430 likes | 513 Views
A F ew Topics on Privacy. Sankar Roy. Acknowledgement. In preparing the presentation slides and the demo, I received help from Professor Simon Ou Professor Gurdip Singh Professor Eugene Vasserman. What is private? What should be?. Your email and your phone calls
E N D
A Few Topics on Privacy Sankar Roy
Acknowledgement In preparing the presentation slides and the demo, I received help from • Professor Simon Ou • Professor Gurdip Singh • Professor Eugene Vasserman
What is private? What should be? • Your email and your phone calls • Your location throughout the day • Your detailed activity throughout the day • Patterns of your activity • Your web locations throughout the day • Surfing history • Whether you’re on vacation • Is your house empty?
What are privacy leaks? • Public vs. private exposure: • Your email and your phone calls are exposed • Your activity/actions/movement are tracked • Your patterns of activity are exposed • Your web activity/history is exposed • Your online purchases are exposed • Your medical records are exposed
Agenda • Web tracking • Social network privacy • Geo-tracking • Cross-reference with public records (e.g. census) • University policies for your privacy
Web Tracking • Information about people’s web activities have business value • Many companies are trying to • collect your web data • develop a profile of you (what you like or dislike) • Broadly speaking, two types of tracking • monitoring your visits to several websites, online shopping, etc. • monitoring your queries to search engines, keywords used in your emails, etc.
Web Bug : A Tracking Tool • Web bugs • used to be images (also known as tracking pixels) • now can be HTML iFrame, style, script, input link • are loaded on a webpage when you browse it • Typically, web pages are not self-contained • the main content comes from the relevant server (e.g. citi.com) • additional content (including web bugs) come from a 3rd party server (tracker) • The tracker can get information such as • visitor’s IP address, time of visit, type of browser, previously set cookies, etc.
More on Web Bugs • A simplified tracking example • consider a tracking company that has ties with a network of sites • all images (e.g. web bugs) are stored on one host computer while the web pages are stored in different servers. • so, web bugs tool can recognize users traveling around the different servers • advantage: tracking becomes easy because statistics can be collected centrally
DoubleClick (Google) System • Doubleclick is an online ad management system • its clients are advertisers and publishers • tracks users via browser cookies as users travel from website to website (and records which advertisements they view and select). • Runs background analysis: can mine trends over • multiple web sites, types of visitors, periods of time, etc.
The Business Model of DoubleClick • Ad-serving: publishers display ad on their websites • Ad delivery: advertisers control the ad frequency, time • Behavioral targeting: based on the visitor’s past activities, guesses the adverts he/she would like to see
Web-tracking by DoubleClick • What information of the visitor is tracked? • visit time, ad placement id, advert id, user id, user IP address, referral URL, etc. • Can track someone visiting multiple web sites • if these web sites participate in AdSense (Google) • May give a label to a visitor • E.g. “sports lover”, “computer & electronics”, etc. • Note: you may check and edit your label on your Google Ad Preferences manager page
How to Check your label in Google’s ad preferences manager – Part II
Do Not Track Me Online Act of 2011 • Sets the standards for the use of an online opt-out function • allows a consumer to forbid the use of private information • Regarded as an online version of the Do Not Call law • States that a business entity should disclose the status of personal information collection • The opposition group (against this law) also has some valid points
Abine’sTool: “Do Not Track Me” • This tool works as a browser (e.g. Firefox) plugin • Blocks the tracking capabilities • of advertisers, social networks, and data-collection companies • can display the list of websites which are tracking you now • opts you out of being tracked • May still allow same number of adverts, • but can stop targeted advertising that uses your personal information
Web History Tracking • Search engines, such as Google keep on storing the keywords you search • as well as your browsing history • and associates this information against your Google account id • Google uses this information for targeted advertisement in future • If misused, this information can lead to our privacy breach
Google’s Combining Distinct Privacy Policies • Recently, Google combined 60 distinct privacy policies into one single policy in 2012 • if you're signed in, Google treats you as a single user across all of the products • combines information you've provided from one service with information from the others • can use web search information to target an advertisement to you in YouTube, Google Maps, and Gmail
How to reduce risks of Google’s Tracking • You may turn off the Web History • log in to your Google a/c • go to www.google.com/history and remove all • but this may not guarantee much • You may not sign into Gmail while using Google search, maps or YouTube • Or, you may create separate accounts for each Google service
Class Agenda • Web tracking • Social network privacy • Geo-tracking • Cross-reference with public records (e.g. census) • University policies for your privacy
Online Social networks (OSN) • Becoming more and more popular • Facebook, Twitter, Google+, Linkedin, flickr, etc. • Facebook is the largest OSN (Ref. epic.org). • 500 million active users, with 150 million in the United States. • 3 billion photos are uploaded each month. • each day 100 million tags to photos.
