SlideShare a Scribd company logo
1 of 22
Download to read offline
Interdependent Privacy and the
Psychology of Likes
A Unique Take on the Cambridge Analytica Case
Gergely Biczók
biczok@crysys.hu
(some slides courtesy of Gergely Ács)
CrySyS Lab
Dept. of Networked Systems and Services
Budapest University of Technology and Economics
www.crysys.hu
blog.crysys.hu
|
CrySyS Lab
§ 20% women
§ 30% Gerg*
2Hacktivity 2018
|
Facebook vs. Cambridge Analytica vs. You
270K (paid) users
thru AMT & FB app
30-50-87M friend
profiles harvested
(Allegedly) used to
influence voters:
• US presidential
elections
• Brexit vote
• Kenya
• „undisclosed
Eastern European
country”
Investigations and
lawsuits
• GSR-> SCL data
transfer is
violating FB
termsHacktivity 2018 3
|
Mark Z hearings
Hacktivity 2018 4
|
Unique take?
§ 2011: FTC investigation about FB 3rd party apps
§ 2013: „Interdependent Privacy: Let Me Share Your Data” at
Financial Crypto
§ 2013-14: Kogan’s app operational, SCL, CA
§ 2014: FB investigates Kogan’s case, changes API
§ 2016: „Collateral Damage of Facebook Apps: Friends,
Providers, and Privacy Interdependence” at IFIP SEC
§ 2016: US Presidential elections
§ 2018*: Chris Wyile blows whistle on CA
§ 2018*: „Collateral damage of Facebook third-party
applications: a comprehensive study” in Computers&Security
5Hacktivity 2018
|
Unique take!
§ Economics
§ Psychometrics
§ Technical
§ (Little bit of) Legal
§ (Politics excluded)
– Except for Mark Z
6Hacktivity 2018
|
Economics of interdependent privacy
7Hacktivity 2018
§ Externality is a cost (-) or benefit (+) that affects a party
who did not choose to incur that cost or benefit
§ Privacy loss is a negative ext => Interdependent privacy
– Friends were not notified/asked
§ Internalize them!
§ Tax (Pigou): whoever causes the negative ext. should
reimburse „society” (friend? CA? FB?)
§ Regulation: limiting the activity causing negative ext.
§ System (Mechanism) design: FB users could have direct
control over every bit of their personal info
|
Psychometric profiling (Kosinski et al., UCam)
§ Personality can be defined by the “Big Five”
– OCEAN: Openness, Conscientiousness,
Extraversion, Agreeableness, and Neuroticism
§ Such traits can be predicted pretty well
from your Facebook likes
– Example: emotionally less stable people
(high in neuroticism)
tend to like Kurt Cobain, or Gothic rock
§ How many likes are needed?
– 70 likes: friend’s level
– 150 likes: parent’s level
– 300 likes: spouse’s level
§ Typical Facebook user: 227 likes…
Hacktivity 2018 8
|
How is it used?
– Conscientious individuals are
generally more drawn to ads
which evoke anger
§ Microtargeted ads
– Fear advertising are best
suited for extroverts and
agreeable
Hacktivity 2018 9
|
Interdependent privacy: Facebook API
§ FB Graph API was designed explicitly for being able to scrape
information of app users’ friends
§ Issue: without the knowledge and consent of the friend!
§ V1.0 (depr. 2015): friends_xxx, ~1 permission per profile
attribute (also read_mailbox...)
§ V2.0 (2014-): user_friends, 1 permission for all
