SlideShare a Scribd company logo
Social networks and
       privacy

Consumer Reports
 State of the Net
  May 4, 2010
         Lee Tien
 EFF senior staff attorney
       tien@eff.org
What DOJ says:
        UTILITY IN CRIMINAL CASES
Evidence from social-networking sites can
• Reveal personal communications
• Establish motives and personal relationships
• Provide location information
• Prove and disprove alibis
• Establish crime or criminal enterprise
Also: instrumentalities or fruits of crime
Social graph privacy
               (it’s not just about
                       you)
• From personal data to relationship data
• ZDNet comment: “A number of my friends in
  Iran are active student protesters….[who] use
  Facebook extensively to organize…terrified
  that their once private lists of friends are now
  available to ‘everyone’…. When that
  ‘everyone’ happens to include the Iranian
  Revolutionary Guard….”
Facebook then and
                     now
• 2005 privacy policy: "No personal information
  that you submit to Thefacebook will be
  available to any user of the Web Site who
  does not belong to at least one of the groups
  specified by you in your privacy settings."
• Now: parts of your profile, "including your
  current city, hometown, education and work,
  and likes and interests" will be transformed
  into public "connections."
  • Can only prevent by deleting them.
Public information
• name, profile picture, current city,
  gender, networks, complete list of your
  friends, and your complete list of
  connections (formerly the list of pages
  that you were a "fan" of, but now
  including profile information like your
  hometown, education, work, activities,
  likes and interests, and, in some cases,
  your likes and recommendations from
  non-Facebook pages around the web)
Expectation
                     exp

                   mismatch?
• Public isn’t necessarily bad, but
• Originally FB was a way to share your
  interests and information with a select
  group of your own choosing.
• Now FB has helped itself and its ad and
  business partners to more and more of
  users’ information, while limiting users’
  control options
Who has control?
• Degrees of publicity: e.g. status data
  had been accessible, but FB News
  Feed (2006) made it stream “pushed” to
  your friends—users upset.
• Current app + friend problem
  • FB apps get any data you allow them to …
    and apps run by your friends get any of
    your data that you let your friends see* IP
• Not just change—complexity
“Evil interfaces”
• “act of creating deliberately confusing jargon
  and user interfaces which trick your users into
  sharing more info about themselves than they
  really want to”
• Labyrinthine process for opting out of Instant
  Personalization (allows select FB partner
  websites to collect and log all of your "publicly
  available” data)
• Google Buzz (2/10): threatened to move
  private GMail recipients into a public
  "frequent contacts" list; complex "opt-out"
  user-interface was big part of the problem
Publicity v. visibility
• “While you do have the option to hide
  your Friend List from being visible on
  your profile, it will be available to
  applications you use and websites you
  connect with using Facebook.”
• Users may think they’re protecting
  information, but they’re merely making it
  less visible (to users)
• Just confusing or deceptive/misleading?
Right to leave?
• Lock-in problem
  • Can you take your data with you?
  • Can you delete when you leave?
• Social networks could facilitate data
  portability and thus competition on
  privacy
Thoughts from danah
                  boyd
• Social media—the walls have ears
• Privacy not merely about control of
  data, nor a property of data
• About managing our selves in situations
  • Shared or “collective understanding of a
    social situation’s boundaries and knowing
    how to operate within them”
• Degrees of publicity and of trust
Two sides of ID
                management
• Helping the user manage their multiple
  personas?
• Or helping strangers identify you?
Some URLs
• http://www.eff.org/deeplinks/2009/12/wh
  o-knows-who-your-facebook-friends-are
• http://www.eff.org/deeplinks/2010/04/fac
   http://www.eff.org/deeplinks/2010/04/facebooks-evil-interfaces

  ebook-timeline
• http://www.eff.org/deeplinks/2010/04/fac
  ebooks-evil-interfaces
• http://www.eff.org/deeplinks/2010/04/ha
  ndy-facebook-english-translator
• http://www.danah.boyd/papers/

More Related Content

What's hot

Info/Techno Overload: The age of social networking
Info/Techno Overload: The age of social networkingInfo/Techno Overload: The age of social networking
Info/Techno Overload: The age of social networking
Danielle Kane
 
Orkut
OrkutOrkut
Orkutcckss
 
Why use Facebook or MySpace in Extension
Why use Facebook or MySpace in ExtensionWhy use Facebook or MySpace in Extension
Why use Facebook or MySpace in Extension
John Dorner
 