Mobile OSN (mOSN) • Currently, all major OSNs can be accessed via smart phones • Locationhas been (mostly) missing between the real world and OSNs • mOSN is providing the location link now • location is notorious for compromising privacy • aquarter of Facebook users are on a mobile device
Privacy Concerns on Social Networks • Too much personal information being displayed by the users may compromise their identity • Location-based-service taking advantage of mobile devices causes more privacy concerns • Storage of personal data: most social networking sites require users to agree for storage. • Employment issues: employers are searching OSNs in order to screen potential candidates • Stalking, and many other privacy problems.
How to Mitigate Privacy Leaks in OSNs • Understand the risks or possible damage • Do not post • unnecessary information or confidential messages or private photos • To protect against identity theft • do not make your birthday public • never expose your exact address, SSN, passport info • Avoid cross-linking • your social network with your professional network • Be watchful of your information leak • check what is leaking via a close family member or a friend
Facebook’s Privacy Concerns • Facebook displays social ads to targeted customers • the business model has some similarity with Google ad’s • Claims retroactive rights to users’ personal information • even after a user has deleted her account. • Discloses “publicly available information” to search engines • i.e., to all Internet users even they are not Facebook users. • And many other concerns: e.g. face recognition, geo-tagging
Facebook and Face Recognition • Facebook Becomes FaceBank? • by Janeth Lopez, 2012 (available on moglen.law.columbia.edu) • After you upload new photos • Facebook scans them with facial recognition software • matches the new photos to other photos you are already tagged in. • When a user manually tags the friends in a photo • the Facebook machine learns more • making facial recognition more accurate in future.
Facebook’s Photo-Tag Suggestions • You can tag a photo to show who’s in the photo • You can post a status update and say who you are with. • After a photo upload, Facebook apparently by magic • finds faces in a photo as a square frame • and suggests the name of your friend • Facebook identifies your friends through your profile • using face recognition technology
Privacy Concerns due to Face Recognition • We could take a photo of a stranger and pull up his/her full name and public information • We may cross-reference the information • with social dating sites to know the stranger's interests. • Stores and restaurants may identify customers and their "likes" in real time • in order to offer them personalized advertising • Law enforcement agents can use this face bank
How to Reduce Photo Tagging Risks • You can untagphotos you are tagged in by friends. • simply go to the photo and click on your name • But no way to prevent friends from tagging you • You can prevent others from seeing the photos via your tagged name. • from the Account menu, chose Privacy Settings, click "Customize settings.” • you have the option of choosing who can see photos via your tagged name. You can set it to "Only me”. • here, you also have the option of preventing specific Facebook friends seeing photos via your tagged name.
Class Agenda • Web tracking • Social network privacy • Geo-tracking or Geo-tagging • Cross-reference with public records (e.g. census) • University policies for your privacy
Geo-tagging • It is the process of adding geographical identification metadata to various media such as a photo (Wikipedia) • Many tools: Camera, smart phones, etc.
Geo-tagging on OSNs • Facebook has a feature called “Places” which allows users to check-in at locations in real time • it is turned on by default • other users can “geo-tag” you • you may discover friends who are in the same place • friends can share interesting places • you may findout a spot from friends’ recommendations
Risks of Geo-tagging • You may give a stalker or a potential thief your exact whereabouts • say you post a photo of your house, and leave a message on Twitter : “need to go to office now”. • Particularly when your cross-post check-ins to interesting spots on multiple OSNs. • Also, geo-tagging has the potential to establish patternsof your movements
How to avoid risks of Geo-tagging • Be familiar with the risks involved. • Learn how to disable your smart phone's geo-tagging feature • Learn how to protect yourself on the geo-tagging websites • control the people who are able to see where you're located. • avoid automatic geo-tagging by default. Facebook Places is active until disabled.
Class Agenda • Web tracking • Social network privacy • Geo-tracking • Cross-reference with public records (e.g. census) • University policies for your privacy
Privacy issues in public records • Various public records and survey results: • Census, medical, genetic, financial data, location data, purchasing histories, etc. • are extremely valuable for social science research, epidemiology, strategic marketing, and so on • But if these databases can be matched up with one another • then we may be able to generate a detailed picture of a specific individual’s private life.
Challenges and Solutions • In 2000, LatanyaSweeney analyzed data from the 1990 census and discovered • 87% of the U.S. population could be uniquely identified by just a Zip code, date of birth, and gender. • Professor Sweeney now says it should be quite easy to determine patient names • from the secondary health data sold by pharmacies and analytics companies • Privacy experts have proposed algorithms to • anonymize public records before release • measure the degree of privacy and guarantee it
Class Agenda • Web tracking • Social network privacy • Geo-tracking • Cross-reference with public records (e.g. census) • University policies for your privacy
K-State Information Technology Usage : Privacy Policy • Authorized access to data entails both privilege and responsibility • not only for the user, but also for the system administrator. • The university will treat information stored on computers as confidential • However, there is no expectation for documents and messages stored on University-owned equipment. • email and data stored on KSU's network of computers may be accessed by the university for a few special purposes
Summary • We discussed common privacy issues. • We presented a few standard countermeasures to mitigate the risks • Remainder: • the next homework is due before the next class (1pm on March 7) • the next class will be held in Room 128