• Home
  • About Us
  • Events
  • Submissions
  • Advertise
  • Contact Us
  • NewsVoir
  • Newswire
  • Nasheman Urdu ePaper

Nasheman

India's largest selling Urdu weekly, now also in English

  • News & Politics
    • India
    • Indian Muslims
    • Muslim World
  • Culture & Society
  • Opinion
  • In Focus
  • Human Rights
  • Photo Essays
  • Multimedia
    • Infographics
    • Podcasts
You are here: Home / Archives for Privacy

Your life is Facebook’s business model – like it or not

January 7, 2015 by Nasheman

Facebook can remember it for you wholesale - whether you like it or not. Anikei/Shutterstock

Facebook can remember it for you wholesale – whether you like it or not. Anikei/Shutterstock

by Paul Levy, The Conversation

Facebook’s recent apology for its Year in Review feature, which had displayed to a grieving father images of his dead daughter, highlights again the tricky relationship between the social media behemoth and its users’ data.

The free service Facebook offers to its 1.2 billion users is free because of the advertising revenue the site generates from the time that users spend on the site. This model drives a need to keep users on the site as much as possible.

“Sticky” qualities that keep users coming back include the essentially addictive nature of social media sites – one that’s been compared to gambling and alcohol addictions. Another is to provide interesting new features that present Facebook’s vast pool of historical data in new ways – the Year in Review is such a feature, which automatically pulls together a collection of photos from significant moments through the year.

In your face(book)

But innovations pose creative challenges, such as how to develop an algorithm that selects content for the Year in Review that you’d want to see and share. In most cases this works perfectly well, offering up memories from your historical Facebook timeline to bring a smile to your face. But in other cases there is the phenomenon described by writer Eric Meyer as “inadvertent algorithmic cruelty”: his Year in Review arrived with a picture of his recently deceased daughter, six-year-old Rebecca, as the headline image.

Meyer’s blog was widely reported and prompted an apology from Facebook.

But what Facebook didn’t apologise for was offering a new feature that thrust content directly into the user’s face. Yes, the algorithm was clumsy, but the notion of forcing content, un-asked for, upon the user is almost taken for granted. In business terms, this is sometimes called “supplier push”. It becomes part of a business philosophy that sees users as crowds, and innovation as a process of “mass customisation”. The danger of appealing to the crowd en masse, is that a significant minority will always fall between the gaps.

So, a minority get to see their dead relatives, dead dogs, their exes, and even their past bad behaviour they’d rather forget in their Year in Review. To be clear here, Facebook doesn’t publish the Year in Review directly, but offers a sample for further customisation and publication if the user chooses. Regardless it’s still thrust in your face, whether or not you wish it; Eric Meyer got an image of his dead daughter whether he wanted to or not.

So my (beloved!) ex-boyfriend’s apartment caught fire this year, which was very sad, but Facebook made it worth it. pic.twitter.com/AvU8ifazXa

— Julieanne Smolinski (@BoobsRadley) December 29, 2014

Remembering for you, like it or not

And this is where the relationship dynamics that sit at the heart of Facebook’s “free” social media model come in. By preventing us from deleting our own content, Facebook becomes the equivalent of an ever-growing attic of memories – many of which we, if we could choose, would choose to forget. This content is harvested for information with which to further refine advertising offers.

The existence of this problem has been recognised elsewhere: the Mailing Preference Service provides an opt out register for direct mail advertising for baby-related products to prevent unwanted reminders, for example in the event of a baby’s death. Online services have yet to incorporate these measures. And generally speaking, aren’t there often things from our past that wewouldn’t respond well to when re-presented to us?

As social media grows in sophistication, algorithms attempt to target you with content that will keep you interested and so more connected and engaged. Software can currently recognise smiling faces, but not that the smile on one face is of someone no longer with us. Why? Because the user didn’t tag “dead” on the photo.

Tagging is another example of “in your face” social media, in that it also prompts you to look at a image to approve someone else’s tag on your image, or that you have been tagged in someone else’s image. Of course, it might not be an image you wanted ever to see again. There will be more of this in the future: if you can’t delete photos of your past without leaving Facebook altogether, do you lose the right to privacy at the moment you feel you need it? If your Year in Review shows you engaged mostly in dangerous sports, will that affect your next insurance quote?

If you thought you were going to start your new year with a clean sheet, then, as a social media user, think again. Facebook’s new and revised terms and conditions will see it observe your behaviour, location and the sites you visit in even more detail. In order, no doubt, to create further features to keep you engaged. Inevitably, these will also throw up further issues of badly targeted content and intrusion into our personal lives – a double-edged sword that can bring pleasure, or pain.

Paul Levy is a Senior Researcher in Innovation Management at University of Brighton.

The Conversation

Filed Under: Opinion Tagged With: Data Mining, Facebook, Online Privacy, Privacy, Social Media

Russia and China prepare to fight US internet domination

November 17, 2014 by Nasheman

There’s no physical fences in cyberspace, that doesn’t mean there’s no border controls. paolo_cuttitta, CC BY

There’s no physical fences in cyberspace, that doesn’t mean there’s no border controls. paolo_cuttitta, CC BY

by Eerke Boiten, The Conversation

While there is only one world power on the internet, that situation will not last forever. The internet’s underpinning technologies were mostly created in the US, the initial networks were based there – and today the US hosts the majority of the most powerful internet companies.