Technology and Social Media: How to Get the Word Out
Technology and Social Media: How to Get the Word OutTechnology and Social Media: How to Get the Word Out
Technology and Social Media: How to Get the Word Out
Jessica Vitak
 
Social Networking Workshop
Social Networking WorkshopSocial Networking Workshop
Social Networking WorkshopMike Shaffer
 
a paper on Social Networking Sites
a paper on Social Networking Sitesa paper on Social Networking Sites
a paper on Social Networking Sites
Rajesh Gangireddy
 
Intro to social networking
Intro to social networkingIntro to social networking
Intro to social networkingKris
 
Internet based Social Networking Services
Internet based Social Networking ServicesInternet based Social Networking Services
Internet based Social Networking Services
rahulmonikasharma
 
Understanding the role of community in online dating copypasteads.com
Understanding the role of community in online dating copypasteads.comUnderstanding the role of community in online dating copypasteads.com
Understanding the role of community in online dating copypasteads.com
jackpot201
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009canadianlawyer
 
374 Arhan
374 Arhan374 Arhan
374 Arhanaci2008
 
Intro to Social Media
Intro to Social MediaIntro to Social Media
Intro to Social Media
DiscoverAbility NJ
 
Using Facebook in Government
Using Facebook in GovernmentUsing Facebook in Government
Using Facebook in GovernmentGreg Licamele
 
Facebook cheating pecha kucha
Facebook cheating pecha kuchaFacebook cheating pecha kucha
Facebook cheating pecha kucha
ashleymannes
 
Relationships in the Digital Age: Social Media and Online Dating
Relationships in the Digital Age: Social Media and Online DatingRelationships in the Digital Age: Social Media and Online Dating
Relationships in the Digital Age: Social Media and Online Dating
Emma Cheesman
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy Concerns
Corinne Weisgerber
 
MY_SNS
MY_SNSMY_SNS

What's hot (19)

Info/Techno Overload: The age of social networking
Info/Techno Overload: The age of social networkingInfo/Techno Overload: The age of social networking
Info/Techno Overload: The age of social networking
 
Orkut
OrkutOrkut
Orkut
 
Why use Facebook or MySpace in Extension
Why use Facebook or MySpace in ExtensionWhy use Facebook or MySpace in Extension
Why use Facebook or MySpace in Extension
 
Technology and Social Media: How to Get the Word Out
Technology and Social Media: How to Get the Word OutTechnology and Social Media: How to Get the Word Out
Technology and Social Media: How to Get the Word Out
 
Social Networking Workshop
Social Networking WorkshopSocial Networking Workshop
Social Networking Workshop
 
a paper on Social Networking Sites
a paper on Social Networking Sitesa paper on Social Networking Sites
a paper on Social Networking Sites
 
Intro to social networking
Intro to social networkingIntro to social networking
Intro to social networking
 
Social networking ppt
Social networking pptSocial networking ppt
Social networking ppt
 
Internet based Social Networking Services
Internet based Social Networking ServicesInternet based Social Networking Services
Internet based Social Networking Services
 
Understanding the role of community in online dating copypasteads.com
Understanding the role of community in online dating copypasteads.comUnderstanding the role of community in online dating copypasteads.com
Understanding the role of community in online dating copypasteads.com
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
 
374 Arhan
374 Arhan374 Arhan
374 Arhan
 
Social network
Social networkSocial network
Social network
 
Intro to Social Media
Intro to Social MediaIntro to Social Media
Intro to Social Media
 
Using Facebook in Government
Using Facebook in GovernmentUsing Facebook in Government
Using Facebook in Government
 
Facebook cheating pecha kucha
Facebook cheating pecha kuchaFacebook cheating pecha kucha
Facebook cheating pecha kucha
 
Relationships in the Digital Age: Social Media and Online Dating
Relationships in the Digital Age: Social Media and Online DatingRelationships in the Digital Age: Social Media and Online Dating
Relationships in the Digital Age: Social Media and Online Dating
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy Concerns
 
MY_SNS
MY_SNSMY_SNS
MY_SNS
 

Viewers also liked

Caravans a british love affair
Caravans  a british love affairCaravans  a british love affair
Caravans a british love affair
olivia bent
 
