Table of Contents
What Is OAuth and How Does It Work?
OAuth (Open Authorization) is the protocol behind those familiar "Sign in with Google," "Continue with Facebook," or "Log in with Apple" buttons you encounter on websites and apps. Rather than creating a new username and password for every service, OAuth lets you delegate authentication to a trusted identity provider.
The process works through a series of token exchanges. When you click "Sign in with Google," you are redirected to Google's login page. After you authenticate, Google sends a temporary authorization token back to the requesting website. That site then exchanges the token for an access token, which grants it limited access to specific pieces of your profile information. At no point does the third-party website receive your Google password.
OAuth 2.0, the current standard, uses scopes to define exactly what data a third-party application can access. Common scopes include basic profile information (name and email), contacts lists, calendar events, or even the ability to post on your behalf. The key security advantage is that you can revoke a third-party application's access without changing your password.
What Data Are You Actually Sharing?
When you use OAuth to sign in, the data you share depends on the permissions the application requests and what you approve. At a minimum, most applications request your name, email address, and profile picture. However, some request far more.
A social media scheduling tool might request permission to post on your behalf. A fitness app logging in with Google might request access to your health data. A project management tool might ask for access to your entire contact list. The critical habit to develop is reading the permission screen carefully before clicking "Allow." Many users reflexively approve all requested permissions without understanding what they are granting.
Here is what common OAuth providers typically share by default:
- Google: Name, email address, profile picture, and locale
- Facebook: Name, email, and profile picture (additional permissions require app review)
- Apple: Name and email (with the option to hide your real email behind a relay address)
- GitHub: Public profile information and email addresses
Apple's "Hide My Email" feature deserves special mention. It generates a unique, random email address that forwards to your real inbox, preventing the third-party service from knowing your actual email. This is a meaningful privacy advantage over other OAuth providers.
Security Risks of Third-Party Login
While OAuth eliminates password reuse for individual sites, it introduces its own set of risks that deserve careful consideration.
Single Point of Failure
If an attacker compromises your Google account, they potentially gain access to every service where you used "Sign in with Google." This concentration of risk makes it critical to secure your primary accounts with strong passwords and multi-factor authentication. Consider using our password generator to create a robust password for your primary identity provider accounts.
Tracking and Data Correlation
OAuth providers can track which services you use and when you use them. Every time you authenticate through Google, Google logs that interaction. Over time, this builds a comprehensive picture of your online activity. Facebook has historically used OAuth login data to enhance its advertising profile of users.
Token Theft and Session Hijacking
If an attacker intercepts the OAuth token during the exchange process, they can impersonate you on the third-party service. While HTTPS and modern token handling practices mitigate this risk significantly, poorly implemented OAuth flows on smaller websites can still be vulnerable.
Zombie Permissions
Many users grant OAuth access once and never revisit their connected applications. Months or years later, those applications may have changed ownership, updated their privacy policies, or suffered data breaches while retaining valid access tokens to your account. This is one of the most overlooked security risks in personal digital hygiene, because the original authorization remains valid indefinitely unless you actively revoke it.
When to Use OAuth vs. Creating a Separate Account
OAuth login is generally a good choice when the service is low-risk and you value convenience, when you trust the OAuth provider more than the third-party service to store your credentials securely, or when the third-party service is small and may not have strong password security practices.
Creating a separate account with a unique password from a password generator is preferable when the service handles sensitive data such as financial or medical records, when you want to limit data sharing with your OAuth provider, or when the service requests excessive OAuth permissions.
A practical middle-ground approach is to use Apple's "Sign in with Apple" or create dedicated accounts using email aliases from services like SimpleLogin or Firefox Relay. This gives you the convenience of streamlined authentication without exposing your primary email or linking your accounts together. You can also use our text encryption tool to securely store notes about which services use which authentication method, keeping your digital identity organized.
How to Audit and Clean Up Your Connected Apps
Regularly reviewing your connected applications is essential security hygiene. Here is where to check for each major provider:
- Google: Visit myaccount.google.com, then Security, then Third-party apps with account access
- Facebook: Go to Settings, then Apps and Websites
- Apple: Open Settings on your device, tap your name, then Password and Security, then Apps Using Apple ID
- Twitter/X: Navigate to Settings, then Security and account access, then Connected apps
During your review, remove any application you no longer use, do not recognize, or that requests permissions beyond what seems necessary. Revoking access is immediate and does not delete your account on the third-party service; it simply prevents the service from accessing your identity provider data going forward.
Make this review a quarterly habit. Pair it with a broader personal security audit to maintain strong security hygiene across your entire digital life. The few minutes spent reviewing connected apps can prevent significant privacy exposure from forgotten authorizations.
Share this article

Raimundo Coelho
Cybersecurity specialist and technology professor with over 20 years of experience in IT. Graduated from Universidade Estácio de Sá. Writing practical guides to help you protect your data and stay safe in the digital world.