Unfortunately, Todoist can also reveal many aspects about you, such as if you’re going on holiday, your planned bank visits, and other information that hackers can use to create credible phishing emails and other security risks.

But, is it possible for people other than yourself to access your Todoist account?

How Other Devices Can Access Your Todoist Account

With Todoist, the only way that a device can access your account is if you give it explicit permission. However, other people can still access your account if they have found out your log-in details or use old devices you previously authorized.

In some cases, this can be due to lending your device to a friend, having it stolen, or being hacked by someone you don’t know.

Unlike many other apps, Todoist does not offer two-factor authentication (2FA). With this, there’s no way to be notified if someone is attempting to access your Todoist app from an unknown device.

How to Check Which Devices Are Synced to Your Todoist Account

If your Todoist app contains sensitive information, and you have good reason to believe that someone is trying to access it, here’s how to check what devices can view your tasks:

Open the Todoist app on your desktop. In the upper-right corner of the screen, select your profile picture. Click Settings. On the left sidebar, select Reminders. Under Your Devices, check which devices belong to you or not.

If there are any devices that you don’t recognize listed under this section, simply press the x button next to the device name to remove access. With this, you can remove the authorized device logged into your Todoist app.

Aside from this, it’s recommended that you also change your Todoist password to avoid any future logins from unknown devices.

Keep Your Todoist Safe

If you suspect that someone else is viewing your tasks, Todoist makes it possible to check for yourself what devices are linked to your account.

By regularly checking if unknown devices have access to your account, you can rest assured that your Todoist app is safe and secure from hackers and other bad actors.