§ FB claims it solved the problem with v2.0
– Information only on friends who also installed the app
– Mutual consent for user_friends
§ (Currently v3.1 with weak permissions and strong app review
features)
Hacktivity 2018 10
|
Evidence: Facebook API Explorer
• Q(FB): why are we seeing this?
• A(FB): this is the same for all 2.x versions.
The friend installed the same app and there
is mutual consent given.
• Us: ...
• ... v2.4 fixed this
Hacktivity 2018 11
|
Privacy settings: Apps Others Use
• Note the defaults
• we noticed no change
in app behavior when
unchecking boxes
• FB confirms: not doing
anything since API v2.0
(except for posts on
your timeline)
• Was in the GUI until
April 2018 J
Hacktivity 2018 12
|
Collateral damage quantified (single app!)
Hacktivity 2018 13
|
Facebook’s reactions and remaining issues
§ „We are an idealistic company...”
§ Tightening privacy controls
§ Tool to check if you were affected by CA (32000 Hungarians)
§ Restricting APIs (e.g., Instagram, Graph API v3.0)
§ Working towards being GDPR-compliant
§ Hearings for Mark Z (US, EU)
§ Rumours of paid subscription (no ads!)
§ Some privacy issues untouched
– Multi-app data fusion
– Graph Search still available thru direct URLs
Hacktivity 2018 14
|
Is privacy lost for good?
• Hopefully not...
• European General Data Protection Regulation (GDPR)
• Privacy-by-design, differential privacy, PETs...
• On FB though...
?
?
Hacktivity 2018 16
|
FB privacy scandals over the years
§ 2006: News Feed
§ 2007: Beacon (ads)
§ 2011: FTC charges (3rd party apps behavior)
§ 2013: Graph Search („Catholic friends who like Durex” ...)
§ 2013: bug exposes private contact info (6M users)
§ 2014: mood manipulation (by FB scientists)
§ 2018: user tracking (Belgian court)
§ 2018: Cambridge Analytica
§ 2019:
§ 2020:
§ ...
§ FB is built on personal data, privacy has been/is/will
be an issue!
17Hacktivity 2018
|
Price of FB shares over the years
18Hacktivity 2018
|
§ Discovered 25th Sept.
§ 50 million accounts hacked
§ combination of 3 bugs in
the „View As” feature
Current FB security scandal
19Hacktivity 2018
|
§ Google’s „Cambridge
Analytica moment”
§ Very similar to the FB case
but (allegedly) caused by a
bug
§ Permission to 3rd party
app for user’s public profle
also yields user’s and
friends’ private profile
§ 438 apps, 500K profiles
§ Buggy 2015-2018!
§ G patched in March but no
announcement (guess
why?)
Google+ ongoing controversy
20Hacktivity 2018
|
15 minutes of fame J
Hacktivity 2018 21
|
Partners in crime
§ Interdependent privacy: Pern Hui Chia (@Google)
§ Collateral damage: Iraklis Symeonidis (@Univ. of Luxemburg)
§ Plus more from Belgium, Spain and Hungary
22Hacktivity 2018
|
Blog.crysys.hu & research papers
• Collateral damage of Facebook third-party applications: a
comprehensive study, Computers & Security, 77:179-208, 2018.
Joint work with I Symeonidis, KU Leuven (COSIC and CiTiP) and UAB
Barcelona.
• Interdependent Privacy: Let Me Share Your Data (Financial Crypto
’13). Joint work with PH Chia (now at Google)
Hacktivity 2018 23

