Jump to navigation Jump to search

You are not logged in. Please consider registering an account. By having a StrategyWiki account, you can have your own user page, upload images for your guide, and even customize the look of the site to match your tastes! Also, another benefit of registering an account is that your IP address is not logged whenever you edit, so it adds security and privacy as well. Sign up today! It takes less than one minute and requires no personal information — you're not even required to provide an e-mail address!

If you choose not to register, don't worry! You can still edit StrategyWiki all the same, just with fewer luxuries than registered users have. Your IP address will be recorded in this page's edit history, you must use the Show Preview feature to check over your work before being allowed to save your changes, and your edit may be scrutinized a bit more than that of a registered user's edit. If you don't wish any of the preceding things to happen to you or your edit, please log in or register. Please make sure that you are following all applicable policies and guidelines when making your edit, and we hope that you continue to contribute to StrategyWiki in the future!

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 1: Line 1:
{{stub}}
Why Graph Search Could Be Facebook's Largest Privacy Invasion Ever
{{Genre|wikipedia=Sports game}}
Ari Melber on January 27, 2013 - 5:20 PM ET
 
 
Here is one iron law of the Internet: a social network’s emphasis on monetizing its product is directly proportional to its users’ loss of privacy.
 
At one extreme there are networks like Craigslist and Wikipedia, which pursue relatively few profits and enable nearly absolute anonymity and privacy. At the other end of the spectrum is Facebook, a $68 billion company that is constantly seeking ways to monetize its users and their personal data.
 
Facebook’s latest program, Graph Search, may be the company’s largest privacy infraction ever.
 
Facebook announced Graph Search in mid-January, but it has not officially launched. According to company materials and some independent reports, however, the program cracks open Facebook’s warehouse of personal information to allow searching and data-mining on a large portion of Facebook’s 1 billion users. Users who set their profiles to “public” are about to be exposed to their largest audience ever.
 
Facebook sees this as the future. In a video announcing the program, Mark Zuckerberg, the company’s founder and CEO, touts Graph Search as one of three core pillars of “the Facebook ecosystem.”
 
The financial incentives are clear. Google, which is triple the size of Facebook, makes most of its revenue through search ads. So while the companies host the two most-visited sites in America, Google squeezes more money out of users in less time. Search provides a way for Facebook to sell more to its active users and, of course, to sell its users to others. That’s where Tom Scott comes in.
 
Scott, a 28-year-old British programmer, prankster and former political candidate—he ran on a “Pirate” platform of scrapping rum taxes—has launched his own prebuttal to Graph Search. His new blog, “Actual Facebook Graph Searches,” uses a beta-test version of the feature to show its dark side.
 
With a few clicks, Scott shows how Graph Search provides real names, and other identifying information, for all kinds of problematic combinations, from the embarrassing and hypocritical to ready-made Enemies Lists for repressive regimes. His searches include Catholic mothers in Italy who have stated a preference for Durex condoms and, more ominously, Chinese residents who have family members that like Falun Gong. (He removed all real names, but soon anyone can run these searches.)
 
“Graph Search jokes are a good way of startling people into checking their privacy settings,” says Scott, who was randomly included in a test sample for early access to the program. “I’m not sure I’m making any deeper point about privacy,” he told The Nation. That may have helped make Scott’s lighthearted effort so effective.
 
Within a few days after launching, Scott’s blog went, yes, viral. He says it has drawn over a quarter-million visitors, thanks to a wide range of web attention, and it has stoked more scrutiny of Facebook.
 
Mathew Ingram, a technology writer and founder of the digital mesh conference, argues that Scott’s search results gesture at a value beyond traditional “privacy.” Some pragmatists and Facebook defenders stress that the information in these search results was already surrendered by the users, so we should criticize them, not the technology. (You know, Facebook doesn’t kill privacy, people do.) But Ingram rebuts this reasoning by invoking a paradigm from philosopher Evan Selinger, who argues that these questions actually turn on the assumptions and boundaries of digital obscurity.
 
“Being invisible to search engines increases obscurity,” writes Selinger. “So does using privacy settings and pseudonyms, [and] since few online disclosures are truly confidential or highly publicized, the lion’s share of communication on the social web falls along the expansive continuum of obscurity: a range that runs from completely hidden to totally obvious.”
 
