SlideShare a Scribd company logo
1 of 13
Social networks and
       privacy

Consumer Reports
 State of the Net
  May 4, 2010
         Lee Tien
 EFF senior staff attorney
       tien@eff.org
What DOJ says:
        UTILITY IN CRIMINAL CASES
Evidence from social-networking sites can
• Reveal personal communications
• Establish motives and personal relationships
• Provide location information
• Prove and disprove alibis
• Establish crime or criminal enterprise
Also: instrumentalities or fruits of crime
Social graph privacy
               (it’s not just about
                       you)
• From personal data to relationship data
• ZDNet comment: “A number of my friends in
  Iran are active student protesters….[who] use
  Facebook extensively to organize…terrified
  that their once private lists of friends are now
  available to ‘everyone’…. When that
  ‘everyone’ happens to include the Iranian
  Revolutionary Guard….”
Facebook then and
                     now
• 2005 privacy policy: "No personal information
  that you submit to Thefacebook will be
  available to any user of the Web Site who
  does not belong to at least one of the groups
  specified by you in your privacy settings."
• Now: parts of your profile, "including your
  current city, hometown, education and work,
  and likes and interests" will be transformed
  into public "connections."
  • Can only prevent by deleting them.
Public information
• name, profile picture, current city,
  gender, networks, complete list of your
  friends, and your complete list of
  connections (formerly the list of pages
  that you were a "fan" of, but now
  including profile information like your
  hometown, education, work, activities,
  likes and interests, and, in some cases,
  your likes and recommendations from
  non-Facebook pages around the web)
Expectation
                     exp

                   mismatch?
• Public isn’t necessarily bad, but
• Originally FB was a way to share your
  interests and information with a select
  group of your own choosing.
• Now FB has helped itself and its ad and
  business partners to more and more of
  users’ information, while limiting users’
  control options
Who has control?
• Degrees of publicity: e.g. status data
  had been accessible, but FB News
  Feed (2006) made it stream “pushed” to
  your friends—users upset.
• Current app + friend problem
  • FB apps get any data you allow them to …
    and apps run by your friends get any of
    your data that you let your friends see* IP
• Not just change—complexity
“Evil interfaces”
• “act of creating deliberately confusing jargon
  and user interfaces which trick your users into
  sharing more info about themselves than they
  really want to”
• Labyrinthine process for opting out of Instant
  Personalization (allows select FB partner
  websites to collect and log all of your "publicly
  available” data)
• Google Buzz (2/10): threatened to move
  private GMail recipients into a public
  "frequent contacts" list; complex "opt-out"
  user-interface was big part of the problem
Publicity v. visibility
• “While you do have the option to hide
  your Friend List from being visible on
  your profile, it will be available to
  applications you use and websites you
  connect with using Facebook.”
• Users may think they’re protecting
  information, but they’re merely making it
  less visible (to users)
• Just confusing or deceptive/misleading?
Right to leave?
• Lock-in problem
  • Can you take your data with you?
  • Can you delete when you leave?
• Social networks could facilitate data
  portability and thus competition on
  privacy
Thoughts from danah
                  boyd
• Social media—the walls have ears
• Privacy not merely about control of
  data, nor a property of data
• About managing our selves in situations
  • Shared or “collective understanding of a
    social situation’s boundaries and knowing
    how to operate within them”
• Degrees of publicity and of trust
Two sides of ID
                management
• Helping the user manage their multiple
  personas?
• Or helping strangers identify you?
Some URLs
• http://www.eff.org/deeplinks/2009/12/wh
  o-knows-who-your-facebook-friends-are
• http://www.eff.org/deeplinks/2010/04/fac
   http://www.eff.org/deeplinks/2010/04/facebooks-evil-interfaces

  ebook-timeline
• http://www.eff.org/deeplinks/2010/04/fac
  ebooks-evil-interfaces
• http://www.eff.org/deeplinks/2010/04/ha
  ndy-facebook-english-translator
• http://www.danah.boyd/papers/

More Related Content

What's hot

Info/Techno Overload: The age of social networking
Info/Techno Overload: The age of social networkingInfo/Techno Overload: The age of social networking
Info/Techno Overload: The age of social networkingDanielle Kane
 
Orkut
OrkutOrkut
Orkutcckss
 
Why use Facebook or MySpace in Extension
Why use Facebook or MySpace in ExtensionWhy use Facebook or MySpace in Extension
Why use Facebook or MySpace in ExtensionJohn Dorner
 
Technology and Social Media: How to Get the Word Out
Technology and Social Media: How to Get the Word OutTechnology and Social Media: How to Get the Word Out
Technology and Social Media: How to Get the Word OutJessica Vitak
 