More Related Content

What's hot

The removal of a russian app raises new concerns for apple and google
The removal of a russian app raises new concerns for apple and googleThe removal of a russian app raises new concerns for apple and google
The removal of a russian app raises new concerns for apple and googleaditi agarwal
 
Enterprise Graph Search: A game changer in information retrieval
Enterprise Graph Search: A game changer in information retrieval Enterprise Graph Search: A game changer in information retrieval
Enterprise Graph Search: A game changer in information retrieval Synata
 
DataTags: Sharing Privacy Sensitive Data by Latanya Sweeney
DataTags: Sharing Privacy Sensitive Data by Latanya SweeneyDataTags: Sharing Privacy Sensitive Data by Latanya Sweeney
DataTags: Sharing Privacy Sensitive Data by Latanya Sweeneydatascienceiqss
 
There will be no more apologies from facebook today as it takes the offensive
There will be no more apologies from facebook today as it takes the offensiveThere will be no more apologies from facebook today as it takes the offensive
There will be no more apologies from facebook today as it takes the offensiveaditi agarwal
 
Data mining for social media
Data mining for social mediaData mining for social media
Data mining for social mediarangesharp
 
Social Targeting: Understanding Social Media Data Mining & Analysis
Social Targeting: Understanding Social Media Data Mining & AnalysisSocial Targeting: Understanding Social Media Data Mining & Analysis
Social Targeting: Understanding Social Media Data Mining & AnalysisInfini Graph
 
Newsgathering & Monitoring on the Social Web
Newsgathering & Monitoring on the Social WebNewsgathering & Monitoring on the Social Web
Newsgathering & Monitoring on the Social WebDinaAli69
 
Mining social data
Mining social dataMining social data
Mining social dataMalk Zameth
 
Social Media Data Mining
Social Media Data MiningSocial Media Data Mining
Social Media Data MiningRyan Reede
 
Bayesian networks for data integration in the absence of foreign keys
Bayesian networks for data integration in the absence of foreign keysBayesian networks for data integration in the absence of foreign keys
Bayesian networks for data integration in the absence of foreign keysShakas Technologies
 
Tech Companies and the Fight for Privacy
Tech Companies and the Fight for PrivacyTech Companies and the Fight for Privacy
Tech Companies and the Fight for PrivacyTier10
 

What's hot (12)

The removal of a russian app raises new concerns for apple and google
The removal of a russian app raises new concerns for apple and googleThe removal of a russian app raises new concerns for apple and google
The removal of a russian app raises new concerns for apple and google
 
Enterprise Graph Search: A game changer in information retrieval
Enterprise Graph Search: A game changer in information retrieval Enterprise Graph Search: A game changer in information retrieval
Enterprise Graph Search: A game changer in information retrieval
 
DataTags: Sharing Privacy Sensitive Data by Latanya Sweeney
DataTags: Sharing Privacy Sensitive Data by Latanya SweeneyDataTags: Sharing Privacy Sensitive Data by Latanya Sweeney
DataTags: Sharing Privacy Sensitive Data by Latanya Sweeney
 
There will be no more apologies from facebook today as it takes the offensive
There will be no more apologies from facebook today as it takes the offensiveThere will be no more apologies from facebook today as it takes the offensive
There will be no more apologies from facebook today as it takes the offensive
 
Data mining for social media
Data mining for social mediaData mining for social media
Data mining for social media
 
Social Targeting: Understanding Social Media Data Mining & Analysis
Social Targeting: Understanding Social Media Data Mining & AnalysisSocial Targeting: Understanding Social Media Data Mining & Analysis
Social Targeting: Understanding Social Media Data Mining & Analysis
 
Newsgathering & Monitoring on the Social Web
Newsgathering & Monitoring on the Social WebNewsgathering & Monitoring on the Social Web
Newsgathering & Monitoring on the Social Web
 
Mining social data
Mining social dataMining social data
Mining social data
 
Social Media Data Mining
Social Media Data MiningSocial Media Data Mining
Social Media Data Mining
 
Bayesian networks for data integration in the absence of foreign keys
Bayesian networks for data integration in the absence of foreign keysBayesian networks for data integration in the absence of foreign keys
Bayesian networks for data integration in the absence of foreign keys
 
Sampling and recruiting on Facebook
Sampling and recruiting on FacebookSampling and recruiting on Facebook
Sampling and recruiting on Facebook
 
Tech Companies and the Fight for Privacy
Tech Companies and the Fight for PrivacyTech Companies and the Fight for Privacy
Tech Companies and the Fight for Privacy
 

