De-Anonymizing Browser History Using Social-Network Data

Interesting research: "De-anonymizing Web Browsing Data with Social Networks": Abstract: Can online trackers and network adversaries de-anonymize web browsing data readily available to them? We show — theoretically, via simulation, and through experiments on real user data — that de-identified web browsing histories can\ be linked to social media profiles using only publicly available data. Our approach is based on… Continue reading De-Anonymizing Browser History Using Social-Network Data

Facebook Using Physical Location to Suggest Friends

This could go badly: "People You May Know are people on Facebook that you might know," a Facebook spokesperson said. "We show you people based on mutual friends, work and education information, networks you’re part of, contacts you’ve imported and many other factors." One of those factors is smartphone location. A Facebook spokesperson said though that shared location alone would… Continue reading Facebook Using Physical Location to Suggest Friends

Security Behavior of Pro-ISIS Groups on Social Media

Interesting: Since the team had tracked these groups daily, researchers could observe the tactics that pro-ISIS groups use to evade authorities. They found that 15 percent of groups changed their names during the study period, and 7 percent flipped their visibility from public to members only. Another 4 percent underwent what the researchers called reincarnation. That means the group disappeared… Continue reading Security Behavior of Pro-ISIS Groups on Social Media

Security Behavior of Pro-ISIS Groups on Social Media

Interesting: Since the team had tracked these groups daily, researchers could observe the tactics that pro-ISIS groups use to evade authorities. They found that 15 percent of groups changed their names during the study period, and 7 percent flipped their visibility from public to members only. Another 4 percent underwent what the researchers called reincarnation. That means the group disappeared… Continue reading Security Behavior of Pro-ISIS Groups on Social Media