SlideShare una empresa de Scribd logo
1 de 10
Descargar para leer sin conexión
Basics



     Social Network Privacy
     Guide – II
     This series of articles about security trips how to make social
     networking is more secure on the top social networks.




     What you will learn…                                             What you should know…
     •	 The most useful ideas and advice how to use a lot of social   •	 Basic knowledge how to find and setup security setting on so-
        networks mixing fun and business                                 cial networks
     •	 What does the most known social network offer to keep your    •	 Clear understanding of your goal when you start to use a new
        data in privacy                                                  social network




     S
             ocial networking services are kind of on-                search engines like Google, Yahoo or Bing. This
             line service that focuses on building so-                is so-called individual-centred service whereas
             cial relations among people shared their                 online community services are group-centred
     information about themselves. This informa-                      based on user abilities to share ideas, activi-
     tion filled their profiles makes users possible                  ties, events, and interests within their individual
     to search and extract necessary information. It                  networks.
     means the search will analyse only the actual
     contents you want (images, video, text, calendar                 Chapter I. Security beyond the whole
     events). Such representation is often based on                   Picture
     each user profile as set of social links, interests,             Part II. Twitter
     public data, and other linked services. Current                  Twitter has come in 2006 as a people group tell-
     trend has fast been growing to control mecha-                    ing what they were doing right now as soon as
     nism unification for a long time. Each of these                  happens like “woke up” or “overslept”. Now it
     social services meets with users desires to less                 is social place to leave messages limited up to
     inputting about them. That's why you are allowed                 140 characters long as kind of SMS messages.
     to be sign up/in by Facebook button or Twitter                   These messages create your so-called timeline
     button following which you can start to organi-                  that can be followed and these messages can
     zation your own networks groups by involving                     be marked as favorite, retwetted, and replied.
     others friends via email, social address book or                 Direct messages limited up to 140 characters
     switching your profile into public zone indexed by               too.




     Figure 1. Normal Tweets



28                                                                                                                            08/2012
Social Network Privacy Guide – II




Figure 2. Mentions




Figure 3. Replies

Some basic terms and definitions                          owners are following the sender or both of
Timeline                                                  them. Also, replies may be found in the recipi-
A Twitter timeline collects stream of Tweets listed       ent's Mentions and Interactions tabs and never
in real-time order with newest updates are at the         on anyone’s profile page, unless they wrote or
top into you will land by view of your homepage.          sent the message. If your Tweets are private,
                                                          it means no one is allowed to see any of your
Types of Tweets                                           tweets unless you have given them the right
                                                          to follow you. Thus, when you send a @reply
• 	 Normal Tweets look like as shown on Figure 1          or mention, only profiles approved by you will
    and are represent a message not more than             be able to see them else you have to unprotect
    140 characters by itself that appear on send-         your tweets to make them and your account
    er’s page and his timeline and on other profile’s     public.
    timeline who are allowed to be seen updates in    • 	 Direct messages is usually non-public mes-
    order to privacy settings. Not that, it has never     sage sent directly to someone who follows
    been appeared on someone profile until it will        you or sends directly to you from some-
    be retweeted.                                         one you follow. Other cases are not allowed.
• 	 Mentions look like as shown on Figure 2 and           It stores in direct messages folders of send-
    are represent the same message including              er and recipient as well as on recipient mobile
    another’s username preceded by “@” placed             device or email if (s-)he turn on this feature(-s)
    I message after one word at least, e.g. “This         (Figure 4).
    @yurychemerkin is mention for…” Mentions
    usually appear on sender’s profile among The common privacy rules
    public tweets or someone timeline if this per- Twitter considers the posting another person’s pri-
    son is following a sender. In addition, men- vate and confidential information as a violation of
    tions may be found in the recipient's Mentions the Twitter Rules. Such information may be:
    and Interactions tabs, which
    is accessible only by them. As
    a normal tweets, it has nev-
    er been appeared on someone
    profile until this person wrote
    the message.
• 	 Replies: look like as shown on
    Figure 3 and are represent a
    message similar to the men-
    tions except position of “@user-
    name”. Now it must be placed
    at the beginning of message,
    e.g. “@yurychemerkin your blog
    is cool!” Replies appear on pro-
    file page or on timeline, whose Figure 4. Direct messages



www.hakin9.org/en                                                                                              29
Basics


     • 	 credit card information                                • 	 User posts unrelated updates to the tag
     • 	 social security or other national identity num-            started with #
         bers                                                   • 	 User sends too many duplicated referrals
     • 	 addresses or locations that are considered and             started with @, especially when it looks like
         treated as private                                         a spam
     • 	 non-public, personal phone numbers                     • 	 User adds too many unrelated users to lists
     • 	 non-public, personal email addresses                       with spam goal
                                                                • 	 User describe false or misleading interests
     Anyway, you may make report about it through                   area
     the link (https://support.twitter.com/forms/abusive-       • 	 “Aggressive following” means a misbal-
     user).                                                         ance between user’s followers and followed
       Twitter solution in protection his users from spam           list. For example, user cannot follow 10,000
     and abuse is by permanent suspension if anyone                 people if only 100 people follow him. When
     engaging in the activities specified below:                    users reach 2000 followed they have to wait
                                                                    until they get more followers in order a mis-
     • 	 Mass account creation is forbidden for Twitter’s           balance
         users and username squatting and account’s
         inactivity for more than 6 are forbidden and will
         be removed
     • 	 Invitation spam technically disabled users to
         send an invitation repeats.
     • 	 Some of declared spam techniques:
         • 	 User has followed and unfollowed a large
             amount of users in a short amount of time
             or repeatedly has done it
         • 	 User has less followers than he’s following
             or a large number blocked him
         • 	 User’s updates consist mainly of links, espe-
             cially misleading and malware links
         • 	 User posts too many duplicate data (note,
             you have to choose a couple of social net-
             works linked with Twitter if these networks     Figure 6. Account tabs
             are mirrors)




     Figure 5. Dropdown menu                                 Figure 7. Tab “Account” Settings