Similar to Interdependent Privacy and Psych Profiling in the Cambridge Case

Untitled.docx
Untitled.docxUntitled.docx
Untitled.docxgekas1
 
Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps (at PETS 2016)
Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps (at PETS 2016)Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps (at PETS 2016)
Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps (at PETS 2016)Hamza Harkous
 
Facebook's privacy breach
Facebook's privacy breachFacebook's privacy breach
Facebook's privacy breachManishaRani37
 
Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...
Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...
Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...Nicola Osborne
 
Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Phil Cryer
 
Point of View on Cambridge Analytica Scandal
Point of View on Cambridge Analytica Scandal Point of View on Cambridge Analytica Scandal
Point of View on Cambridge Analytica Scandal Ogilvy
 
Facebook Credits and Social Video
Facebook Credits and Social VideoFacebook Credits and Social Video
Facebook Credits and Social VideoMediabistro
 
Big data - The beauty or the Beast
Big data  - The beauty or the BeastBig data  - The beauty or the Beast
Big data - The beauty or the BeastSteliana Moraru
 
Facebook, cambridge analytica and the impact on gdpr enforcement
Facebook, cambridge analytica and the impact on gdpr enforcementFacebook, cambridge analytica and the impact on gdpr enforcement
Facebook, cambridge analytica and the impact on gdpr enforcementWilliamjohnesUK123
 
FSM420 Case 2018 Privacy Commissioner launches Facebook i.docx
FSM420  Case 2018 Privacy Commissioner launches Facebook i.docxFSM420  Case 2018 Privacy Commissioner launches Facebook i.docx
FSM420 Case 2018 Privacy Commissioner launches Facebook i.docxhanneloremccaffery
 
1FACEBOOK DATA SCANDALNameCourse Code and Nam
1FACEBOOK DATA SCANDALNameCourse Code and Nam1FACEBOOK DATA SCANDALNameCourse Code and Nam
1FACEBOOK DATA SCANDALNameCourse Code and NamAnastaciaShadelb
 
Facebook and cambridge analytica scandal
Facebook and cambridge analytica scandalFacebook and cambridge analytica scandal
Facebook and cambridge analytica scandalSajibHossain17
 
The Future of Search
The Future of SearchThe Future of Search
The Future of SearchiCrossing
 
A Brief History of Facebook Controversies
A Brief History of Facebook ControversiesA Brief History of Facebook Controversies
A Brief History of Facebook ControversiesInternet Law Center
 
Sbs facebook data privacy dilemma case study
Sbs   facebook data privacy dilemma case studySbs   facebook data privacy dilemma case study
Sbs facebook data privacy dilemma case studysmumbahelp
 
Social Media in Local Government and the GIS user
Social Media in Local Government and the GIS userSocial Media in Local Government and the GIS user
Social Media in Local Government and the GIS userGletham Communications
 

Similar to Interdependent Privacy and Psych Profiling in the Cambridge Case (20)

sixspans0102
sixspans0102sixspans0102
sixspans0102
 
Untitled.docx
Untitled.docxUntitled.docx
Untitled.docx
 
Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps (at PETS 2016)
Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps (at PETS 2016)Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps (at PETS 2016)
Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps (at PETS 2016)
 
Facebook's privacy breach
Facebook's privacy breachFacebook's privacy breach
Facebook's privacy breach
 
Cataloguing your friends and neighbours
Cataloguing your friends and neighboursCataloguing your friends and neighbours
Cataloguing your friends and neighbours
 
Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...
Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...
Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...
 
Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)
 
Facebot
FacebotFacebot
Facebot
 
Point of View on Cambridge Analytica Scandal
Point of View on Cambridge Analytica Scandal Point of View on Cambridge Analytica Scandal
Point of View on Cambridge Analytica Scandal
 
Facebook Credits and Social Video
Facebook Credits and Social VideoFacebook Credits and Social Video
Facebook Credits and Social Video
 
Big data - The beauty or the Beast
Big data  - The beauty or the BeastBig data  - The beauty or the Beast
Big data - The beauty or the Beast
 
Facebook, cambridge analytica and the impact on gdpr enforcement
Facebook, cambridge analytica and the impact on gdpr enforcementFacebook, cambridge analytica and the impact on gdpr enforcement
Facebook, cambridge analytica and the impact on gdpr enforcement
 
FSM420 Case 2018 Privacy Commissioner launches Facebook i.docx
FSM420  Case 2018 Privacy Commissioner launches Facebook i.docxFSM420  Case 2018 Privacy Commissioner launches Facebook i.docx
FSM420 Case 2018 Privacy Commissioner launches Facebook i.docx
 
1FACEBOOK DATA SCANDALNameCourse Code and Nam
1FACEBOOK DATA SCANDALNameCourse Code and Nam1FACEBOOK DATA SCANDALNameCourse Code and Nam
1FACEBOOK DATA SCANDALNameCourse Code and Nam
 
Is data privacy a reality with the gdpr?
Is data privacy a reality with the gdpr?Is data privacy a reality with the gdpr?
Is data privacy a reality with the gdpr?
 
Facebook and cambridge analytica scandal
Facebook and cambridge analytica scandalFacebook and cambridge analytica scandal
Facebook and cambridge analytica scandal
 
The Future of Search
The Future of SearchThe Future of Search
The Future of Search
 
A Brief History of Facebook Controversies
A Brief History of Facebook ControversiesA Brief History of Facebook Controversies
A Brief History of Facebook Controversies
 
Sbs facebook data privacy dilemma case study
Sbs   facebook data privacy dilemma case studySbs   facebook data privacy dilemma case study
Sbs facebook data privacy dilemma case study
 
Social Media in Local Government and the GIS user
Social Media in Local Government and the GIS userSocial Media in Local Government and the GIS user
Social Media in Local Government and the GIS user
 

More from hacktivity

Zsombor Kovács - Cheaters for Everything from Minesweeper to Mobile Banking ...
Zsombor Kovács - 	Cheaters for Everything from Minesweeper to Mobile Banking ...Zsombor Kovács - 	Cheaters for Everything from Minesweeper to Mobile Banking ...
Zsombor Kovács - Cheaters for Everything from Minesweeper to Mobile Banking ...hacktivity
 
Vincent Ruijter - ~Securing~ Attacking Kubernetes
Vincent Ruijter - ~Securing~ Attacking KubernetesVincent Ruijter - ~Securing~ Attacking Kubernetes
Vincent Ruijter - ~Securing~ Attacking Kuberneteshacktivity
 
Balázs Bucsay - XFLTReaT: Building a Tunnel
Balázs Bucsay - XFLTReaT: Building a TunnelBalázs Bucsay - XFLTReaT: Building a Tunnel
Balázs Bucsay - XFLTReaT: Building a Tunnelhacktivity
 
Mikhail Egorov - Hunting for bugs in Adobe Experience Manager webapps
Mikhail Egorov - Hunting for bugs in Adobe Experience Manager webappsMikhail Egorov - Hunting for bugs in Adobe Experience Manager webapps
Mikhail Egorov - Hunting for bugs in Adobe Experience Manager webappshacktivity
 
Rodrigo Branco - How Offensive Security is Defining the Way We Compute // Key...
Rodrigo Branco - How Offensive Security is Defining the Way We Compute // Key...Rodrigo Branco - How Offensive Security is Defining the Way We Compute // Key...
Rodrigo Branco - How Offensive Security is Defining the Way We Compute // Key...hacktivity
 
Gabrial Cirlig & Stefan Tanase - Smart Car Forensics and Vehicle Weaponization
Gabrial Cirlig & Stefan Tanase - Smart Car Forensics and Vehicle WeaponizationGabrial Cirlig & Stefan Tanase - Smart Car Forensics and Vehicle Weaponization
Gabrial Cirlig & Stefan Tanase - Smart Car Forensics and Vehicle Weaponizationhacktivity
 