Although minor battles have been fought on internet sovereignty for years, the de facto power that stems from the US for a long time seemed acceptable. But with the revelations – not even all following from Snowden – about international mass surveillance by the US and its allies, it’s inevitable the gloves have had to come off.

In a replay of an imaginary Cold War nightmare scenario, Russia and China appear to have identified a common enemy. The nations are expected to sign a collaborative cyber-security treaty to “oppose the use of IT and the internet to interfere in the internal affairs of independent states”.

There has also been discussion in mainland Europe, particularly Germany, about “Schengen-routing”, which would keep internet traffic away from the parts of the network where NSA and GCHQ could easily snoop on them. Edward Snowden has claimed that establishing a “European cloud” may not be effective, however.

Generally there are two main reasons for states to want to take control of the internet: they want to defend against outsiders – and to defend against insiders.

The enemy outside

Effectively the US still claims sovereignty over large parts of the internet. This is not just de facto sovereignty based on the residence of large internet companies and most cloud servers within the US. It is not even because the Snowden files have shown us that the NSA hoovers up most internet traffic. In a recent court case it was established that US law enforcement agencies can demand data from US companies even when it is stored abroad (in this case, Microsoft servers based in Ireland).

The discrimination in NSA procedures and US law that treats US and non-US citizens differently (worse) is also irksome.

Nor are US allies, chiefly Britain, innocent in this context. Unexplained spying by GCHQ abroad is well-documented, with the claims of eavesdropping at climate change conferencesthe most recent. The explicit extension of the Regulation of Investigatory Powers Act 2000 introduced through this summer’s “emergency” DRIP Act also plays a role. The act’s clause 4allows the interception of communications even relating to activity outside the UK by persons and companies based outside the UK.

For countries such as Russia and China, the threat from outside is more acute given that both countries have problems with territorial conflicts. There have been reports of cyber attacks in both directions between Russia and Ukraine. And China has been suspected of carrying out man-in-the-middle attacks in order to spy on citizens using encrypted connections.

These countries have a greater need to take control. Russia, for example, has recently been reported to be investing US$500m to establish a cyber warfare division, for offensive and defensive operations.

The enemy within

When governments tighten their hold over the internet within their own country it’s normally a slippery slope towards the restriction of civil rights. The so-called “great firewall of China” is to restrict freedom of expression and access to information for the Chinese population – to control those within, not those without. Google played along with this by censoring search results within China until 2010, when they moved their operations to the slightly freer jurisdiction of Hong Kong.

Amnesty International has taken up cases of people persecuted for political use of the internet in countries such as Bahrain, Azerbaijan and Egypt. North Korea has even gone as far as closing down all access to Twitter and Facebook.

On the other hand, Russia is close enough to Europe to not want to be painted as a politically repressive country. Instead Russia controls its internet through more subtle means. For example, its compulsory identity verification for social networks is justified as a defence against identity theft. While many nations operate a blacklist to restrict access to child pornography sites and those distributing copyrighted material, the Russian government added some independent news sites to the list, allegedly to prevent unauthorised protests – and pages on social network VK were highlighted by public prosecutors as advocating terrorism.

However, with its recent explicit attacks on freedom of speech, it seems Russian authorities no longer feel especially restrained in exercising censorship. Putin’s claims to support online freedoms like any other democratic country sound a bit shrill taken alongside his description of the internet as “a CIA project”.

Setting an example

Not that the UK emerges as a shining example in this respect. Dubious laws have been used to arrest a peer joining a demonstration – and years of spying on eminent historians by MI5 has just come to light. Meanwhile the police feel free to spy on journalists, prison staff listen in on MPs’ phone callsand intelligence agencies breach client-lawyer privilege. So it’s hard to swallow claims made by the home secretary, Theresa May, and GCHQ that efforts to improve mobile coverage and use encryption shouldn’t be allowed because of “security threats”.

Of course with elections around the corner, the major parties are making promises about restoring civil rights and establishing safeguards and oversight. But it seems there’s been little progress towards David Cameron’s promises in 2009 to erode the “control state” his government inherited.

The Conversation

Filed Under: Business & Technology Tagged With: China, Internet, Privacy, Russia, Security, United States, USA

Facebook introduces dedicated Tor address

November 1, 2014 by Nasheman

facebook-tor

Facebook’s reputation for privacy is equivalent to United States’ reputation for peace. So when the world’s least anonymous website joins the Web’s most anonymous network, it’s definitely something to rejoice.

The social network just created a dedicated Tor link that ensures people who visit the site from the anonymous web browser won’t be mistaken for botnets.

Until now, Facebook had made it difficult for users to access its site over Tor, sometimes even blocking their connections. Because Tor users appear to log in from unusual IP addresses all over the world, they often trigger the site’s safeguards against botnets, collections of hijacked computers typically used by hackers to attack sites.