Social Networking Workshop
Social Networking WorkshopSocial Networking Workshop
Social Networking WorkshopMike Shaffer
 
a paper on Social Networking Sites
a paper on Social Networking Sitesa paper on Social Networking Sites
a paper on Social Networking SitesRajesh Gangireddy
 
Intro to social networking
Intro to social networkingIntro to social networking
Intro to social networkingKris
 
Internet based Social Networking Services
Internet based Social Networking ServicesInternet based Social Networking Services
Internet based Social Networking Servicesrahulmonikasharma
 
Understanding the role of community in online dating copypasteads.com
Understanding the role of community in online dating copypasteads.comUnderstanding the role of community in online dating copypasteads.com
Understanding the role of community in online dating copypasteads.comjackpot201
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009canadianlawyer
 
374 Arhan
374 Arhan374 Arhan
374 Arhanaci2008
 
Using Facebook in Government
Using Facebook in GovernmentUsing Facebook in Government
Using Facebook in GovernmentGreg Licamele
 
Facebook cheating pecha kucha
Facebook cheating pecha kuchaFacebook cheating pecha kucha
Facebook cheating pecha kuchaashleymannes
 
Relationships in the Digital Age: Social Media and Online Dating
Relationships in the Digital Age: Social Media and Online DatingRelationships in the Digital Age: Social Media and Online Dating
Relationships in the Digital Age: Social Media and Online DatingEmma Cheesman
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsCorinne Weisgerber
 

What's hot (19)

Info/Techno Overload: The age of social networking
Info/Techno Overload: The age of social networkingInfo/Techno Overload: The age of social networking
Info/Techno Overload: The age of social networking
 
Orkut
OrkutOrkut
Orkut
 
Why use Facebook or MySpace in Extension
Why use Facebook or MySpace in ExtensionWhy use Facebook or MySpace in Extension
Why use Facebook or MySpace in Extension
 
Technology and Social Media: How to Get the Word Out
Technology and Social Media: How to Get the Word OutTechnology and Social Media: How to Get the Word Out
Technology and Social Media: How to Get the Word Out
 
Social Networking Workshop
Social Networking WorkshopSocial Networking Workshop
Social Networking Workshop
 
a paper on Social Networking Sites
a paper on Social Networking Sitesa paper on Social Networking Sites
a paper on Social Networking Sites
 
Intro to social networking
Intro to social networkingIntro to social networking
Intro to social networking
 
Social networking ppt
Social networking pptSocial networking ppt
Social networking ppt
 
Internet based Social Networking Services
Internet based Social Networking ServicesInternet based Social Networking Services
Internet based Social Networking Services
 
Understanding the role of community in online dating copypasteads.com
Understanding the role of community in online dating copypasteads.comUnderstanding the role of community in online dating copypasteads.com
Understanding the role of community in online dating copypasteads.com
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
 
374 Arhan
374 Arhan374 Arhan
374 Arhan
 
Social network
Social networkSocial network
Social network
 
Intro to Social Media
Intro to Social MediaIntro to Social Media
Intro to Social Media
 
Using Facebook in Government
Using Facebook in GovernmentUsing Facebook in Government
Using Facebook in Government
 
Facebook cheating pecha kucha
Facebook cheating pecha kuchaFacebook cheating pecha kucha
Facebook cheating pecha kucha
 
Relationships in the Digital Age: Social Media and Online Dating
Relationships in the Digital Age: Social Media and Online DatingRelationships in the Digital Age: Social Media and Online Dating
Relationships in the Digital Age: Social Media and Online Dating
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy Concerns
 
MY_SNS
MY_SNSMY_SNS
MY_SNS
 

Viewers also liked

Viewers also liked (17)

Caravans a british love affair
Caravans  a british love affairCaravans  a british love affair
Caravans a british love affair
 
X men.v3.20.2012
X men.v3.20.2012X men.v3.20.2012
X men.v3.20.2012
 
Ainan bin mahamud_v_syed_abu_bakar_bin_habib
Ainan bin mahamud_v_syed_abu_bakar_bin_habibAinan bin mahamud_v_syed_abu_bakar_bin_habib
Ainan bin mahamud_v_syed_abu_bakar_bin_habib
 
Canal local
Canal localCanal local
Canal local
 
PMC - Crear
PMC - CrearPMC - Crear
PMC - Crear
 
ConsultN'GO Booklet
ConsultN'GO BookletConsultN'GO Booklet
ConsultN'GO Booklet
 
Conocimiento2
Conocimiento2Conocimiento2
Conocimiento2
 
Notebook
NotebookNotebook
Notebook
 
Srijeeth_alva
Srijeeth_alvaSrijeeth_alva
Srijeeth_alva
 
Stock Report
Stock ReportStock Report
Stock Report
 
[4] rpp pai sma
[4] rpp pai sma[4] rpp pai sma
[4] rpp pai sma
 
O que é design de interação
O que é design de interaçãoO que é design de interação
O que é design de interação
 