Facebook’s search engine is another step in its long pattern of promising a “safe and trusted environment” for empowered sharing — Zuckerberg’s words — while cracking open that Safe Space for the highest bidder. So the access and context of that space is crucial. After all, many people would consent to sharing several individual pieces of personal information separately, while balking at releasing a dossier of all that same information together. The distinction turns more on the principles of obscurity and access than binary privacy—a concept that has faded as social networks proliferated—and even draws support from the literature on intelligence and espionage.
 
The CIA, for example, has long subscribed to the Mosaic Theory for intelligence gathering. The idea is that while seemingly innocuous pieces of information have no value when viewed independently, when taken together they can form a significant, holistic piece of intelligence. The Navy once explained the idea in a statement on government secrecy that, when you think about it, could apply to your Facebook profile: Sometimes “apparently harmless pieces of information, when assembled together, could reveal a damaging picture.”
 
Facebook’s incentives are, almost always, to keep assembling the information and revealing that picture.
 
Source: http://www.thenation.com/blog/172459/why-graph-search-could-be-facebooks-largest-privacy-invasion-ever#
Please note that all contributions to StrategyWiki are considered to be released under the Creative Commons Attribution-ShareAlike (see StrategyWiki:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here. You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. DO NOT SUBMIT COPYRIGHTED WORK WITHOUT PERMISSION!
Cancel Editing help (opens in new window)

Notice to contributors: The StrategyWiki administration does not condone plagiarism or the use of materials from any other source. Period. By saving this page you are promising us that you wrote this yourself, or copied it from a public domain or similar free resource. With the exception of official media (screenshots, artwork, symbols, etc., but not text) and materials released under the CC-BY-SA you must have the rights to or ownership of all work you submit to StrategyWiki. Do not copy text or images from other websites without permission. They will be deleted.

Copy and paste: – — ° ′ ″ ≈ ≠ ≤ ≥ ± − × ÷ ← → · §   Sign your posts on talk pages: ~~~~   Cite your sources: <ref></ref>


{{}}   {{{}}}   |   []   [[]]   [[Category:]]   #REDIRECT [[]]   &nbsp;   <s></s>   <sup></sup>   <sub></sub>   <code></code>   <pre></pre>   <blockquote></blockquote>   <ref></ref> <ref name="" />   {{Reflist}}   <references />   <includeonly></includeonly>   <noinclude></noinclude>   {{DEFAULTSORT:}}   <nowiki></nowiki>   <!-- -->   <span class="plainlinks"></span>


{{Header Nav|game={{subst:BASEPAGENAME}}}}   {{Footer Nav|game={{subst:BASEPAGENAME}}|prevpage=|nextpage=}}   {{spoilers}}   {{spoiler|}}   {{delete|Unused}}   {{rename|MS Monster .png}}   {{floatingtoc}}   {{stub}}