X men.v3.20.2012
X men.v3.20.2012X men.v3.20.2012
Ainan bin mahamud_v_syed_abu_bakar_bin_habib
Ainan bin mahamud_v_syed_abu_bakar_bin_habibAinan bin mahamud_v_syed_abu_bakar_bin_habib
Ainan bin mahamud_v_syed_abu_bakar_bin_habib
Nursyahidah Khair
 
ConsultN'GO Booklet
ConsultN'GO BookletConsultN'GO Booklet
ConsultN'GO Booklet
Betül Yazıcı
 
Conocimiento2
Conocimiento2Conocimiento2
Conocimiento2
rodolfoarrietama
 
Notebook
NotebookNotebook
Notebookspy343
 
[4] rpp pai sma
[4] rpp pai sma[4] rpp pai sma
[4] rpp pai sma
yuniaistiqomah
 
O que é design de interação
O que é design de interaçãoO que é design de interação
O que é design de interação
Hugo Albuquerque
 
Soarian Health Archive Presentatie Sap I.S.H.Med Gebruikersdag 24 Juni 2009
Soarian Health Archive Presentatie Sap I.S.H.Med Gebruikersdag 24 Juni 2009Soarian Health Archive Presentatie Sap I.S.H.Med Gebruikersdag 24 Juni 2009
Soarian Health Archive Presentatie Sap I.S.H.Med Gebruikersdag 24 Juni 2009
Soarian Health Archive User Group
 
Structure of woods
Structure of woodsStructure of woods
Structure of woods
ravi bhivra
 
Module iv block 2
Module iv block 2Module iv block 2
Module iv block 2
MyriamBeteta
 
Recordações do escrivão isaías caminha
Recordações do escrivão isaías caminhaRecordações do escrivão isaías caminha
Recordações do escrivão isaías caminhama.no.el.ne.ves
 
Chainsys proposal ki v1-28-feb-2013
Chainsys proposal ki  v1-28-feb-2013Chainsys proposal ki  v1-28-feb-2013
Chainsys proposal ki v1-28-feb-2013
Uppiliappan Gopalan
 

Viewers also liked (17)

Caravans a british love affair
Caravans  a british love affairCaravans  a british love affair
Caravans a british love affair
 
X men.v3.20.2012
X men.v3.20.2012X men.v3.20.2012
X men.v3.20.2012
 
Ainan bin mahamud_v_syed_abu_bakar_bin_habib
Ainan bin mahamud_v_syed_abu_bakar_bin_habibAinan bin mahamud_v_syed_abu_bakar_bin_habib
Ainan bin mahamud_v_syed_abu_bakar_bin_habib
 
Canal local
Canal localCanal local
Canal local
 
PMC - Crear
PMC - CrearPMC - Crear
PMC - Crear
 
ConsultN'GO Booklet
ConsultN'GO BookletConsultN'GO Booklet
ConsultN'GO Booklet
 
Conocimiento2
Conocimiento2Conocimiento2
Conocimiento2
 
Notebook
NotebookNotebook
Notebook
 
Srijeeth_alva
Srijeeth_alvaSrijeeth_alva
Srijeeth_alva
 
Stock Report
Stock ReportStock Report
Stock Report
 
[4] rpp pai sma
[4] rpp pai sma[4] rpp pai sma
[4] rpp pai sma
 
O que é design de interação
O que é design de interaçãoO que é design de interação
O que é design de interação
 
Soarian Health Archive Presentatie Sap I.S.H.Med Gebruikersdag 24 Juni 2009
Soarian Health Archive Presentatie Sap I.S.H.Med Gebruikersdag 24 Juni 2009Soarian Health Archive Presentatie Sap I.S.H.Med Gebruikersdag 24 Juni 2009
Soarian Health Archive Presentatie Sap I.S.H.Med Gebruikersdag 24 Juni 2009
 
Structure of woods
Structure of woodsStructure of woods
Structure of woods
 
Module iv block 2
Module iv block 2Module iv block 2
Module iv block 2
 
Recordações do escrivão isaías caminha
Recordações do escrivão isaías caminhaRecordações do escrivão isaías caminha
Recordações do escrivão isaías caminha
 
Chainsys proposal ki v1-28-feb-2013
Chainsys proposal ki  v1-28-feb-2013Chainsys proposal ki  v1-28-feb-2013
Chainsys proposal ki v1-28-feb-2013
 

