Difference between revisions of "Social Network"

Line 6: Line 6:
 
* consider [[I want to be anonymous connecting to the web|anonymity services]] when using the social network
 
* consider [[I want to be anonymous connecting to the web|anonymity services]] when using the social network
 
* use a [https://securityinabox.org/en/guide/passwords good password] to protect your login
 
* use a [https://securityinabox.org/en/guide/passwords good password] to protect your login
* you help [https://immersion.media.mit.edu/ create the social graph] of your friends and associates. This is useful information to companies and security services
 
  
By remaining constantly signed in on your social network account in the browser, you are also disclosing your [https://trackography.org/ browsing habits] on the Internet in general, outside of their service.
+
You help [https://immersion.media.mit.edu/ create the social graph] of your friends and associates. This is useful information to companies and security services. By remaining constantly signed in on your social network account in the browser, you are also disclosing your [https://trackography.org/ browsing habits] on the Internet in general, outside of their service.
  
 
There are alternative social networking services that are built with privacy in mind, including [https://diasporafoundation.org/ Diaspora], [https://www.pidder.de Pidder] and a recently launched [https://www.minds.com Minds] for Android and iOS.  
 
There are alternative social networking services that are built with privacy in mind, including [https://diasporafoundation.org/ Diaspora], [https://www.pidder.de Pidder] and a recently launched [https://www.minds.com Minds] for Android and iOS.  

Revision as of 13:57, 8 September 2015

Scenario- Profiling your identity and actions Surveillance Unauthorised Access


The very term - social network - implies socialising and not discreet conversation. However the Facebooks and Twitters out there have become such an essential part information exchange between us that we inevitably begin look for confidentiality and authenticity within our social circles. There are numerous vulnerabilities to consider and important steps to mitigating them are documented and require your action. In brief, you should:

You help create the social graph of your friends and associates. This is useful information to companies and security services. By remaining constantly signed in on your social network account in the browser, you are also disclosing your browsing habits on the Internet in general, outside of their service.

There are alternative social networking services that are built with privacy in mind, including Diaspora, Pidder and a recently launched Minds for Android and iOS.





Translations
  Base Page Language Modification dateThis property is a special property in this wiki.
Fa/شبکهٔ اجتماعی Social Network fa 26 March 2016 12:17:33