30                                                                                                        08/2012
Social Network Privacy Guide – II



        • 	 Some more relate to the technical limits:      messages when clicking on them, especially be
        • 	 Updates/Tweets: 1,000 per day that splits      careful when clicking on links that were shortened
            into semi-hourly intervals and retweets        using an external link shortening service. Even if
            are counted as updates.                        the link came from a friend, it is possible that their
        • 	 Changes to Account Email: four per hour.       account was compromised and the URL was ac-
        • 	 Following (daily): The technical follow lim-   tually sent out by a spammer. To be sure, you are
            it is 1,000 per day.                           on Twitter.com before logging in take a look at the
        • 	 Following (account-based): Once an ac-         URL in the address bar of your browser. Twitter
            count is following 2,000 other users, ad-      domains will always have the http://twitter.com/
            ditional follow attempts are limited by ac-    or https://twitter.com/ as the base domain. Phish-
            count-specific ratios.                         ing websites will often look just like Twitter's log-
• 	 Pornography must not everywhere (profile,              in page, but will actually be a website that is not
    background, etc.)                                      Twitter. For example, http://twitter.example.com or
• 	 Each new created account to replace previous-          https://m.twitter.com.up.com.
    ly suspended by Twitter will suspend too.
                                                           Twitter Setting
Fake Twitter Emails                                        Tabs regarded to the Privacy in “Account Settings”.
As Twitter does not send emails with attachments           To go to the Account Settings click on profile pic-
and never requests user’s Twitter password by              ture on and choose “Settings” as it is shown on
email, other emails and messages similar to wrote          Figure 5.
above tend to be a fake. If you received such email,         In account section (Figure 6) there are several
you should to resend (forward) it to the [spoof@           settings e.g. Email address, GPS location, coun-
twitter.com] and then delete this email from inbox         try and etc. Most of them do not belong to privacy
without downloading any attachments from email.            except some you will see on obfuscated Figure 7
Phishing is another kind to steal sensitive informa-       below:
tion when intruders send bulk messages in an at-
tempt to revealing such information, like a login          •	   Username
and password. It happens often through the web-            •	   Email and searching via email
site appears legitimate. In case of spoofed emails,        •	   Tweet location
such email may contain string header “Twitter/             •	   Tweet Privacy
Twitter Support/” while email address differs from         •	   Connection type
real “@twitter.com”.                                       •	   Password reset way

Fake Web Sites                                             Email address is part of user privacy in way
User should always check whether or not link that          someone may import address book from Gmail,
goes to a fake login page and he is at twitter.com         Y!Mail, Windows Live or else to the Twitter and
before logging in. You should check links in direct        find anyone who uses the same email-address




Figure 8. Find friends




Figure 9. Delete “Find friends” data



www.hakin9.org/en                                                                                                   31
Basics


     stored in his address book. Therefore, check                    you may be interested to hide your username
     field “Let other find me by my email address”                   based on your real name. HTTPS has become a
     should be unchecked. To find someone on Twit-                   joke is a classic in most popular social networks
     ter via email address you need click on “#Dis-                  (Facebook, Twitter, LinkedIn, G+). This improves
     cover” and “Find Friends” then where five email                 your account security and protects you if you are
     services are available (Google, Yahoo, Yandex,                  using Twitter over an unsecured Internet connec-
     Hotmail, and AOL). By the way, you need to en-                  tion, like a public Wi-Fi network, where someone
     ter your email log in credentials when prompted                 may be able to eavesdrop on your site activity. If
     and agree to share your information with Twit-                  your settings suddenly don’t use this you need to
     ter. However, you can remove imported contact                   assign a checked state by several reasons and
     info from Twitter at any time: there is a block of              one of them is that not all fake web-site is al-
     text under the email provider list where there                  ready user https like a [hxxp://www.krishnasings.
     is a link to remove your contacts (Figure 8 and                 com/] was found in June if it looks like Twitter
     Figure 9).                                                      even. If you want to change password you only
       Username may not be a point of privacy itself                 need to type your current password on the web
     but when it plays opposite searching via email,                 and retype new password twice. Way to reset
     Table 1. Main Features
      ON                        turns ALL your authorized Twitter updates and notifications on.
      OFF                       turns ALL phone notifications off.
      ON [username]             turns on notifications for a specific person on your phone (without “@”). Example: ON Yury-
                                Chemerkin
      OFF [username]            turns off notifications for a specific person on your phone (without “@”). Example: OFF Yury-
                                Chemerkin
      FOLLOW [username]         allows you to start following a specific user, as well as receive SMS notifications. Example:
                                FOLLOW YuryChemerkin, or f YuryChemerkin
      UNFOLLOW [username] allows you to stop following a specific user. Example: UNFOLLOW YuryChemerkin
      LEAVE [username]          stops receiving SMS notifications for a specific user without having to unfollow them. Exam-
                                ple: LEAVE YuryChemerkin, or l YuryChemerkin
      STOP, QUIT, END, CAN-     will deactivate your account if you are an SMS-only user.
      CEL or UNSUBSCRIBE
     Table 2. Additional Features
      @[username] + message               shows your Tweet as a reply directed at another person. Example: @YuryChemerkin
                                          newpost
      D [username] + message              sends that person a Direct Message that goes to their device, and saves in their web
                                          archive.
      RT [username]                       sends that user's latest Tweet to your followers (also known as a Retweet).
      SET LOCATION [place name]           updates the location field in your profile. Example: set location Moscow
      SET BIO                             edits your Bio information on your Twitter profile. Example: set bio I'm a writer in
                                          Hakin9!
      SET LANGUAGE [language name] selects the language you'd like to receive notifications in. Example: set language Russian
      SET NAME [name here]                sets the name field on your Twitter profile. Example: set name Yury Chemerkin
      SET URL [url here]                  sets the URL field on your profile. Example: set url http://re.vu/yury.chemerkin
      WHOIS [username]                    retrieves the profile information for any public user on Twitter. Example: whois
                                          yurychemerkin or w yurychemerkin
      GET [username]                      retrieves the latest Twitter update posted by that person. Example: get yury-
                                          chemerkin or g yurychemerkin
      FAV [username]                      marks that user's last Tweet as one of your favorites Examples: fav yurychemerkin,
                                          or favorite yurychemerkin
      STATS [username]                    this command returns the given user's number of followers, how many people
                                          they're following, and their bio information
      SUGGEST                             this command returns a listing of Twitter users' accounts we think you might enjoy
                                          following