Similar to Social Insecurity Panel, Lee Tien, EFF

Social Media for Beginners
Social Media for BeginnersSocial Media for Beginners
Social Media for Beginners
Queens Library
 
Social Media and Dating Presentation
Social Media and Dating PresentationSocial Media and Dating Presentation
Social Media and Dating PresentationShanika Robinson
 
Presentation on facebook
Presentation on facebookPresentation on facebook
Presentation on facebookparthproy
 
Facebook
FacebookFacebook
FacebookSD Paul
 
The FACEBOOK and TWITTER Phenomenon [9-28-2010]
The FACEBOOK and TWITTER Phenomenon [9-28-2010]The FACEBOOK and TWITTER Phenomenon [9-28-2010]
The FACEBOOK and TWITTER Phenomenon [9-28-2010]
CLARENCE APOSTOL, CHRMP, CHRM, CIRS, IADT
 
Social network privacy
Social network privacySocial network privacy
Social network privacySTO STRATEGY
 
Social networking
Social networkingSocial networking
Social networking
Thousheed Ahamed
 
Group 1 Introduction to Social Networking.pptx
Group 1 Introduction to Social Networking.pptxGroup 1 Introduction to Social Networking.pptx
Group 1 Introduction to Social Networking.pptx
JenicaJDizon
 
facebook and its comptitors
facebook and its comptitorsfacebook and its comptitors
facebook and its comptitors
Rajat Sharma
 
Future world drug addicted
Future world drug addictedFuture world drug addicted
Future world drug addicted
Vimala Siravi
 
Presentation social networking service
Presentation social networking servicePresentation social networking service
Presentation social networking service
Manish S Thingalaya
 
Social networking
Social networkingSocial networking
Social networkingJohan Koren
 
How Not to Get Fired Using Social Media at Work - EEO, Diversity and Social M...
How Not to Get Fired Using Social Media at Work - EEO, Diversity and Social M...How Not to Get Fired Using Social Media at Work - EEO, Diversity and Social M...
How Not to Get Fired Using Social Media at Work - EEO, Diversity and Social M...GovLoop
 
Facebook Strategies [for Realtors] Seminar 092011
Facebook Strategies [for Realtors] Seminar 092011Facebook Strategies [for Realtors] Seminar 092011
Facebook Strategies [for Realtors] Seminar 092011John Barbato
 
Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?Open University Australia
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social Media
Elizabeth T. "Eli" Edwards
 
Facebook Policy Primer
Facebook Policy PrimerFacebook Policy Primer
Facebook Policy Primer
sophiegalati
 

Similar to Social Insecurity Panel, Lee Tien, EFF (20)

Social Media for Beginners
Social Media for BeginnersSocial Media for Beginners
Social Media for Beginners
 
Social Media and Dating Presentation
Social Media and Dating PresentationSocial Media and Dating Presentation
Social Media and Dating Presentation
 
Presentation on facebook
Presentation on facebookPresentation on facebook
Presentation on facebook
 
Facebook
FacebookFacebook
Facebook
 
The FACEBOOK and TWITTER Phenomenon [9-28-2010]
The FACEBOOK and TWITTER Phenomenon [9-28-2010]The FACEBOOK and TWITTER Phenomenon [9-28-2010]
The FACEBOOK and TWITTER Phenomenon [9-28-2010]
 
Social network privacy
Social network privacySocial network privacy
Social network privacy
 
Facebook Project
Facebook ProjectFacebook Project
Facebook Project
 
Social networking
Social networkingSocial networking
Social networking
 
Group 1 Introduction to Social Networking.pptx
Group 1 Introduction to Social Networking.pptxGroup 1 Introduction to Social Networking.pptx
Group 1 Introduction to Social Networking.pptx
 
facebook and its comptitors
facebook and its comptitorsfacebook and its comptitors
facebook and its comptitors
 
Future world drug addicted
Future world drug addictedFuture world drug addicted
Future world drug addicted
 
Social media
Social mediaSocial media
Social media
 
Presentation social networking service
Presentation social networking servicePresentation social networking service
Presentation social networking service
 
Social networking
Social networkingSocial networking
Social networking
 
Ppt
PptPpt
Ppt
 
How Not to Get Fired Using Social Media at Work - EEO, Diversity and Social M...
How Not to Get Fired Using Social Media at Work - EEO, Diversity and Social M...How Not to Get Fired Using Social Media at Work - EEO, Diversity and Social M...
How Not to Get Fired Using Social Media at Work - EEO, Diversity and Social M...
 