Soarian Health Archive Presentatie Sap I.S.H.Med Gebruikersdag 24 Juni 2009
Soarian Health Archive Presentatie Sap I.S.H.Med Gebruikersdag 24 Juni 2009Soarian Health Archive Presentatie Sap I.S.H.Med Gebruikersdag 24 Juni 2009
Soarian Health Archive Presentatie Sap I.S.H.Med Gebruikersdag 24 Juni 2009
 
Structure of woods
Structure of woodsStructure of woods
Structure of woods
 
Module iv block 2
Module iv block 2Module iv block 2
Module iv block 2
 
Recordações do escrivão isaías caminha
Recordações do escrivão isaías caminhaRecordações do escrivão isaías caminha
Recordações do escrivão isaías caminha
 
Chainsys proposal ki v1-28-feb-2013
Chainsys proposal ki  v1-28-feb-2013Chainsys proposal ki  v1-28-feb-2013
Chainsys proposal ki v1-28-feb-2013
 

Similar to Social Insecurity Panel, Lee Tien, EFF

Social Media for Beginners
Social Media for BeginnersSocial Media for Beginners
Social Media for BeginnersQueens Library
 
Social Media and Dating Presentation
Social Media and Dating PresentationSocial Media and Dating Presentation
Social Media and Dating PresentationShanika Robinson
 
Presentation on facebook
Presentation on facebookPresentation on facebook
Presentation on facebookparthproy
 
Facebook
FacebookFacebook
FacebookSD Paul
 
Social network privacy
Social network privacySocial network privacy
Social network privacySTO STRATEGY
 
Group 1 Introduction to Social Networking.pptx
Group 1 Introduction to Social Networking.pptxGroup 1 Introduction to Social Networking.pptx
Group 1 Introduction to Social Networking.pptxJenicaJDizon
 
facebook and its comptitors
facebook and its comptitorsfacebook and its comptitors
facebook and its comptitorsRajat Sharma
 
Future world drug addicted
Future world drug addictedFuture world drug addicted
Future world drug addictedVimala Siravi
 
Presentation social networking service
Presentation social networking servicePresentation social networking service
Presentation social networking serviceManish S Thingalaya
 
Social networking
Social networkingSocial networking
Social networkingJohan Koren
 
How Not to Get Fired Using Social Media at Work - EEO, Diversity and Social M...
How Not to Get Fired Using Social Media at Work - EEO, Diversity and Social M...How Not to Get Fired Using Social Media at Work - EEO, Diversity and Social M...
How Not to Get Fired Using Social Media at Work - EEO, Diversity and Social M...GovLoop
 
Facebook Strategies [for Realtors] Seminar 092011
Facebook Strategies [for Realtors] Seminar 092011Facebook Strategies [for Realtors] Seminar 092011
Facebook Strategies [for Realtors] Seminar 092011John Barbato
 
Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?Open University Australia
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaElizabeth T. "Eli" Edwards
 
Facebook Policy Primer
Facebook Policy PrimerFacebook Policy Primer
Facebook Policy Primersophiegalati
 

Similar to Social Insecurity Panel, Lee Tien, EFF (20)

Social Media for Beginners
Social Media for BeginnersSocial Media for Beginners
Social Media for Beginners
 
Social Media and Dating Presentation
Social Media and Dating PresentationSocial Media and Dating Presentation
Social Media and Dating Presentation
 
Presentation on facebook
Presentation on facebookPresentation on facebook
Presentation on facebook
 
Facebook
FacebookFacebook
Facebook
 
The FACEBOOK and TWITTER Phenomenon [9-28-2010]
The FACEBOOK and TWITTER Phenomenon [9-28-2010]The FACEBOOK and TWITTER Phenomenon [9-28-2010]
The FACEBOOK and TWITTER Phenomenon [9-28-2010]
 
Social network privacy
Social network privacySocial network privacy
Social network privacy
 
Facebook Project
Facebook ProjectFacebook Project
Facebook Project
 
Social networking
Social networkingSocial networking
Social networking
 
Group 1 Introduction to Social Networking.pptx
Group 1 Introduction to Social Networking.pptxGroup 1 Introduction to Social Networking.pptx
Group 1 Introduction to Social Networking.pptx
 
facebook and its comptitors
facebook and its comptitorsfacebook and its comptitors
facebook and its comptitors
 
Future world drug addicted
Future world drug addictedFuture world drug addicted
Future world drug addicted
 
Social media
Social mediaSocial media
Social media
 
Presentation social networking service
Presentation social networking servicePresentation social networking service
Presentation social networking service
 
Social networking
Social networkingSocial networking
Social networking
 
Ppt
PptPpt
Ppt
 
How Not to Get Fired Using Social Media at Work - EEO, Diversity and Social M...
How Not to Get Fired Using Social Media at Work - EEO, Diversity and Social M...How Not to Get Fired Using Social Media at Work - EEO, Diversity and Social M...
How Not to Get Fired Using Social Media at Work - EEO, Diversity and Social M...
 