32                                                                                                                         08/2012
Social Network Privacy Guide – II



your password means Twitter developers is on               need to know it usually takes around 30 minutes
right track. Now you may set password recover-             and Twitter grants to delete all location data, but
ing via phone that maybe more secure than via              no one grants to delete location data accumulates
email. However, in order to I wrote in article “The        in Third-Party apps on something RSS news as a
backroom message that stolen your deal” (March             Twitter is still allowed to gain data for public pro-
2011) [http://goo.gl/YUzjk], your SMS messages             files via RSS.
may include C&C based on SMS for Facebook                     Twitter Privacy turn on/off your account’s pub-
or Twitter. This SMS-management is vulnerable              licity and means you need approve everyone to
and leads to auto-post anything without asking             see you tweet or never manage it. Public Tweets
or notification to the social network additionally         as a default setting are visible to anyone whether
charges you and extracts all one-time passwords            someone has a Twitter account. If you had pub-
you need type to approve on public computers.              lic twitter profile at once, then these tweets will
Below I discuss commands and features of SMS               always be public and searchable despite chang-
exploitation.                                              ing settings. Future tweets that will make after
   Twitter SMS Commands It can help you to per-            you turn on privacy will be protected. This option
form certain actions, like following a user or mark-       may often be interested to control who sees your
ing a friend's update as a favorite (see in Main           messages. Moreover, links you made via “t.co”
Features and Additional Features) (Table 1 and             are public, because any links are able to view the
Table 2).                                                  content through the world except filtering case.
   By the way, Facebook has SMS command as                 In addition, when privacy is turn on keep in mind
well but it is shortly than Twitter. You can text to       that:
the Facebook to update your status, message your           • 	 Each follower request have to be approval as I
friends, receive messages, and wall posts from                 wrote above
your friends as it happens. All SMS commands               • 	 Your Tweets will only be visible to users you've
send to number “3223” (Table 3).                               approved
   Adding location to the tweets neither for not vul-      • 	 Only approved users are able to retweet your
nerable for users without context. For example,                tweets
user posts about his travel with location tracking         • 	 Protected tweets will not indexed by Twitter
during several months and then he makes a post                 search, or Google search or any search engine
when he is in airport. As you see his last tweet               and didn’t appear in anywhere
but not includes a location data, because it is            • 	 All @replies users send to the user A will not
enough to rob as a fact nobody is at home. The                 be seen by him if he wasn’t approved before
main idea is its non-systemic actions, tweet and           • 	 You cannot share permanent links to tweets
location then intruders need more time and re-                 with anyone other than your approved follow-
sources to analyze dependence; if not, you will be             ers. Permanent link is a static URL (except if it
easy caught! If you want delete location info, you             was deleted) to the tweet you’ll find in browser
                                                               ‘s address bar when you click on the tweet and
  Did you know?                                                then on his details is often include
  Your service provider may split SMS messages great-          • 	 The exact time the tweet was posted
  er than 160 characters into multiple messages. In this
  case, the second message will post as a normal Tweet
  because it does not begin with d+username, as the
  first message did.

Table 3. Facebook Commands
 Update status               is at john's party
 Add friend by name          add john smith
 (or phone number)           add 1234567890
 Subscribe to status         subscribe john smith
 Photos help                 photos
 Unsubscribe                 unsubscribe
 Help                        help
 Stop sms                    stop
 Start sms                   on                            Figure 10. Permanent links



www.hakin9.org/en                                                                                                  33
Basics


        • 	 The service/application used to post the          If you want to add a mobile number perform with
            Tweet                                             actions below:
        • 	 Users who retweeted the tweet
                                                              • 	 Follow [https://twitter.com/devices] or
     Tab “Mobile” in account settings leads you to the            • 	 Log in to twitter.com
     phone number management and is represented                   • 	 Click on the person icon and select Settings
     by text notifications and sleep settings except fea-             from the drop-down menu.
     ture let you find others by your phone number. It is         • 	 Click on the Mobile tab.
     the same graph extraction as email searching, so         • 	 Choose your country and enter your mobile
     you need to decide whether this feature should be            number.
     checked. Check all of text notifications field is a      • 	 Click Activate phone to start verifying your
     good idea to keep yourself abreast of the news in            phone.
     case your account is hacked. Similar idea is going       • 	 You need to send the word 'GO' via text mes-
     about email notifications settings is allowed you to         sage to Twitter 8080
     control:                                                 • 	 Text the verification code from your phone to
                                                                  that short code.
     • 	 Notification if direct message, reply or mention
         received                                             Tab “Profile” mostly is up to you concerning Your
     • 	 Notification if retweets, following or mark as fa-   Name, Location, Web site, and biography ex-
         vorites happened                                     cept linking with Facebook. You should under-
     • 	 Notification regarding weekly stories                stand if you want separate your tweets and Face-
                                                              book posts then it’s good idea to create Face-
                                                              book Page else (if you’re OK with mixing social up-
                                                              dates) is good idea to link your Twitter to the Face-
                                                              book profile only and keep Facebook pages for an-
                                                              other content. Your name is a personal or business
                                                              identifier or real name that displayed in your profile
                                                              page and used to identify you to friends, especially
                                                              if your username is mysterious like @XXX.
                                                                 MakeUseOf wrote an interesting article “Why You
                                                              Shouldn’t Integrate Facebook, Twitter, & LinkedIn”
                                                              [http://www.makeuseof.com/tag/integrate-face-
                                                              book-twitter-linkedin/] where compares positive
                                                              and negative aspects of linked social life stream




     Figure 11. Mobile settings




                                                              Figure 13. Facebook linking




     Figure 12. Email settings                                Figure 14. Applications access settings



