Difference between revisions of "Social Network"

m
Line 2: Line 2:
 
|Scenario Task Format=Scenario
 
|Scenario Task Format=Scenario
 
|Scenario Task Type=Profiling your identity and actions, Surveillance, Unauthorised Access
 
|Scenario Task Type=Profiling your identity and actions, Surveillance, Unauthorised Access
|Scenario Task Description=The very term - social network - implies socialising and not discreet conversation. However the Facebooks and Twitters out there have become such an essential part information exchange between us that we inevitably begin look for confidentiality and authenticity within our social circles. There are numerous [https://ssd.eff.org/en/module/protecting-yourself-social-networks vulnerabilities to consider] and important steps to [https://securityinabox.org/en/guide/social-networking mitigating them] are documented and require your action. In brief, you should:
+
|Scenario Task Description=The very term - social network - implies socialising and not discreet conversation. However the Facebooks and Twitters out there have become such an essential part of information exchange between us that we inevitably begin to look for confidentiality and authenticity within our social circles. There are numerous [https://ssd.eff.org/en/module/protecting-yourself-social-networks vulnerabilities to consider] and important steps to [https://securityinabox.org/en/guide/social-networking mitigating them] are documented and require your action. In brief, you should:
 
* switch on [[2 factor authentication]] for your account
 
* switch on [[2 factor authentication]] for your account
 
* consider [[I want to be anonymous connecting to the web|anonymity services]] when using the social network
 
* consider [[I want to be anonymous connecting to the web|anonymity services]] when using the social network

Revision as of 15:01, 25 September 2015

Scenario- Profiling your identity and actions Surveillance Unauthorised Access


The very term - social network - implies socialising and not discreet conversation. However the Facebooks and Twitters out there have become such an essential part of information exchange between us that we inevitably begin to look for confidentiality and authenticity within our social circles. There are numerous vulnerabilities to consider and important steps to mitigating them are documented and require your action. In brief, you should:

You help create the social graph of your friends and associates. This is useful information to companies and security services. By remaining constantly signed in on your social network account in the browser, you are also disclosing your browsing habits on the Internet in general, outside of their service.

There are alternative social networking services that are built with privacy in mind, including Diaspora, RetroShare, Gnu Social and a recently launched Minds for Android and iOS.





Translations
  Base Page Language Modification dateThis property is a special property in this wiki.
Fa/شبکهٔ اجتماعی Social Network fa 26 March 2016 12:17:33