Csongor Tamás - Examples of Locality Sensitive Hashing & their Usage for Malw...
Csongor Tamás - Examples of Locality Sensitive Hashing & their Usage for Malw...Csongor Tamás - Examples of Locality Sensitive Hashing & their Usage for Malw...
Csongor Tamás - Examples of Locality Sensitive Hashing & their Usage for Malw...hacktivity
 
Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication S...
Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication S...Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication S...
Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication S...hacktivity
 
Paolo Stagno - A Drone Tale: All Your Drones Belong To Us
Paolo Stagno - A Drone Tale: All Your Drones Belong To UsPaolo Stagno - A Drone Tale: All Your Drones Belong To Us
Paolo Stagno - A Drone Tale: All Your Drones Belong To Ushacktivity
 
Jack S (linkcabin) - Becoming The Quiz Master: Thanks RE.
Jack S (linkcabin) - Becoming The Quiz Master: Thanks RE.Jack S (linkcabin) - Becoming The Quiz Master: Thanks RE.
Jack S (linkcabin) - Becoming The Quiz Master: Thanks RE.hacktivity
 
Zoltán Balázs - Ethereum Smart Contract Hacking Explained like I’m Five
Zoltán Balázs - Ethereum Smart Contract Hacking Explained like I’m FiveZoltán Balázs - Ethereum Smart Contract Hacking Explained like I’m Five
Zoltán Balázs - Ethereum Smart Contract Hacking Explained like I’m Fivehacktivity
 

More from hacktivity (11)

Zsombor Kovács - Cheaters for Everything from Minesweeper to Mobile Banking ...
Zsombor Kovács - 	Cheaters for Everything from Minesweeper to Mobile Banking ...Zsombor Kovács - 	Cheaters for Everything from Minesweeper to Mobile Banking ...
Zsombor Kovács - Cheaters for Everything from Minesweeper to Mobile Banking ...
 
Vincent Ruijter - ~Securing~ Attacking Kubernetes
Vincent Ruijter - ~Securing~ Attacking KubernetesVincent Ruijter - ~Securing~ Attacking Kubernetes
Vincent Ruijter - ~Securing~ Attacking Kubernetes
 
Balázs Bucsay - XFLTReaT: Building a Tunnel
Balázs Bucsay - XFLTReaT: Building a TunnelBalázs Bucsay - XFLTReaT: Building a Tunnel
Balázs Bucsay - XFLTReaT: Building a Tunnel
 
Mikhail Egorov - Hunting for bugs in Adobe Experience Manager webapps
Mikhail Egorov - Hunting for bugs in Adobe Experience Manager webappsMikhail Egorov - Hunting for bugs in Adobe Experience Manager webapps
Mikhail Egorov - Hunting for bugs in Adobe Experience Manager webapps
 
Rodrigo Branco - How Offensive Security is Defining the Way We Compute // Key...
Rodrigo Branco - How Offensive Security is Defining the Way We Compute // Key...Rodrigo Branco - How Offensive Security is Defining the Way We Compute // Key...
Rodrigo Branco - How Offensive Security is Defining the Way We Compute // Key...
 
Gabrial Cirlig & Stefan Tanase - Smart Car Forensics and Vehicle Weaponization
Gabrial Cirlig & Stefan Tanase - Smart Car Forensics and Vehicle WeaponizationGabrial Cirlig & Stefan Tanase - Smart Car Forensics and Vehicle Weaponization
Gabrial Cirlig & Stefan Tanase - Smart Car Forensics and Vehicle Weaponization
 
Csongor Tamás - Examples of Locality Sensitive Hashing & their Usage for Malw...
Csongor Tamás - Examples of Locality Sensitive Hashing & their Usage for Malw...Csongor Tamás - Examples of Locality Sensitive Hashing & their Usage for Malw...
Csongor Tamás - Examples of Locality Sensitive Hashing & their Usage for Malw...
 
Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication S...
Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication S...Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication S...
Matthias Deeg - Bypassing an Enterprise-Grade Biometric Face Authentication S...
 
Paolo Stagno - A Drone Tale: All Your Drones Belong To Us
Paolo Stagno - A Drone Tale: All Your Drones Belong To UsPaolo Stagno - A Drone Tale: All Your Drones Belong To Us
Paolo Stagno - A Drone Tale: All Your Drones Belong To Us
 
Jack S (linkcabin) - Becoming The Quiz Master: Thanks RE.
Jack S (linkcabin) - Becoming The Quiz Master: Thanks RE.Jack S (linkcabin) - Becoming The Quiz Master: Thanks RE.
Jack S (linkcabin) - Becoming The Quiz Master: Thanks RE.
 
Zoltán Balázs - Ethereum Smart Contract Hacking Explained like I’m Five
Zoltán Balázs - Ethereum Smart Contract Hacking Explained like I’m FiveZoltán Balázs - Ethereum Smart Contract Hacking Explained like I’m Five
Zoltán Balázs - Ethereum Smart Contract Hacking Explained like I’m Five
 

Recently uploaded

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Recently uploaded (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Interdependent Privacy and Psych Profiling in the Cambridge Case

  • 1. Interdependent Privacy and the Psychology of Likes A Unique Take on the Cambridge Analytica Case Gergely Biczók biczok@crysys.hu (some slides courtesy of Gergely Ács) CrySyS Lab Dept. of Networked Systems and Services Budapest University of Technology and Economics www.crysys.hu blog.crysys.hu
  • 2. | CrySyS Lab § 20% women § 30% Gerg* 2Hacktivity 2018
  • 3. | Facebook vs. Cambridge Analytica vs. You 270K (paid) users thru AMT & FB app 30-50-87M friend profiles harvested (Allegedly) used to influence voters: • US presidential elections • Brexit vote • Kenya • „undisclosed Eastern European country” Investigations and lawsuits • GSR-> SCL data transfer is violating FB termsHacktivity 2018 3
  • 5. | Unique take? § 2011: FTC investigation about FB 3rd party apps § 2013: „Interdependent Privacy: Let Me Share Your Data” at Financial Crypto § 2013-14: Kogan’s app operational, SCL, CA § 2014: FB investigates Kogan’s case, changes API § 2016: „Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence” at IFIP SEC § 2016: US Presidential elections § 2018*: Chris Wyile blows whistle on CA § 2018*: „Collateral damage of Facebook third-party applications: a comprehensive study” in Computers&Security 5Hacktivity 2018
  • 6. | Unique take! § Economics § Psychometrics § Technical § (Little bit of) Legal § (Politics excluded) – Except for Mark Z 6Hacktivity 2018
  • 7. | Economics of interdependent privacy 7Hacktivity 2018 § Externality is a cost (-) or benefit (+) that affects a party who did not choose to incur that cost or benefit § Privacy loss is a negative ext => Interdependent privacy – Friends were not notified/asked § Internalize them! § Tax (Pigou): whoever causes the negative ext. should reimburse „society” (friend? CA? FB?) § Regulation: limiting the activity causing negative ext. § System (Mechanism) design: FB users could have direct control over every bit of their personal info
  • 8. | Psychometric profiling (Kosinski et al., UCam) § Personality can be defined by the “Big Five” – OCEAN: Openness, Conscientiousness, Extraversion, Agreeableness, and Neuroticism § Such traits can be predicted pretty well from your Facebook likes – Example: emotionally less stable people (high in neuroticism) tend to like Kurt Cobain, or Gothic rock § How many likes are needed? – 70 likes: friend’s level – 150 likes: parent’s level – 300 likes: spouse’s level § Typical Facebook user: 227 likes… Hacktivity 2018 8
