltraServers
As AI models grow in size and complexity, training cutting-edge models requires infrastructure investments that only a handful of organizations can afford.
Amazon EC2 Trn3 UltraServers, powered by AWS’s first 3nm AI chip, pack up to 144 Trainium3 chips into a single integrated system, delivering up to 4.4x more compute performance and 4x greater energy efficiency than Trainium2 UltraServers.
Customers achieve 3x higher throughput per chip while delivering 4x faster response times, reducing training times from months to weeks. Customers including Anthropic, Karakuri, Metagenomi, NetoAI, Ricoh, and Splash Music are reducing training and inference costs by up to 50 per cent with Trainium, while Decart is achieving 4x faster inference for real-time generative video at half the cost of GPUs, and Amazon Bedrock is already serving production workloads on Trainium3.
Technology
NITDA Alerts Nigerians to ChatGPT Vulnerabilities
By Adedapo Adesanya
The National Information Technology Development Agency (NITDA) has issued an advisory on new vulnerabilities in ChatGPT that could expose users to data-leakage attacks.
According to the advisory, researchers discovered seven vulnerabilities affecting GPT-4o and GPT-5 models that allow attackers to manipulate ChatGPT through indirect prompt injection.
The agency explained that hidden instructions placed inside webpages, comments, or Uniform Resource Locators (URLs) can trigger unintended commands during regular browsing, summarisation, or search actions.
“By embedding hidden instructions in webpages, comments, or crafted URLs, attackers can cause ChatGPT to execute unintended commands simply through normal browsing, summarization, or search actions,” they stated.
The warning followed rising concerns about AI-powered tools interacting with unsafe web content and the growing dependence on ChatGPT for business, research, and public-sector tasks.
NITDA added that some flaws allow the bypassing of safety controls by masking malicious content behind trusted domains.
Other weaknesses take advantage of markdown rendering bugs, enabling hidden instructions to pass undetected.
It explained that in severe cases, attackers can poison ChatGPT’s memory, forcing the system to retain malicious instructions that influence future conversations
They stated that while OpenAI has fixed parts of the issue, Large-Language Models (LLMs) still struggle to reliably separate genuine user intent from malicious data.
The Agency warned that these vulnerabilities could lead to a range of cybersecurity threats, including unauthorised actions carried out by the model; unintended exposure of user information; manipulated or misleading outputs; and long-term behavioural changes caused by memory poisoning, among others.
It advised Nigerians, businesses, and government institutions to adopt several precautionary steps to stay safe. These include limiting or disabling the browsing and summarisation of untrusted websites within enterprise environments and enabling features like browsing or memory only when necessary.
It also recommended regular updates to deployed GPT-4o and GPT-5 models to ensure known vulnerabilities are patched.
-
Feature/OPED6 years agoDavos was Different this year
-
Travel/Tourism9 years ago
Lagos Seals Western Lodge Hotel In Ikorodu
-
Showbiz3 years agoEstranged Lover Releases Videos of Empress Njamah Bathing
-
Banking7 years agoSort Codes of GTBank Branches in Nigeria
-
Economy3 years agoSubsidy Removal: CNG at N130 Per Litre Cheaper Than Petrol—IPMAN
-
Banking3 years agoFirst Bank Announces Planned Downtime
-
Banking3 years agoSort Codes of UBA Branches in Nigeria
-
Sports3 years agoHighest Paid Nigerian Footballer – How Much Do Nigerian Footballers Earn