34                                                                                                           08/2012
Social Network Privacy Guide – II



on Facebook and Twitter. Quoting, on Twitter you           General Activity on Twitter
may want to gain followers by posting a tweet in-          Delete account
tentionally designed to get a reaction. While ran-         The last feature of tab “account” gives rights to
dom people will love the snark, the less tech-savvy        deactivate your profile by agreeing with it and en-
family members may take it seriously, and busi-            tering password. Your data is going to keep for
ness contacts may balk at the controversial nature         one month only before it will be deleted. To reac-
of it. However, on Facebook you may have some              tive your account just login in. When a month is
personal news that needs sharing with your near-           over your account is vanished in a few minutes,
est and dearest. While friends and family will be          your data in a few days, and indexed data may
keen to hear the news, Twitter people will not care        keep as long as it can according to the search
and LinkedIn people may resent what they will un-          engine rules, except you write him asking to
doubtedly consider spam and/or utter gibberish.            wipe your data. (Example for Google is at [http://
   Tab “Apps” in account settings allow you to man-        www.google.com/support/webmasters/bin/an-
age with third-party access. Here you will see app         swer.py?answer=64033&ctx=sibling])
name, date and time when you granted access
this application and access type (read, write, di-         Delete Tweet
rect messages). You can only revoke access or not          How to delete account via long-term deactivation
to grant access while Facebook gives feature to            wrote above. You may want to block someone on
set access types you want. Best practices say to           Twitter also. In this case, you need go to the profile
check from time to time this section and revoke ac-        page of the person you want to block and click on
cess for application you stopped using.
   On another side you’re allowed control who can
see your Tweets (for Twitter application) on Face-
book Application settings by clicking Edit for the
Twitter app You still able to change settings to “On-
ly for Me” state when no one tweet will be pub-
lished on Facebook. Note, some applications may
ask Twitter access and never post anything like a
Chime.In because you setup your default Chime.
In way of posting. However, Viadeo make your ac-
counts cross-posted as soon as you link them.
                                                           Figure 16. Delete Account




Figure 15. Applications access settings



www.hakin9.org/en                                                                                                   35
Basics




     Figure 17. Delete Account




     Figure 18. Delete Tweet

     his person icon whereupon select Block. Forward          Yury Chemerkin
     blocked accounts cannot add you in their lists or        Graduated at Russian State University for the Humani-
     follow you until you unblock them, see your profile      ties (http://rggu.com/) in 2010. At present postgraduate
     picture in their timeline. In addition, you can unfol-   at RSUH.
     low or report as spam this person by select “Report      Information Security Researcher since 2009 and cur-
     @username for spam” in that menu.                        rently works as mobile and social infoSecurity research-
       To delete tweet.                                       er in Moscow.
       Locate the Tweet you want to delete and hover          Experienced in Reverse Engineering, Software Program-
     mouse over the message and click Delete then.            ming, Cyber & Mobile Security Researching, Documen-
       However, you cannot delete several tweets at a         tation, and Security Writing as regular contributing.
     time, only manually one by one.                          Now researching Cloud Security and Social Privacy.
                                                              Contacts:
     Grabbing twitter’s data from your account                I have a lot of social contacts, that’s way to choose the
     To this day this feature is available only for Face-     most suitable way for you on Re.Vu http://re.vu/yury.
     book users, while Twitter gives users access only        chemerkin
     to the last few thousand posts made to the site.         Regular       blog:     http://security-through-obscurity.
     Twitter has been slower to roll out a similar service,   blogspot.com
     although a number of third-party services and de-        Regular Email: yury.chemerkin@gmail.com
     velopers have cobbled together ways to let people        Skype: yury.chemerkin
     sift through portions of Twitter’s vast collection of    Other my contacts (blogs, IM, social networks) you will
     messages. On July 24th article in NY Times was           find among http links and social icons before TimeLine
     published to announce that now Twitter is working        section on Re.Vu
     on a tool to let their users to have exported all of
     their tweets that means tweet will be downloaded
     into a file.




36                                                                                                              08/2012

Más contenido relacionado

La actualidad más candente

Social media apps presentations
Social media apps presentationsSocial media apps presentations
Social media apps presentationsrvhstl
 
Getting started on Twitter
Getting started on TwitterGetting started on Twitter
Getting started on TwitterSue Beckingham
 
A basic introduction to getting the most out of Twitter
A basic introduction to getting the most out of TwitterA basic introduction to getting the most out of Twitter
A basic introduction to getting the most out of TwitterUniversity of York Library
 
North Ayrshire Social Media Training Session 1 Twitter
North Ayrshire Social Media Training Session 1 TwitterNorth Ayrshire Social Media Training Session 1 Twitter
North Ayrshire Social Media Training Session 1 TwitterHamill Associates Ltd
 
Twitter for Researchers & Academics: Tips for IMPROVERS
Twitter for Researchers & Academics: Tips for IMPROVERSTwitter for Researchers & Academics: Tips for IMPROVERS
Twitter for Researchers & Academics: Tips for IMPROVERSUniversity of York Library
 
Twitter: All You Need To Know--How To Use Twitter For Your Business
Twitter: All You Need To Know--How To Use Twitter For Your BusinessTwitter: All You Need To Know--How To Use Twitter For Your Business
Twitter: All You Need To Know--How To Use Twitter For Your BusinessVanksen
 
Twitter for busy tweeps
Twitter for busy tweepsTwitter for busy tweeps
Twitter for busy tweepsLauren Smith
 
Twitter 101 - an introduction to Twitter
Twitter 101  - an introduction to TwitterTwitter 101  - an introduction to Twitter
Twitter 101 - an introduction to TwitterKeith Bradnam
 
How to measure Twitter
How to measure TwitterHow to measure Twitter
How to measure TwitterTriptease
 
Blogs and Blogging: Becoming a Networked Researcher
Blogs and Blogging: Becoming a Networked ResearcherBlogs and Blogging: Becoming a Networked Researcher
Blogs and Blogging: Becoming a Networked ResearcherUniversity of York Library
 
