Difference between revisions of "Social Network"

(added tools)
m
 
Line 2: Line 2:
 
|Scenario Task Format=Scenario
 
|Scenario Task Format=Scenario
 
|Scenario Task Type=Profiling your identity and actions, Surveillance, Unauthorised Access
 
|Scenario Task Type=Profiling your identity and actions, Surveillance, Unauthorised Access
|Scenario Tools and Services=Ghostery, Lighbteam
+
|Scenario Tools and Services=Ghostery, Lightbeam
 
|Scenario Task Description=The very term - social network - implies socialising and not discreet conversation. However the Facebooks and Twitters out there have become such an essential part of information exchange between us that we inevitably begin to look for confidentiality and authenticity within our social circles. There are numerous [https://ssd.eff.org/en/module/protecting-yourself-social-networks vulnerabilities to consider] and important steps to [https://securityinabox.org/en/guide/social-networking mitigate them] are documented and require your action. In brief, you should:
 
|Scenario Task Description=The very term - social network - implies socialising and not discreet conversation. However the Facebooks and Twitters out there have become such an essential part of information exchange between us that we inevitably begin to look for confidentiality and authenticity within our social circles. There are numerous [https://ssd.eff.org/en/module/protecting-yourself-social-networks vulnerabilities to consider] and important steps to [https://securityinabox.org/en/guide/social-networking mitigate them] are documented and require your action. In brief, you should:
 
* switch on [[2 factor authentication]] for your account
 
* switch on [[2 factor authentication]] for your account

Latest revision as of 16:40, 26 November 2015

Scenario- Profiling your identity and actions Surveillance Unauthorised Access
Tools and Services: Ghostery, Lightbeam

The very term - social network - implies socialising and not discreet conversation. However the Facebooks and Twitters out there have become such an essential part of information exchange between us that we inevitably begin to look for confidentiality and authenticity within our social circles. There are numerous vulnerabilities to consider and important steps to mitigate them are documented and require your action. In brief, you should:

When using a commercial social networking platform, consider that you are helping create the social graph of your friends and associates. This is useful information to companies and security services. By remaining constantly signed in on your social network account in the browser, you are also disclosing your browsing habits on the Internet in general, aside from their service. This extends to many types of websites, including your news and media service. The Panopticlick project by the EFF can analyse your browser for traces of identifiable data that websites you visit will collect about you. The Lighbteam browser add-on will "visualise the relationships between the websites you visit and the third party companies that track your online activity through those websites" and the Ghostery browser add-on will help you block these trackers from collecting your personal data.

There are alternative social networking services that are built with privacy in mind, including Diaspora, RetroShare, Gnu Social and a recently launched Minds for Android and iOS.





Translations
  Base Page Language Modification dateThis property is a special property in this wiki.
Fa/شبکهٔ اجتماعی Social Network fa 26 March 2016 12:17:33