SlideShare a Scribd company logo
1 of 4
Twitsper: Tweeting Privately
ABSTRACT:
While OSNs today provide some form of privacy controls to protect a user’s
shared content from other users, these controls are not sufficiently expressive to
provide fine grained protection. In this article, we introduce Twitsper, to support
fine-grained control over who sees a user’s messages. Twitsper provides privacy
controls to the users of Twitter today without relying on Twitter to make changes.
This is because it is a wrapper around Twitter that enables private group
communication while preserving Twitter’s commercial interests. It preserves
privacy both from the Twitsper server as well as from undesired Twitsper users.
EXISTING SYSTEM:
Currently, Twitter provides its users only two kinds of privacy controls—the ability
to share content with all their followers (using tweets) or with exactly one follower
(using direct messages)
DISADVANTAGES OF EXISTING SYSTEM:
 Controls aren’t sufficiently expressive to provide fine-grained protection.
 No private group communication.
PROPOSED SYSTEM:
In this article, we introduce Twitsper, a wrapper over Twitter that provides privacy
controls to the users of Twitter today without relying on Twitter to make changes.
Currently, Twitter provides its users only two kinds of privacy controls—the
ability to share content with all their followers (using tweets) or with exactly one
follower (using Direct Messages).Twitsper enables users to share content with any
subset of their followers, without requiring the followers to migrate to a new
application or OSN.
ADVANTAGES OF PROPOSED SYSTEM:
 Sharing private information with some followers, Twitsper can also be used
to segment information and send only relevant information to subsets of
followers.
 While Twitsper does not hide content from Twitter itself, some users may
desire to do so. This raises a different set of challenges and may impact
Twitter’s revenue model.
 We created Twitsper to enable users to share content with any subset of their
followers without requiring the followers to migrate to a new application or
online social network (OSN).
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE CONFIGURATION:-
 Operating System : Windows XP
 Programming Language : JAVA/J2EE.
 Java Version : JDK 1.6 & above.
 Database : MYSQL
REFERENCE:
Indrajeet Singh, Michael Butkiewicz, Harsha V. Madhyastha, Srikanth,V.
Krishnamurthy, Sateesh Addepalli ―Twitsper: Tweeting Privately‖ IEEE 2013.

More Related Content

Viewers also liked

A low complexity congestion control and scheduling algorithm for multihop wir...
A low complexity congestion control and scheduling algorithm for multihop wir...A low complexity congestion control and scheduling algorithm for multihop wir...
A low complexity congestion control and scheduling algorithm for multihop wir...JPINFOTECH JAYAPRAKASH
 
Generating summary risk scores for mobile applications
Generating summary risk scores for mobile applicationsGenerating summary risk scores for mobile applications
Generating summary risk scores for mobile applicationsJPINFOTECH JAYAPRAKASH
 
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
Distributed, Concurrent, and Independent Access to Encrypted Cloud DatabasesDistributed, Concurrent, and Independent Access to Encrypted Cloud Databases
Distributed, Concurrent, and Independent Access to Encrypted Cloud DatabasesJPINFOTECH JAYAPRAKASH
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksJPINFOTECH JAYAPRAKASH
 
Cloud mov cloud based mobile social tv
Cloud mov cloud based mobile social tvCloud mov cloud based mobile social tv
Cloud mov cloud based mobile social tvJPINFOTECH JAYAPRAKASH
 
2012 13 ieee dotnet titles- jp infotech
2012 13 ieee dotnet titles- jp infotech2012 13 ieee dotnet titles- jp infotech
2012 13 ieee dotnet titles- jp infotechJPINFOTECH JAYAPRAKASH
 
A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...JPINFOTECH JAYAPRAKASH
 
A secure erasure code based cloud storage system with secure data forwarding
A secure erasure code based cloud storage system with secure data forwardingA secure erasure code based cloud storage system with secure data forwarding
A secure erasure code based cloud storage system with secure data forwardingJPINFOTECH JAYAPRAKASH
 

Viewers also liked (9)

Whole test suite generation
Whole test suite generationWhole test suite generation
Whole test suite generation
 
A low complexity congestion control and scheduling algorithm for multihop wir...
A low complexity congestion control and scheduling algorithm for multihop wir...A low complexity congestion control and scheduling algorithm for multihop wir...
A low complexity congestion control and scheduling algorithm for multihop wir...
 
Generating summary risk scores for mobile applications
Generating summary risk scores for mobile applicationsGenerating summary risk scores for mobile applications
Generating summary risk scores for mobile applications
 
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
Distributed, Concurrent, and Independent Access to Encrypted Cloud DatabasesDistributed, Concurrent, and Independent Access to Encrypted Cloud Databases
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
Cloud mov cloud based mobile social tv
Cloud mov cloud based mobile social tvCloud mov cloud based mobile social tv
Cloud mov cloud based mobile social tv
 
2012 13 ieee dotnet titles- jp infotech
2012 13 ieee dotnet titles- jp infotech2012 13 ieee dotnet titles- jp infotech
2012 13 ieee dotnet titles- jp infotech
 
A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...
 