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology  by: Geraldine Salve Pepe and Lailanie PepeEpowerment Technology  by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepesalvepepe
 
Twitter for researchers 2015
Twitter for researchers 2015Twitter for researchers 2015
Twitter for researchers 2015Helen Dixon
 
Twitter And Its Value To Librarians
Twitter And Its Value To LibrariansTwitter And Its Value To Librarians
Twitter And Its Value To LibrariansPhil Bradley
 
A Practical Guide to Twittering for Business
A Practical Guide to Twittering for BusinessA Practical Guide to Twittering for Business
A Practical Guide to Twittering for BusinessGerris
 
4 presentation identifying good quality information sources using twitter
4 presentation   identifying good quality information sources using twitter4 presentation   identifying good quality information sources using twitter
4 presentation identifying good quality information sources using twittermoledzki
 
Navca Twitter
Navca TwitterNavca Twitter
Navca TwitterLasa UK
 

La actualidad más candente (20)

An introduction to Twitter
An introduction to TwitterAn introduction to Twitter
An introduction to Twitter
 
Social media apps presentations
Social media apps presentationsSocial media apps presentations
Social media apps presentations
 
Getting started on Twitter
Getting started on TwitterGetting started on Twitter
Getting started on Twitter
 
A basic introduction to getting the most out of Twitter
A basic introduction to getting the most out of TwitterA basic introduction to getting the most out of Twitter
A basic introduction to getting the most out of Twitter
 
North Ayrshire Social Media Training Session 1 Twitter
North Ayrshire Social Media Training Session 1 TwitterNorth Ayrshire Social Media Training Session 1 Twitter
North Ayrshire Social Media Training Session 1 Twitter
 
Twitter for Researchers & Academics: Tips for IMPROVERS
Twitter for Researchers & Academics: Tips for IMPROVERSTwitter for Researchers & Academics: Tips for IMPROVERS
Twitter for Researchers & Academics: Tips for IMPROVERS
 
Twitter: All You Need To Know--How To Use Twitter For Your Business
Twitter: All You Need To Know--How To Use Twitter For Your BusinessTwitter: All You Need To Know--How To Use Twitter For Your Business
Twitter: All You Need To Know--How To Use Twitter For Your Business
 
Twitter for busy tweeps
Twitter for busy tweepsTwitter for busy tweeps
Twitter for busy tweeps
 
Twitter 101 - an introduction to Twitter
Twitter 101  - an introduction to TwitterTwitter 101  - an introduction to Twitter
Twitter 101 - an introduction to Twitter
 
Twitter for Researchers
Twitter for ResearchersTwitter for Researchers
Twitter for Researchers
 
How to measure Twitter
How to measure TwitterHow to measure Twitter
How to measure Twitter
 
Introduction to Twitter
Introduction to TwitterIntroduction to Twitter
Introduction to Twitter
 
Blogs and Blogging: Becoming a Networked Researcher
Blogs and Blogging: Becoming a Networked ResearcherBlogs and Blogging: Becoming a Networked Researcher
Blogs and Blogging: Becoming a Networked Researcher
 
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology  by: Geraldine Salve Pepe and Lailanie PepeEpowerment Technology  by: Geraldine Salve Pepe and Lailanie Pepe
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepe
 
Twitter for researchers 2015
Twitter for researchers 2015Twitter for researchers 2015
Twitter for researchers 2015
 
Twitter And Its Value To Librarians
Twitter And Its Value To LibrariansTwitter And Its Value To Librarians
Twitter And Its Value To Librarians
 
A Practical Guide to Twittering for Business
A Practical Guide to Twittering for BusinessA Practical Guide to Twittering for Business
A Practical Guide to Twittering for Business
 
4 presentation identifying good quality information sources using twitter
4 presentation   identifying good quality information sources using twitter4 presentation   identifying good quality information sources using twitter
4 presentation identifying good quality information sources using twitter
 
Navca Twitter
Navca TwitterNavca Twitter
Navca Twitter
 
Twitter
TwitterTwitter
Twitter
 

Similar a Social Network Privacy Guide - Protect Your Data Online

Twitter Technical Training - St. Edward's University Instructional Technology
Twitter Technical Training - St. Edward's University Instructional TechnologyTwitter Technical Training - St. Edward's University Instructional Technology
Twitter Technical Training - St. Edward's University Instructional TechnologyMegan Ura
 
Beginner's guide to twitter
Beginner's guide to twitterBeginner's guide to twitter
Beginner's guide to twitterEmina Demiri
 
Social Media for NGOs - new and improved version!
Social Media for NGOs - new and improved version!Social Media for NGOs - new and improved version!
Social Media for NGOs - new and improved version!AfricanCommonsProject
 
Getting Started with Twitter
Getting Started with TwitterGetting Started with Twitter
Getting Started with TwitterSevans Strategy
 
How to Get Started on Twitter
How to Get Started on TwitterHow to Get Started on Twitter
How to Get Started on TwitterHolly Nielsen
 
2 mastering social media workshop 3 twitter
2 mastering social media workshop 3 twitter2 mastering social media workshop 3 twitter
2 mastering social media workshop 3 twitterHamill Associates Ltd
 
Understanding Social Media Class II Fall 2013
Understanding Social Media Class II Fall 2013Understanding Social Media Class II Fall 2013
Understanding Social Media Class II Fall 2013Yadira Galindo
 
Jackie z twitter for government 101
Jackie z twitter for government 101Jackie z twitter for government 101
Jackie z twitter for government 101James Garrow
 
Kempenfelt 2014 social media
Kempenfelt 2014 social mediaKempenfelt 2014 social media
Kempenfelt 2014 social mediaaimeesparzynski
 
Green Hectares Rural Tech Factsheet – Social Networking
Green Hectares Rural Tech Factsheet – Social NetworkingGreen Hectares Rural Tech Factsheet – Social Networking
Green Hectares Rural Tech Factsheet – Social NetworkingGreen Hectares
 
Social Media & International Justice
Social Media & International JusticeSocial Media & International Justice
Social Media & International JusticeRobin Johnson
 