Symbols: ~ | ¡ ¿ † ‡ ↔ ↑ ↓ • ¶   # ∞   ‘ ’ “ ” ‹› «»   ¤ ₳ ฿ ₵ ¢ ₡ ₢ $ ₫ ₯ € ₠ ₣ ƒ ₴ ₭ ₤ ℳ ₥ ₦ № ₧ ₰ £ ៛ ₨ ₪ ৳ ₮ ₩ ¥   ♠ ♣ ♥ ♦   ♭ ♯ ♮   © ® ™
Latin: A a Á á À à  â Ä ä Ǎ ǎ Ă ă Ā ā à ã Å å Ą ą Æ æ Ǣ ǣ   B b   C c Ć ć Ċ ċ Ĉ ĉ Č č Ç ç   D d Ď ď Đ đ Ḍ ḍ Ð ð   E e É é È è Ė ė Ê ê Ë ë Ě ě Ĕ ĕ Ē ē Ẽ ẽ Ę ę Ẹ ẹ Ɛ ɛ Ǝ ǝ Ə ə   F f   G g Ġ ġ Ĝ ĝ Ğ ğ Ģ ģ   H h Ĥ ĥ Ħ ħ Ḥ ḥ   I i İ ı Í í Ì ì Î î Ï ï Ǐ ǐ Ĭ ĭ Ī ī Ĩ ĩ Į į Ị ị   J j Ĵ ĵ   K k Ķ ķ   L l Ĺ ĺ Ŀ ŀ Ľ ľ Ļ ļ Ł ł Ḷ ḷ Ḹ ḹ   M m Ṃ ṃ   N n Ń ń Ň ň Ñ ñ Ņ ņ Ṇ ṇ Ŋ ŋ   O o Ó ó Ò ò Ô ô Ö ö Ǒ ǒ Ŏ ŏ Ō ō Õ õ Ǫ ǫ Ọ ọ Ő ő Ø ø Œ œ   Ɔ ɔ   P p   Q q   R r Ŕ ŕ Ř ř Ŗ ŗ Ṛ ṛ Ṝ ṝ   S s Ś ś Ŝ ŝ Š š Ş ş Ș ș Ṣ ṣ ß   T t Ť ť Ţ ţ Ț ț Ṭ ṭ Þ þ   U u Ú ú Ù ù Û û Ü ü Ǔ ǔ Ŭ ŭ Ū ū Ũ ũ Ů ů Ų ų Ụ ụ Ű ű Ǘ ǘ Ǜ ǜ Ǚ ǚ Ǖ ǖ   V v   W w Ŵ ŵ   X x   Y y Ý ý Ŷ ŷ Ÿ ÿ Ỹ ỹ Ȳ ȳ   Z z Ź ź Ż ż Ž ž   ß Ð ð Þ þ Ŋ ŋ Ə ə   {{Unicode|}}
Greek: Ά ά Έ έ Ή ή Ί ί Ό ό Ύ ύ Ώ ώ   Α α Β β Γ γ Δ δ   Ε ε Ζ ζ Η η Θ θ   Ι ι Κ κ Λ λ Μ μ   Ν ν Ξ ξ Ο ο Π π   Ρ ρ Σ σ ς Τ τ Υ υ   Φ φ Χ χ Ψ ψ Ω ω   {{Polytonic|}}
Cyrillic: А а Б б В в Г г   Ґ ґ Ѓ ѓ Д д Ђ ђ   Е е Ё ё Є є Ж ж   З з Ѕ ѕ И и І і   Ї ї Й й Ј ј К к   Ќ ќ Л л Љ љ М м   Н н Њ њ О о П п   Р р С с Т т Ћ ћ   У у Ў ў Ф ф Х х   Ц ц Ч ч Џ џ Ш ш   Щ щ Ъ ъ Ы ы Ь ь   Э э Ю ю Я я   ́
IPA: t̪ d̪ ʈ ɖ ɟ ɡ ɢ ʡ ʔ   ɸ β θ ð ʃ ʒ ɕ ʑ ʂ ʐ ç ʝ ɣ χ ʁ ħ ʕ ʜ ʢ ɦ   ɱ ɳ ɲ ŋ ɴ   ʋ ɹ ɻ ɰ   ʙ ⱱ ʀ ɾ ɽ   ɫ ɬ ɮ ɺ ɭ ʎ ʟ   ɥ ʍ ɧ   ʼ   ɓ ɗ ʄ ɠ ʛ   ʘ ǀ ǃ ǂ ǁ   ɨ ʉ ɯ   ɪ ʏ ʊ   ø ɘ ɵ ɤ   ə ɚ   ɛ œ ɜ ɝ ɞ ʌ ɔ   æ   ɐ ɶ ɑ ɒ   ʰ ʱ ʷ ʲ ˠ ˤ ⁿ ˡ   ˈ ˌ ː ˑ ̪   {{IPA|}}

Your changes will be visible immediately.
  • For testing, please use the sandbox instead.
  • On talk pages, please sign your comment by typing four tildes (~~~~).

Please note:
  • If you don't want your writing to be edited mercilessly or redistributed by others, do not submit it.
  • Only public domain resources can be copied without permission — this does not include the vast majority of web pages or images.
  • See our policies and guidelines for more information on editing.

This page is a member of a hidden category: