Skip to main content

SocialSpy: Browsing (Supposedly) Hidden Information in Online Social Networks

  • Conference paper
  • First Online:
Risks and Security of Internet and Systems (CRiSIS 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8924))

Included in the following conference series:

Abstract

Online Social Networks are becoming the most important “places” where people share information about their lives. With the increasing concern that users have about privacy, most social networks offer ways to control the privacy of the user. Unfortunately, we believe that current privacy settings are not as effective as users might think.

In this paper, we highlight this problem focusing on one of the most popular social networks, Facebook. In particular, we show how easy it is to retrieve information that a user might have set as (and hence thought as) “private”. As a case study, we focus on retrieving the list of friends for users that did set this information as “hidden” (to non-friends). We propose four different strategies to achieve this goal, and we evaluate them. The results of our thorough experiments show the feasibility of our strategies as well as their effectiveness: our approach is able to retrieve a significant percentage of the names of the “hidden” friends: i.e., some 25 % on average, and more than 70 % for some users.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://www.facebook.com/groups/unipd.

  2. 2.

    http://www.facebook.com/groups/7795542586.

  3. 3.

    http://www.facebook.com/groups/2310323055.

  4. 4.

    http://www.facebook.com/groups/programmersinpadua.

  5. 5.

    http://www.facebook.com/groups/fiupd.

  6. 6.

    http://www.facebook.com/groups/58159395664.

  7. 7.

    http://www.facebook.com/groups/246910381993344.

  8. 8.

    http://www.facebook.com/groups/159253824092728.

  9. 9.

    http://www.facebook.com/groups/WWW.BLACKJACKCAFE.

  10. 10.

    http://www.facebook.com/groups/rhonyc.

  11. 11.

    http://www.skullsecurity.org.

References

  1. Walker, M.: The history of Social Networking (2011). http://www.webmasterview.com/2011/08/social-networking-history

  2. Money, C.: Facebook reaches one billion users (2012). http://money.cnn.com/2012/10/04/technology/facebook-billion-users

  3. CNET: Facebook processes more than 500TB of data daily (2012). http://news.cnet.com/8301-10233-57498531-93/facebook-processes-more-than-500-tb-of-data-daily

  4. Bass, S.: China’s Facebook status: Blocked (2009). http://abcnews.go.com/blogs/headlines/2009/07/chinas-facebook-status-blocked

  5. Dehghan, S.K.: Iran clamps down on Internet use (2012). http://www.guardian.co.uk/world/2012/jan/05/iran-clamps-down-internet-use

  6. Desk, N.: Bangladesh sets precondition for unblocking YouTube (2012). http://www.weeklyblitz.net/2615/bangladesh-sets-precondition-for-unblocking

  7. Groves, C.: Facebook changes through the years: Social Media Revolution (2011). http://blog.mad4flash.com/2011/10/facebook-changes-through-the-years-social-media-revolution

  8. Facebook: Important message from Facebook’s White Hat Program. https://www.facebook.com/notes/facebook-security/important-message-from-facebooks-white-hat-program/10151437074840766

  9. Ratan, D., Cong, T., Keith, R., Nitesh, S.: Estimating age privacy leakage in online social networks. In: IEEE INFOCOM, pp. 2836–2840 (2012)

    Google Scholar 

  10. Luo, W., Liu, J., Liu, J., Fan, C.: An analysis of security in social networks. In: IEEE DASC, pp. 648–651 (2009)

    Google Scholar 

  11. Chaney, P.: Facebook Changes Layout of Mobile App (2013). http://www.practicalecommerce.com/articles/4000-Facebook-Changes-Layout-of-Mobile-App

  12. Consumer Reports Magazine: Facebook & your privacy (2012). http://www.consumerreports.org/cro/magazine/2012/06/facebook-your-privacy

  13. Madejski, M., Johnson, M., Bellovin, S.M.: A study of privacy settings errors in an online social network. In: IEEE PERCOM Workshops, pp. 340–345 (2012)

    Google Scholar 

  14. osint.it: OSINT, one important kind of intelligence. http://www.osint.it/english/open-source-intelligence-osint.asp

  15. Steele, R.D.: Open source intelligence. In: Johnson, L. (ed.) Handbook of Intelligence Studies. Routledge, New York (2007)

    Google Scholar 

  16. Facebook: Facebook developers page - Graph API. https://developers.facebook.com/docs/reference/apis

  17. Constine, J.: Facebook Announces Friendship Pages That Show Friends’ Mutual Content. http://www.insidefacebook.com/2010/10/28/friendship-pages-mutual-content