Ge live tweeting guidelines
Ge live tweeting guidelinesGe live tweeting guidelines
Ge live tweeting guidelinesJesse Radonski
 
Social Media 101 for Nonprofits
Social Media 101 for NonprofitsSocial Media 101 for Nonprofits
Social Media 101 for NonprofitsDavid Crowley
 
Social Media to extend email marketing.pdf
Social Media to extend email marketing.pdfSocial Media to extend email marketing.pdf
Social Media to extend email marketing.pdfAnjanette Delgado
 

Similar a Social Network Privacy Guide - Protect Your Data Online (20)

Twitter Technical Training - St. Edward's University Instructional Technology
Twitter Technical Training - St. Edward's University Instructional TechnologyTwitter Technical Training - St. Edward's University Instructional Technology
Twitter Technical Training - St. Edward's University Instructional Technology
 
Beginner's guide to Twitter
Beginner's guide to TwitterBeginner's guide to Twitter
Beginner's guide to Twitter
 
Beginner's guide to twitter
Beginner's guide to twitterBeginner's guide to twitter
Beginner's guide to twitter
 
Social Media for NGOs - new and improved version!
Social Media for NGOs - new and improved version!Social Media for NGOs - new and improved version!
Social Media for NGOs - new and improved version!
 
Getting Started with Twitter
Getting Started with TwitterGetting Started with Twitter
Getting Started with Twitter
 
Twitter 101
Twitter 101Twitter 101
Twitter 101
 
How to Get Started on Twitter
How to Get Started on TwitterHow to Get Started on Twitter
How to Get Started on Twitter
 
2 mastering social media workshop 3 twitter
2 mastering social media workshop 3 twitter2 mastering social media workshop 3 twitter
2 mastering social media workshop 3 twitter
 
Clear point mar 2013
Clear point mar 2013Clear point mar 2013
Clear point mar 2013
 
Understanding Social Media Class II Fall 2013
Understanding Social Media Class II Fall 2013Understanding Social Media Class II Fall 2013
Understanding Social Media Class II Fall 2013
 
Jackie z twitter for government 101
Jackie z twitter for government 101Jackie z twitter for government 101
Jackie z twitter for government 101
 
Twitter Tips
Twitter TipsTwitter Tips
Twitter Tips
 
Kempenfelt 2014 social media
Kempenfelt 2014 social mediaKempenfelt 2014 social media
Kempenfelt 2014 social media
 
Twitter 101
Twitter 101Twitter 101
Twitter 101
 
Twitter Tutorial
Twitter TutorialTwitter Tutorial
Twitter Tutorial
 
Green Hectares Rural Tech Factsheet – Social Networking
Green Hectares Rural Tech Factsheet – Social NetworkingGreen Hectares Rural Tech Factsheet – Social Networking
Green Hectares Rural Tech Factsheet – Social Networking
 
Social Media & International Justice
Social Media & International JusticeSocial Media & International Justice
Social Media & International Justice
 
Ge live tweeting guidelines
Ge live tweeting guidelinesGe live tweeting guidelines
Ge live tweeting guidelines
 
Social Media 101 for Nonprofits
Social Media 101 for NonprofitsSocial Media 101 for Nonprofits
Social Media 101 for Nonprofits
 
Social Media to extend email marketing.pdf
Social Media to extend email marketing.pdfSocial Media to extend email marketing.pdf
Social Media to extend email marketing.pdf
 

Más de Yury Chemerkin

Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...
Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...
Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...Yury Chemerkin
 
Red october. detailed malware description
Red october. detailed malware descriptionRed october. detailed malware description
Red october. detailed malware descriptionYury Chemerkin
 
Comment crew indicators of compromise
Comment crew indicators of compromiseComment crew indicators of compromise
Comment crew indicators of compromiseYury Chemerkin
 
Appendix g iocs readme
Appendix g iocs readmeAppendix g iocs readme
Appendix g iocs readmeYury Chemerkin
 
Appendix f (digital) ssl certificates
Appendix f (digital)   ssl certificatesAppendix f (digital)   ssl certificates
Appendix f (digital) ssl certificatesYury Chemerkin
 
Appendix e (digital) md5s
Appendix e (digital)   md5sAppendix e (digital)   md5s
Appendix e (digital) md5sYury Chemerkin
 
Appendix d (digital) fqd ns
Appendix d (digital)   fqd nsAppendix d (digital)   fqd ns
Appendix d (digital) fqd nsYury Chemerkin
 
6071f3f4 40e6-4c7b-8868-3b0b21a9f601
6071f3f4 40e6-4c7b-8868-3b0b21a9f6016071f3f4 40e6-4c7b-8868-3b0b21a9f601
6071f3f4 40e6-4c7b-8868-3b0b21a9f601Yury Chemerkin
 
Zane lackey. security at scale. web application security in a continuous depl...
Zane lackey. security at scale. web application security in a continuous depl...Zane lackey. security at scale. web application security in a continuous depl...
Zane lackey. security at scale. web application security in a continuous depl...Yury Chemerkin
 
Windows 8. important considerations for computer forensics and electronic dis...
Windows 8. important considerations for computer forensics and electronic dis...Windows 8. important considerations for computer forensics and electronic dis...
Windows 8. important considerations for computer forensics and electronic dis...Yury Chemerkin
 
The stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capabilityThe stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capabilityYury Chemerkin
 
Stuxnet. analysis, myths, realities
Stuxnet. analysis, myths, realitiesStuxnet. analysis, myths, realities
Stuxnet. analysis, myths, realitiesYury Chemerkin
 
Stuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learnedStuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learnedYury Chemerkin
 
Sophos ransom ware fake antivirus
Sophos ransom ware fake antivirusSophos ransom ware fake antivirus
Sophos ransom ware fake antivirusYury Chemerkin
 
Six months later – a report card on google’s demotion of pirate sites
Six months later – a report card on google’s demotion of pirate sitesSix months later – a report card on google’s demotion of pirate sites
Six months later – a report card on google’s demotion of pirate sitesYury Chemerkin
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guideYury Chemerkin
 
Security configuration recommendations for apple i os 5 devices
Security configuration recommendations for apple i os 5 devicesSecurity configuration recommendations for apple i os 5 devices
Security configuration recommendations for apple i os 5 devicesYury Chemerkin
 
Render man. hacker + airplanes = no good can come of this
Render man. hacker + airplanes = no good can come of thisRender man. hacker + airplanes = no good can come of this
Render man. hacker + airplanes = no good can come of thisYury Chemerkin
 

Más de Yury Chemerkin (20)

Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...
Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...
Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...
 
Red october. detailed malware description
Red october. detailed malware descriptionRed october. detailed malware description
Red october. detailed malware description
 
Comment crew indicators of compromise
Comment crew indicators of compromiseComment crew indicators of compromise
Comment crew indicators of compromise
 
Appendix g iocs readme
Appendix g iocs readmeAppendix g iocs readme
Appendix g iocs readme
 
Appendix f (digital) ssl certificates
Appendix f (digital)   ssl certificatesAppendix f (digital)   ssl certificates
Appendix f (digital) ssl certificates
 
Appendix e (digital) md5s
Appendix e (digital)   md5sAppendix e (digital)   md5s
Appendix e (digital) md5s
 
Appendix d (digital) fqd ns
Appendix d (digital)   fqd nsAppendix d (digital)   fqd ns
Appendix d (digital) fqd ns
 
6071f3f4 40e6-4c7b-8868-3b0b21a9f601
6071f3f4 40e6-4c7b-8868-3b0b21a9f6016071f3f4 40e6-4c7b-8868-3b0b21a9f601
6071f3f4 40e6-4c7b-8868-3b0b21a9f601
 
Jp3 13
Jp3 13Jp3 13
Jp3 13
 
Zane lackey. security at scale. web application security in a continuous depl...
Zane lackey. security at scale. web application security in a continuous depl...Zane lackey. security at scale. web application security in a continuous depl...
Zane lackey. security at scale. web application security in a continuous depl...
 
Windows 8. important considerations for computer forensics and electronic dis...
Windows 8. important considerations for computer forensics and electronic dis...Windows 8. important considerations for computer forensics and electronic dis...
Windows 8. important considerations for computer forensics and electronic dis...
 
The stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capabilityThe stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capability
 
Stuxnet. analysis, myths, realities
Stuxnet. analysis, myths, realitiesStuxnet. analysis, myths, realities
Stuxnet. analysis, myths, realities
 
Stuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learnedStuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learned
 
Sophos ransom ware fake antivirus
Sophos ransom ware fake antivirusSophos ransom ware fake antivirus
Sophos ransom ware fake antivirus
 
Six months later – a report card on google’s demotion of pirate sites
Six months later – a report card on google’s demotion of pirate sitesSix months later – a report card on google’s demotion of pirate sites
Six months later – a report card on google’s demotion of pirate sites
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guide
 
Security configuration recommendations for apple i os 5 devices
Security configuration recommendations for apple i os 5 devicesSecurity configuration recommendations for apple i os 5 devices
Security configuration recommendations for apple i os 5 devices
 
Render man. hacker + airplanes = no good can come of this
Render man. hacker + airplanes = no good can come of thisRender man. hacker + airplanes = no good can come of this
Render man. hacker + airplanes = no good can come of this
 
Msft oracle brief
Msft oracle briefMsft oracle brief
Msft oracle brief
 

Último

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Último (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Social Network Privacy Guide - Protect Your Data Online