A secure erasure code based cloud storage system with secure data forwarding
A secure erasure code based cloud storage system with secure data forwardingA secure erasure code based cloud storage system with secure data forwarding
A secure erasure code based cloud storage system with secure data forwarding
 

Similar to Twitsper tweeting privately

Tweet analysis for real time event detection and earthquake reporting system ...
Tweet analysis for real time event detection and earthquake reporting system ...Tweet analysis for real time event detection and earthquake reporting system ...
Tweet analysis for real time event detection and earthquake reporting system ...JPINFOTECH JAYAPRAKASH
 
Final Year PPT on Twitter App
Final Year PPT on Twitter AppFinal Year PPT on Twitter App
Final Year PPT on Twitter Appscorpionking257
 
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.Kiran K.V.S.
 
Mz sdl-130917
Mz sdl-130917Mz sdl-130917
Mz sdl-130917Angus Fox
 
Ilo 22 november 2011 slideshare
Ilo 22 november 2011 slideshareIlo 22 november 2011 slideshare
Ilo 22 november 2011 slideshareMiekevh
 
M Ytweet Mag Eng
M Ytweet Mag EngM Ytweet Mag Eng
M Ytweet Mag Engtrendschau
 
IRJET- An Improved Machine Learning for Twitter Breaking News Extraction ...
IRJET-  	  An Improved Machine Learning for Twitter Breaking News Extraction ...IRJET-  	  An Improved Machine Learning for Twitter Breaking News Extraction ...
IRJET- An Improved Machine Learning for Twitter Breaking News Extraction ...IRJET Journal
 
Social networking system(asp.net) slideshare
Social networking system(asp.net)   slideshareSocial networking system(asp.net)   slideshare
Social networking system(asp.net) slideshareAbha nandan
 
IRJET - Implementation of Twitter Sentimental Analysis According to Hash Tag
 IRJET - Implementation of Twitter Sentimental Analysis According to Hash Tag IRJET - Implementation of Twitter Sentimental Analysis According to Hash Tag
IRJET - Implementation of Twitter Sentimental Analysis According to Hash TagIRJET Journal
 
Twitter new updates 2022.
Twitter new updates 2022.Twitter new updates 2022.
Twitter new updates 2022.KailashDaya
 
Twitter Search Architecture
Twitter Search Architecture Twitter Search Architecture
Twitter Search Architecture Ramez Al-Fayez
 
IRJET - Suicidal Text Detection using Machine Learning
IRJET -  	  Suicidal Text Detection using Machine LearningIRJET -  	  Suicidal Text Detection using Machine Learning
IRJET - Suicidal Text Detection using Machine LearningIRJET Journal
 
[System design] Design a tweeter-like system
[System design] Design a tweeter-like system[System design] Design a tweeter-like system
[System design] Design a tweeter-like systemAree Oh
 
Social Sensor for Real Time Event Detection
Social Sensor for Real Time Event DetectionSocial Sensor for Real Time Event Detection
Social Sensor for Real Time Event DetectionIJERA Editor
 
Twitter in the Government
Twitter in the GovernmentTwitter in the Government
Twitter in the Governmentgencat .
 
[T3EXT DAY] TYPO3 Extension For Twitter
[T3EXT DAY] TYPO3 Extension For Twitter[T3EXT DAY] TYPO3 Extension For Twitter
[T3EXT DAY] TYPO3 Extension For TwitterNITSAN Technologies
 
Twitter Camp - Web2 Business Model
Twitter Camp - Web2 Business ModelTwitter Camp - Web2 Business Model
Twitter Camp - Web2 Business ModelEdoardo Piccolotto
 

Similar to Twitsper tweeting privately (20)

Tweet analysis for real time event detection and earthquake reporting system ...
Tweet analysis for real time event detection and earthquake reporting system ...Tweet analysis for real time event detection and earthquake reporting system ...
Tweet analysis for real time event detection and earthquake reporting system ...
 
tweet segmentation
tweet segmentation tweet segmentation
tweet segmentation
 
SNATZ Technology
SNATZ TechnologySNATZ Technology
SNATZ Technology
 
Twitter System Design
Twitter System DesignTwitter System Design
Twitter System Design
 
Final Year PPT on Twitter App
Final Year PPT on Twitter AppFinal Year PPT on Twitter App
Final Year PPT on Twitter App
 