“Tor challenges some assumptions of Facebook’s security mechanisms—for example its design means that from the perspective of our systems a person who appears to be connecting from Australia at one moment may the next appear to be in Sweden or Canada,” writes Facebook security engineer Alec Muffett. “Considerations like these have not always been reflected in Facebook’s security infrastructure, which has sometimes led to unnecessary hurdles for people who connect to Facebook using Tor.”

The Facebook onion address (accessible only in Tor-enabled browsers) connects users to Facebook’s Core WWW Infrastructure, so as to provide end-to-end communication, directly from the browser into a Facebook datacentre, allowing for private and secure browsing sessions. An SSL certificate issued by Facebook to visitors confirms to them that they’re indeed accessing the right destination.

The onion address for Facebook  is currently live, and Tor users can log on with it securely starting now.

Filed Under: Business & Technology Tagged With: Browser, Facebook, Privacy, Security, Social Network, Tor

Follow Us

  • Facebook
  • Twitter
  • YouTube

KNOW US

  • About Us
  • Corporate News
  • FAQs
  • NewsVoir
  • Newswire
  • Realtor arrested for NRI businessman’s murder in Andhra Pradesh

GET INVOLVED

  • Corporate News
  • Letters to Editor
  • NewsVoir
  • Newswire
  • Realtor arrested for NRI businessman’s murder in Andhra Pradesh
  • Submissions

PROMOTE

  • Advertise
  • Corporate News
  • Events
  • NewsVoir
  • Newswire
  • Realtor arrested for NRI businessman’s murder in Andhra Pradesh

Archives

  • April 2025 (50)
  • March 2025 (35)
  • February 2025 (34)
  • January 2025 (43)
  • December 2024 (83)
  • November 2024 (82)
  • October 2024 (156)
  • September 2024 (202)
  • August 2024 (165)
  • July 2024 (169)
  • June 2024 (161)
  • May 2024 (107)
  • April 2024 (104)
  • March 2024 (222)
  • February 2024 (229)
  • January 2024 (102)
  • December 2023 (142)
  • November 2023 (69)
  • October 2023 (74)
  • September 2023 (93)
  • August 2023 (118)
  • July 2023 (139)
  • June 2023 (52)
  • May 2023 (38)
  • April 2023 (48)
  • March 2023 (166)
  • February 2023 (207)
  • January 2023 (183)
  • December 2022 (165)
  • November 2022 (229)
  • October 2022 (224)
  • September 2022 (177)
  • August 2022 (155)
  • July 2022 (123)
  • June 2022 (190)
  • May 2022 (204)
  • April 2022 (310)
  • March 2022 (273)
  • February 2022 (311)
  • January 2022 (329)
  • December 2021 (296)
  • November 2021 (277)
  • October 2021 (237)
  • September 2021 (234)
  • August 2021 (221)
  • July 2021 (237)
  • June 2021 (364)
  • May 2021 (282)
  • April 2021 (278)
  • March 2021 (293)
  • February 2021 (192)
  • January 2021 (222)
  • December 2020 (170)
  • November 2020 (172)
  • October 2020 (187)
  • September 2020 (194)
  • August 2020 (61)
  • July 2020 (58)
  • June 2020 (56)
  • May 2020 (36)
  • March 2020 (48)
  • February 2020 (109)
  • January 2020 (162)
  • December 2019 (174)
  • November 2019 (120)
  • October 2019 (104)
  • September 2019 (88)
  • August 2019 (159)
  • July 2019 (122)
  • June 2019 (66)
  • May 2019 (276)
  • April 2019 (393)
  • March 2019 (477)
  • February 2019 (448)
  • January 2019 (693)
  • December 2018 (736)
  • November 2018 (572)
  • October 2018 (611)
  • September 2018 (692)
  • August 2018 (667)
  • July 2018 (469)
  • June 2018 (440)
  • May 2018 (616)
  • April 2018 (774)
  • March 2018 (338)
  • February 2018 (159)
  • January 2018 (189)
  • December 2017 (142)
  • November 2017 (122)
  • October 2017 (146)
  • September 2017 (178)
  • August 2017 (201)
  • July 2017 (222)
  • June 2017 (155)
  • May 2017 (205)
  • April 2017 (156)
  • March 2017 (178)
  • February 2017 (195)
  • January 2017 (149)
  • December 2016 (143)
  • November 2016 (169)
  • October 2016 (167)
  • September 2016 (137)
  • August 2016 (115)
  • July 2016 (117)
  • June 2016 (125)
  • May 2016 (171)
  • April 2016 (152)
  • March 2016 (201)
  • February 2016 (202)
  • January 2016 (217)
  • December 2015 (210)
  • November 2015 (177)
  • October 2015 (284)
  • September 2015 (243)
  • August 2015 (250)
  • July 2015 (188)
  • June 2015 (216)
  • May 2015 (281)
  • April 2015 (306)
  • March 2015 (297)
  • February 2015 (280)
  • January 2015 (245)
  • December 2014 (287)
  • November 2014 (254)
  • October 2014 (185)
  • September 2014 (98)
  • August 2014 (8)

Copyright © 2025 · News Pro Theme on Genesis Framework · WordPress · Log in