Facebook Strategies [for Realtors] Seminar 092011
Facebook Strategies [for Realtors] Seminar 092011Facebook Strategies [for Realtors] Seminar 092011
Facebook Strategies [for Realtors] Seminar 092011
 
Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social Media
 
Facebook Policy Primer
Facebook Policy PrimerFacebook Policy Primer
Facebook Policy Primer
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

Social Insecurity Panel, Lee Tien, EFF

  • 1. Social networks and privacy Consumer Reports State of the Net May 4, 2010 Lee Tien EFF senior staff attorney tien@eff.org
  • 2. What DOJ says: UTILITY IN CRIMINAL CASES Evidence from social-networking sites can • Reveal personal communications • Establish motives and personal relationships • Provide location information • Prove and disprove alibis • Establish crime or criminal enterprise Also: instrumentalities or fruits of crime
  • 3. Social graph privacy (it’s not just about you) • From personal data to relationship data • ZDNet comment: “A number of my friends in Iran are active student protesters….[who] use Facebook extensively to organize…terrified that their once private lists of friends are now available to ‘everyone’…. When that ‘everyone’ happens to include the Iranian Revolutionary Guard….”
  • 4. Facebook then and now • 2005 privacy policy: "No personal information that you submit to Thefacebook will be available to any user of the Web Site who does not belong to at least one of the groups specified by you in your privacy settings." • Now: parts of your profile, "including your current city, hometown, education and work, and likes and interests" will be transformed into public "connections." • Can only prevent by deleting them.
  • 5. Public information • name, profile picture, current city, gender, networks, complete list of your friends, and your complete list of connections (formerly the list of pages that you were a "fan" of, but now including profile information like your hometown, education, work, activities, likes and interests, and, in some cases, your likes and recommendations from non-Facebook pages around the web)
  • 6. Expectation exp mismatch? • Public isn’t necessarily bad, but • Originally FB was a way to share your interests and information with a select group of your own choosing. • Now FB has helped itself and its ad and business partners to more and more of users’ information, while limiting users’ control options
  • 7. Who has control? • Degrees of publicity: e.g. status data had been accessible, but FB News Feed (2006) made it stream “pushed” to your friends—users upset. • Current app + friend problem • FB apps get any data you allow them to … and apps run by your friends get any of your data that you let your friends see* IP • Not just change—complexity
  • 8. “Evil interfaces” • “act of creating deliberately confusing jargon and user interfaces which trick your users into sharing more info about themselves than they really want to” • Labyrinthine process for opting out of Instant Personalization (allows select FB partner websites to collect and log all of your "publicly available” data) • Google Buzz (2/10): threatened to move private GMail recipients into a public "frequent contacts" list; complex "opt-out" user-interface was big part of the problem
  • 9. Publicity v. visibility • “While you do have the option to hide your Friend List from being visible on your profile, it will be available to applications you use and websites you connect with using Facebook.” • Users may think they’re protecting information, but they’re merely making it less visible (to users) • Just confusing or deceptive/misleading?
  • 10. Right to leave? • Lock-in problem • Can you take your data with you? • Can you delete when you leave? • Social networks could facilitate data portability and thus competition on privacy
  • 11. Thoughts from danah boyd • Social media—the walls have ears • Privacy not merely about control of data, nor a property of data • About managing our selves in situations • Shared or “collective understanding of a social situation’s boundaries and knowing how to operate within them” • Degrees of publicity and of trust
  • 12. Two sides of ID management • Helping the user manage their multiple personas? • Or helping strangers identify you?
  • 13. Some URLs • http://www.eff.org/deeplinks/2009/12/wh o-knows-who-your-facebook-friends-are • http://www.eff.org/deeplinks/2010/04/fac http://www.eff.org/deeplinks/2010/04/facebooks-evil-interfaces ebook-timeline • http://www.eff.org/deeplinks/2010/04/fac ebooks-evil-interfaces • http://www.eff.org/deeplinks/2010/04/ha ndy-facebook-english-translator • http://www.danah.boyd/papers/