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
 
Mz sdl-130917
Mz sdl-130917Mz sdl-130917
Mz sdl-130917
 
Ilo 22 november 2011 slideshare
Ilo 22 november 2011 slideshareIlo 22 november 2011 slideshare
Ilo 22 november 2011 slideshare
 
M Ytweet Mag Eng
M Ytweet Mag EngM Ytweet Mag Eng
M Ytweet Mag Eng
 
IRJET- An Improved Machine Learning for Twitter Breaking News Extraction ...
IRJET-  	  An Improved Machine Learning for Twitter Breaking News Extraction ...IRJET-  	  An Improved Machine Learning for Twitter Breaking News Extraction ...
IRJET- An Improved Machine Learning for Twitter Breaking News Extraction ...
 
Social networking system(asp.net) slideshare
Social networking system(asp.net)   slideshareSocial networking system(asp.net)   slideshare
Social networking system(asp.net) slideshare
 
IRJET - Implementation of Twitter Sentimental Analysis According to Hash Tag
 IRJET - Implementation of Twitter Sentimental Analysis According to Hash Tag IRJET - Implementation of Twitter Sentimental Analysis According to Hash Tag
IRJET - Implementation of Twitter Sentimental Analysis According to Hash Tag
 
Twitter new updates 2022.
Twitter new updates 2022.Twitter new updates 2022.
Twitter new updates 2022.
 
Twitter Search Architecture
Twitter Search Architecture Twitter Search Architecture
Twitter Search Architecture
 
IRJET - Suicidal Text Detection using Machine Learning
IRJET -  	  Suicidal Text Detection using Machine LearningIRJET -  	  Suicidal Text Detection using Machine Learning
IRJET - Suicidal Text Detection using Machine Learning
 
[System design] Design a tweeter-like system
[System design] Design a tweeter-like system[System design] Design a tweeter-like system
[System design] Design a tweeter-like system
 
Social Sensor for Real Time Event Detection
Social Sensor for Real Time Event DetectionSocial Sensor for Real Time Event Detection
Social Sensor for Real Time Event Detection
 
Twitter in the Government
Twitter in the GovernmentTwitter in the Government
Twitter in the Government
 
[T3EXT DAY] TYPO3 Extension For Twitter
[T3EXT DAY] TYPO3 Extension For Twitter[T3EXT DAY] TYPO3 Extension For Twitter
[T3EXT DAY] TYPO3 Extension For Twitter
 
Twitter Camp - Web2 Business Model
Twitter Camp - Web2 Business ModelTwitter Camp - Web2 Business Model
Twitter Camp - Web2 Business Model
 

Recently uploaded

MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 

Recently uploaded (20)

MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 

Twitsper tweeting privately

  • 1. Twitsper: Tweeting Privately ABSTRACT: While OSNs today provide some form of privacy controls to protect a user’s shared content from other users, these controls are not sufficiently expressive to provide fine grained protection. In this article, we introduce Twitsper, to support fine-grained control over who sees a user’s messages. Twitsper provides privacy controls to the users of Twitter today without relying on Twitter to make changes. This is because it is a wrapper around Twitter that enables private group communication while preserving Twitter’s commercial interests. It preserves privacy both from the Twitsper server as well as from undesired Twitsper users. EXISTING SYSTEM: Currently, Twitter provides its users only two kinds of privacy controls—the ability to share content with all their followers (using tweets) or with exactly one follower (using direct messages) DISADVANTAGES OF EXISTING SYSTEM:  Controls aren’t sufficiently expressive to provide fine-grained protection.  No private group communication.
  • 2. PROPOSED SYSTEM: In this article, we introduce Twitsper, a wrapper over Twitter that provides privacy controls to the users of Twitter today without relying on Twitter to make changes. Currently, Twitter provides its users only two kinds of privacy controls—the ability to share content with all their followers (using tweets) or with exactly one follower (using Direct Messages).Twitsper enables users to share content with any subset of their followers, without requiring the followers to migrate to a new application or OSN. ADVANTAGES OF PROPOSED SYSTEM:  Sharing private information with some followers, Twitsper can also be used to segment information and send only relevant information to subsets of followers.  While Twitsper does not hide content from Twitter itself, some users may desire to do so. This raises a different set of challenges and may impact Twitter’s revenue model.  We created Twitsper to enable users to share content with any subset of their followers without requiring the followers to migrate to a new application or online social network (OSN).
  • 3. SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA/J2EE.  Java Version : JDK 1.6 & above.  Database : MYSQL
  • 4. REFERENCE: Indrajeet Singh, Michael Butkiewicz, Harsha V. Madhyastha, Srikanth,V. Krishnamurthy, Sateesh Addepalli ―Twitsper: Tweeting Privately‖ IEEE 2013.