Facebook Strategies [for Realtors] Seminar 092011
Facebook Strategies [for Realtors] Seminar 092011Facebook Strategies [for Realtors] Seminar 092011
Facebook Strategies [for Realtors] Seminar 092011
 
Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social Media
 
Facebook Policy Primer
Facebook Policy PrimerFacebook Policy Primer
Facebook Policy Primer
 

Recently uploaded

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 

Recently uploaded (20)

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 

Social Insecurity Panel, Lee Tien, EFF

  • 1. Social networks and privacy Consumer Reports State of the Net May 4, 2010 Lee Tien EFF senior staff attorney tien@eff.org
  • 2. What DOJ says: UTILITY IN CRIMINAL CASES Evidence from social-networking sites can • Reveal personal communications • Establish motives and personal relationships • Provide location information • Prove and disprove alibis • Establish crime or criminal enterprise Also: instrumentalities or fruits of crime
  • 3. Social graph privacy (it’s not just about you) • From personal data to relationship data • ZDNet comment: “A number of my friends in Iran are active student protesters….[who] use Facebook extensively to organize…terrified that their once private lists of friends are now available to ‘everyone’…. When that ‘everyone’ happens to include the Iranian Revolutionary Guard….”
  • 4. Facebook then and now • 2005 privacy policy: "No personal information that you submit to Thefacebook will be available to any user of the Web Site who does not belong to at least one of the groups specified by you in your privacy settings." • Now: parts of your profile, "including your current city, hometown, education and work, and likes and interests" will be transformed into public "connections." • Can only prevent by deleting them.
  • 5. Public information • name, profile picture, current city, gender, networks, complete list of your friends, and your complete list of connections (formerly the list of pages that you were a "fan" of, but now including profile information like your hometown, education, work, activities, likes and interests, and, in some cases, your likes and recommendations from non-Facebook pages around the web)
  • 6. Expectation exp mismatch? • Public isn’t necessarily bad, but • Originally FB was a way to share your interests and information with a select group of your own choosing. • Now FB has helped itself and its ad and business partners to more and more of users’ information, while limiting users’ control options
  • 7. Who has control? • Degrees of publicity: e.g. status data had been accessible, but FB News Feed (2006) made it stream “pushed” to your friends—users upset. • Current app + friend problem • FB apps get any data you allow them to … and apps run by your friends get any of your data that you let your friends see* IP • Not just change—complexity
  • 8. “Evil interfaces” • “act of creating deliberately confusing jargon and user interfaces which trick your users into sharing more info about themselves than they really want to” • Labyrinthine process for opting out of Instant Personalization (allows select FB partner websites to collect and log all of your "publicly available” data) • Google Buzz (2/10): threatened to move private GMail recipients into a public "frequent contacts" list; complex "opt-out" user-interface was big part of the problem
  • 9. Publicity v. visibility • “While you do have the option to hide your Friend List from being visible on your profile, it will be available to applications you use and websites you connect with using Facebook.” • Users may think they’re protecting information, but they’re merely making it less visible (to users) • Just confusing or deceptive/misleading?
  • 10. Right to leave? • Lock-in problem • Can you take your data with you? • Can you delete when you leave? • Social networks could facilitate data portability and thus competition on privacy
  • 11. Thoughts from danah boyd • Social media—the walls have ears • Privacy not merely about control of data, nor a property of data • About managing our selves in situations • Shared or “collective understanding of a social situation’s boundaries and knowing how to operate within them” • Degrees of publicity and of trust
  • 12. Two sides of ID management • Helping the user manage their multiple personas? • Or helping strangers identify you?
  • 13. Some URLs • http://www.eff.org/deeplinks/2009/12/wh o-knows-who-your-facebook-friends-are • http://www.eff.org/deeplinks/2010/04/fac http://www.eff.org/deeplinks/2010/04/facebooks-evil-interfaces ebook-timeline • http://www.eff.org/deeplinks/2010/04/fac ebooks-evil-interfaces • http://www.eff.org/deeplinks/2010/04/ha ndy-facebook-english-translator • http://www.danah.boyd/papers/