Active security against those who claim to be developers?

Hello. Just a quick question, with some history of why I ask. My ex, who is finally becoming a well documented stalker has been gaining developer access to many of the sites and apps that I use daily. He still maintains an open port, somehow, to my phone. Which was recently replaced! With the amount of info that the ChatGPT app is requesting. What are you actively doing to protect my data, info and ultimately me?

I was totally unaware that there is little to no verification of someone’s developer background, before some companies just hand over the keys to the city. Like Facebook or google. I’m still in awe that their is nothing more than a credit card required to sign up with some companies while other companies require even less. The direct link to my phone was given to him via google generosity and lack of moral or ethical guidance. Someone who is basically a stranger after 20 years is still steering my life’s direction in Of the $12 per month that is what he pays to wreak havoc on my entire life, even though he has no legal or otherwise viable claim to do so. With the AI movement and potential to be used for good and bad purposes. What is your active steps to protect user data, privacy and information?

Thanks in advance,

~JJ

Keep up the great work! I’m really looking forward to experiencing ChatGPT.

I don’t think this is the forum for this, but I will give you some advice.

  • factory reset your phone
  • put your social media accounts on private
  • change all your passwords
  • go in and kill all sessions on any signed-in devices

This has nothing to do with “verify developers”. The API is a service that anyone can have access to. If the API is misused I am pretty sure they will notice it and remove that developer.

Also you might want to talk to your local law enforcement about this.

1 Like

Generally speaking, developer accounts or access does not inherently provide access to another user’s private data. These are tools typically used by third-party developers to create applications or services that can integrate with a host platform. As a user, whenever such an integration is enabled, the host platform will usually provide a consent prompt outlining the data and permissions the third-party service will receive. The decision to grant or deny this access rests with you.

In light of your concerns, consider adopting the following security practices:

  1. Use a password manager to generate and manage random, complex passwords.
  2. Enable Two-Factor Authentication (2FA) wherever it’s available.
  3. Regularly check your accounts’ login/access history if the option is available.
  4. Ensure your devices and software, including browsers, are always up-to-date.
  5. If you suspect a device has been compromised, perform a complete reset or reinstall the operating system.

Remember, unless you’re a high-profile individual like a politician or journalist, or someone with privileged access to sensitive information or technology, these practices should suffice to protect you in most cases.

Given your situation, I’d also advise reaching out to local law enforcement or a legal advisor. Cyber-stalking is a serious crime, and they might be able to help.

Lastly, don’t underestimate the importance of emotional support. Reach out to a mental health professional or a support group. There are numerous resources for people going through similar experiences, and they can provide both guidance and comfort.

1 Like