  • 9. | How is it used? – Conscientious individuals are generally more drawn to ads which evoke anger § Microtargeted ads – Fear advertising are best suited for extroverts and agreeable Hacktivity 2018 9
  • 10. | Interdependent privacy: Facebook API § FB Graph API was designed explicitly for being able to scrape information of app users’ friends § Issue: without the knowledge and consent of the friend! § V1.0 (depr. 2015): friends_xxx, ~1 permission per profile attribute (also read_mailbox...) § V2.0 (2014-): user_friends, 1 permission for all § FB claims it solved the problem with v2.0 – Information only on friends who also installed the app – Mutual consent for user_friends § (Currently v3.1 with weak permissions and strong app review features) Hacktivity 2018 10
  • 11. | Evidence: Facebook API Explorer • Q(FB): why are we seeing this? • A(FB): this is the same for all 2.x versions. The friend installed the same app and there is mutual consent given. • Us: ... • ... v2.4 fixed this Hacktivity 2018 11
  • 12. | Privacy settings: Apps Others Use • Note the defaults • we noticed no change in app behavior when unchecking boxes • FB confirms: not doing anything since API v2.0 (except for posts on your timeline) • Was in the GUI until April 2018 J Hacktivity 2018 12
  • 13. | Collateral damage quantified (single app!) Hacktivity 2018 13
  • 14. | Facebook’s reactions and remaining issues § „We are an idealistic company...” § Tightening privacy controls § Tool to check if you were affected by CA (32000 Hungarians) § Restricting APIs (e.g., Instagram, Graph API v3.0) § Working towards being GDPR-compliant § Hearings for Mark Z (US, EU) § Rumours of paid subscription (no ads!) § Some privacy issues untouched – Multi-app data fusion – Graph Search still available thru direct URLs Hacktivity 2018 14
  • 15. | Is privacy lost for good? • Hopefully not... • European General Data Protection Regulation (GDPR) • Privacy-by-design, differential privacy, PETs... • On FB though... ? ? Hacktivity 2018 16
  • 16. | FB privacy scandals over the years § 2006: News Feed § 2007: Beacon (ads) § 2011: FTC charges (3rd party apps behavior) § 2013: Graph Search („Catholic friends who like Durex” ...) § 2013: bug exposes private contact info (6M users) § 2014: mood manipulation (by FB scientists) § 2018: user tracking (Belgian court) § 2018: Cambridge Analytica § 2019: § 2020: § ... § FB is built on personal data, privacy has been/is/will be an issue! 17Hacktivity 2018
  • 17. | Price of FB shares over the years 18Hacktivity 2018
  • 18. | § Discovered 25th Sept. § 50 million accounts hacked § combination of 3 bugs in the „View As” feature Current FB security scandal 19Hacktivity 2018
  • 19. | § Google’s „Cambridge Analytica moment” § Very similar to the FB case but (allegedly) caused by a bug § Permission to 3rd party app for user’s public profle also yields user’s and friends’ private profile § 438 apps, 500K profiles § Buggy 2015-2018! § G patched in March but no announcement (guess why?) Google+ ongoing controversy 20Hacktivity 2018
  • 20. | 15 minutes of fame J Hacktivity 2018 21
  • 21. | Partners in crime § Interdependent privacy: Pern Hui Chia (@Google) § Collateral damage: Iraklis Symeonidis (@Univ. of Luxemburg) § Plus more from Belgium, Spain and Hungary 22Hacktivity 2018
  • 22. | Blog.crysys.hu & research papers • Collateral damage of Facebook third-party applications: a comprehensive study, Computers & Security, 77:179-208, 2018. Joint work with I Symeonidis, KU Leuven (COSIC and CiTiP) and UAB Barcelona. • Interdependent Privacy: Let Me Share Your Data (Financial Crypto ’13). Joint work with PH Chia (now at Google) Hacktivity 2018 23