  18. Facebook: Facebook Social Plugins. https://developers.facebook.com/docs/plugins

  19. Kandias, M., Mitrou, L., Stavrou, V., Gritzalis, D.: Which side are you on? - a new panopticon vs. privacy. In: SECRYPT, pp. 98–110 (2013)

    Google Scholar 

  20. Kosinski, M., Stillwell, D., Graepel, T.: Private traits and attributes are predictable from digital records of human behavior. Proc. Natl. Acad. Sci. 110, 5802–5805 (2013)

    Google Scholar 

  21. Wisegeek: What is a web Crawler? http://www.wisegeek.org/what-is-a-web-crawler.htm

  22. Tang, C., Ross, K., Saxena, N., Chen, R.: What’s in a name: a study of names, gender inference, and gender behavior in facebook. In: Xu, J., Yu, G., Zhou, S., Unland, R. (eds.) DASFAA Workshops 2011. LNCS, vol. 6637, pp. 344–356. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  23. Thomas, K., Grier, C., Nicol, D.M.: unFriendly: multi-party privacy risks in social networks. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 236–252. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  24. Zhang, L., Zhang, W.: An information extraction attack against on-line social networks. In: SocialInformatics, pp. 49–55 (2012)

    Google Scholar 

  25. Costantino, G., Martinelli, F., Sgandurra, D.: Are photos on social networks really private? In: CTS, pp.162–165 (2013)

    Google Scholar 

  26. Luo, W., Xie, Q., Hengartner, U.: FaceCloak: an architecture for user privacy on social networking sites. In: IEEE CSE, pp. 26–33 (2009)

    Google Scholar 

  27. Conti, M., Hasani, A., Crispo, B.: Virtual private social networks and a facebook implementation. ACM Trans. Web 7(3), 14:1–14:31 (2013)

    Article  Google Scholar 

  28. Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: IEEE Symposium on Security and Privacy, pp. 173–187 (2009)

    Google Scholar 

  29. Beato, F., Conti, M., Preneel, B.: Friend in the Middle (FiM): tackling de-anonymization in social networks. In: IEEE PERCOM Workshops, pp. 279–284 (2013)

    Google Scholar 

  30. Beato, F., Conti, M., Preneel, B., Vettore, D.: VirtualFriendship: hiding interactions on online social networks. In: IEEE CNS (2014)

    Google Scholar 

  31. Buchegger, S., Schiöberg, D., Vu, L.H., Datta, A.: PeerSoN: P2P social networking: early experiences and insights. In: ACM Workshop, pp. 46–52 (2009)

    Google Scholar 

  32. Conti, M., Poovendran, R., Secchiero, M.: FakeBook: detecting fake profiles in on-line social networks. In: ASONAM, pp. 1071–1078 (2012)

    Google Scholar 

  33. Nagle, F., Singh, L.: Can friends be trusted? Exploring privacy in online social networks. In: ASONAM, pp. 312–315 (2009)

    Google Scholar 

  34. Dey, R., Jelveh, Z., Ross, K.W.: Facebook users have become much more private: a large-scale study. In: IEEE PERCOM Workshops, pp. 346–352 (2012)

    Google Scholar 

  35. Pineda, N.: Facebook tips: What’s the difference between a Facebook Page and Group? (2010). https://www.facebook.com/blog/blog.php?post=324706977130

  36. TripAdvisor: Tripadvisor. http://www.facebook/TripAdvisor

  37. Get-Spotify: Spotify. http://www.facebook/get-spotify

  38. He, R.C.: Facebook developers page - Introducing new Like and Share buttons. https://developers.facebook.com/blog/post/2013/11/06/introducing-new-like-and-share-buttons

Download references

Acknowledgments

Mauro Conti is supported by a Marie Curie Fellowship funded by the European Commission under the agreement n. PCIG11-GA-2012-321980. This work has been partially supported by the TENACE PRIN Project 20103P34XC funded by the Italian MIUR, and by the Project “Tackling Mobile Malware with Innovative Machine Learning Techniques” funded by the University of Padua.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Giuseppe Cascavilla .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Burattin, A., Cascavilla, G., Conti, M. (2015). SocialSpy: Browsing (Supposedly) Hidden Information in Online Social Networks. In: Lopez, J., Ray, I., Crispo, B. (eds) Risks and Security of Internet and Systems. CRiSIS 2014. Lecture Notes in Computer Science(), vol 8924. Springer, Cham. https://doi.org/10.1007/978-3-319-17127-2_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-17127-2_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-17126-5

  • Online ISBN: 978-3-319-17127-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics