1. Nickname: The other party can see the nickname or account name you set on the social platform.
2. "Avatar": The other party can see your avatar or profile photo set on the social platform.
3. Status: The other party can see the status or signature you set on the social platform.
4. Friend list: The other party can see some of your friend lists on social platforms.
5. Time to enter the page: The other party can see your entry time on the social platform.
It should be noted that different social platforms and different settings may be different, and the above contents are only general. At the same time, as close friends, it is very important to pay attention to protecting personal privacy. It is suggested that you set up your personal information reasonably, pay attention to protecting your privacy, and adjust your friends list and social display settings appropriately to ensure your privacy.
How to protect personal privacy
1. Strengthen the awareness of network security and privacy protection: Personal privacy protection is the degree of personal protection of information, and its effect depends on whether an individual has awareness of network security and its intensity. At present, all kinds of attack methods emerge one after another, and the existing security mechanisms and network security protection mechanisms are difficult to prevent attacks. Therefore, only having a strong awareness of network security can help individuals resist conventional and novel information disclosure attacks.
2. Improve the ability to protect account information: For individual users, the disclosure of personal information, especially account information, is the biggest risk of privacy protection. Therefore, as netizens, we should adopt certain protection strategies to improve the security of account information.
3. Understand the common means of network security attacks: At present, network attacks are rampant. Knowing the common means of network security attacks is helpful to improve the awareness of network security, enhance the ability of privacy protection and adopt targeted protection schemes.