  • 1.
  • 2. Basics Social Network Privacy Guide – II This series of articles about security trips how to make social networking is more secure on the top social networks. What you will learn… What you should know… • The most useful ideas and advice how to use a lot of social • Basic knowledge how to find and setup security setting on so- networks mixing fun and business cial networks • What does the most known social network offer to keep your • Clear understanding of your goal when you start to use a new data in privacy social network S ocial networking services are kind of on- search engines like Google, Yahoo or Bing. This line service that focuses on building so- is so-called individual-centred service whereas cial relations among people shared their online community services are group-centred information about themselves. This informa- based on user abilities to share ideas, activi- tion filled their profiles makes users possible ties, events, and interests within their individual to search and extract necessary information. It networks. means the search will analyse only the actual contents you want (images, video, text, calendar Chapter I. Security beyond the whole events). Such representation is often based on Picture each user profile as set of social links, interests, Part II. Twitter public data, and other linked services. Current Twitter has come in 2006 as a people group tell- trend has fast been growing to control mecha- ing what they were doing right now as soon as nism unification for a long time. Each of these happens like “woke up” or “overslept”. Now it social services meets with users desires to less is social place to leave messages limited up to inputting about them. That's why you are allowed 140 characters long as kind of SMS messages. to be sign up/in by Facebook button or Twitter These messages create your so-called timeline button following which you can start to organi- that can be followed and these messages can zation your own networks groups by involving be marked as favorite, retwetted, and replied. others friends via email, social address book or Direct messages limited up to 140 characters switching your profile into public zone indexed by too. Figure 1. Normal Tweets 28 08/2012
  • 3. Social Network Privacy Guide – II Figure 2. Mentions Figure 3. Replies Some basic terms and definitions owners are following the sender or both of Timeline them. Also, replies may be found in the recipi- A Twitter timeline collects stream of Tweets listed ent's Mentions and Interactions tabs and never in real-time order with newest updates are at the on anyone’s profile page, unless they wrote or top into you will land by view of your homepage. sent the message. If your Tweets are private, it means no one is allowed to see any of your Types of Tweets tweets unless you have given them the right to follow you. Thus, when you send a @reply • Normal Tweets look like as shown on Figure 1 or mention, only profiles approved by you will and are represent a message not more than be able to see them else you have to unprotect 140 characters by itself that appear on send- your tweets to make them and your account er’s page and his timeline and on other profile’s public. timeline who are allowed to be seen updates in • Direct messages is usually non-public mes- order to privacy settings. Not that, it has never sage sent directly to someone who follows been appeared on someone profile until it will you or sends directly to you from some- be retweeted. one you follow. Other cases are not allowed. • Mentions look like as shown on Figure 2 and It stores in direct messages folders of send- are represent the same message including er and recipient as well as on recipient mobile another’s username preceded by “@” placed device or email if (s-)he turn on this feature(-s) I message after one word at least, e.g. “This (Figure 4). @yurychemerkin is mention for…” Mentions usually appear on sender’s profile among The common privacy rules public tweets or someone timeline if this per- Twitter considers the posting another person’s pri- son is following a sender. In addition, men- vate and confidential information as a violation of tions may be found in the recipient's Mentions the Twitter Rules. Such information may be: and Interactions tabs, which is accessible only by them. As a normal tweets, it has nev- er been appeared on someone profile until this person wrote the message. • Replies: look like as shown on Figure 3 and are represent a message similar to the men- tions except position of “@user- name”. Now it must be placed at the beginning of message, e.g. “@yurychemerkin your blog is cool!” Replies appear on pro- file page or on timeline, whose Figure 4. Direct messages www.hakin9.org/en 29
  • 4. Basics • credit card information • User posts unrelated updates to the tag • social security or other national identity num- started with # bers • User sends too many duplicated referrals • addresses or locations that are considered and started with @, especially when it looks like treated as private a spam • non-public, personal phone numbers • User adds too many unrelated users to lists • non-public, personal email addresses with spam goal • User describe false or misleading interests Anyway, you may make report about it through area the link (https://support.twitter.com/forms/abusive- • “Aggressive following” means a misbal- user). ance between user’s followers and followed Twitter solution in protection his users from spam list. For example, user cannot follow 10,000 and abuse is by permanent suspension if anyone people if only 100 people follow him. When engaging in the activities specified below: users reach 2000 followed they have to wait until they get more followers in order a mis- • Mass account creation is forbidden for Twitter’s balance users and username squatting and account’s inactivity for more than 6 are forbidden and will be removed • Invitation spam technically disabled users to send an invitation repeats. • Some of declared spam techniques: • User has followed and unfollowed a large amount of users in a short amount of time or repeatedly has done it • User has less followers than he’s following or a large number blocked him • User’s updates consist mainly of links, espe- cially misleading and malware links • User posts too many duplicate data (note, you have to choose a couple of social net- works linked with Twitter if these networks Figure 6. Account tabs are mirrors) Figure 5. Dropdown menu Figure 7. Tab “Account” Settings 30 08/2012
  • 5. Social Network Privacy Guide – II • Some more relate to the technical limits: messages when clicking on them, especially be • Updates/Tweets: 1,000 per day that splits careful when clicking on links that were shortened into semi-hourly intervals and retweets using an external link shortening service. Even if are counted as updates. the link came from a friend, it is possible that their • Changes to Account Email: four per hour. account was compromised and the URL was ac- • Following (daily): The technical follow lim- tually sent out by a spammer. To be sure, you are it is 1,000 per day. on Twitter.com before logging in take a look at the • Following (account-based): Once an ac- URL in the address bar of your browser. Twitter count is following 2,000 other users, ad- domains will always have the http://twitter.com/ ditional follow attempts are limited by ac- or https://twitter.com/ as the base domain. Phish- count-specific ratios. ing websites will often look just like Twitter's log- • Pornography must not everywhere (profile, in page, but will actually be a website that is not background, etc.) Twitter. For example, http://twitter.example.com or • Each new created account to replace previous- https://m.twitter.com.up.com. ly suspended by Twitter will suspend too. Twitter Setting Fake Twitter Emails Tabs regarded to the Privacy in “Account Settings”. As Twitter does not send emails with attachments To go to the Account Settings click on profile pic- and never requests user’s Twitter password by ture on and choose “Settings” as it is shown on email, other emails and messages similar to wrote Figure 5. above tend to be a fake. If you received such email, In account section (Figure 6) there are several you should to resend (forward) it to the [spoof@ settings e.g. Email address, GPS location, coun- twitter.com] and then delete this email from inbox try and etc. Most of them do not belong to privacy without downloading any attachments from email. except some you will see on obfuscated Figure 7 Phishing is another kind to steal sensitive informa- below: tion when intruders send bulk messages in an at- tempt to revealing such information, like a login • Username and password. It happens often through the web- • Email and searching via email site appears legitimate. In case of spoofed emails, • Tweet location such email may contain string header “Twitter/ • Tweet Privacy Twitter Support/” while email address differs from • Connection type real “@twitter.com”. • Password reset way Fake Web Sites Email address is part of user privacy in way User should always check whether or not link that someone may import address book from Gmail, goes to a fake login page and he is at twitter.com Y!Mail, Windows Live or else to the Twitter and before logging in. You should check links in direct find anyone who uses the same email-address Figure 8. Find friends Figure 9. Delete “Find friends” data www.hakin9.org/en 31
  • 6. Basics stored in his address book. Therefore, check you may be interested to hide your username field “Let other find me by my email address” based on your real name. HTTPS has become a should be unchecked. To find someone on Twit- joke is a classic in most popular social networks ter via email address you need click on “#Dis- (Facebook, Twitter, LinkedIn, G+). This improves cover” and “Find Friends” then where five email your account security and protects you if you are services are available (Google, Yahoo, Yandex, using Twitter over an unsecured Internet connec- Hotmail, and AOL). By the way, you need to en- tion, like a public Wi-Fi network, where someone ter your email log in credentials when prompted may be able to eavesdrop on your site activity. If and agree to share your information with Twit- your settings suddenly don’t use this you need to ter. However, you can remove imported contact assign a checked state by several reasons and info from Twitter at any time: there is a block of one of them is that not all fake web-site is al- text under the email provider list where there ready user https like a [hxxp://www.krishnasings. is a link to remove your contacts (Figure 8 and com/] was found in June if it looks like Twitter Figure 9). even. If you want to change password you only Username may not be a point of privacy itself need to type your current password on the web but when it plays opposite searching via email, and retype new password twice. Way to reset Table 1. Main Features ON turns ALL your authorized Twitter updates and notifications on. OFF turns ALL phone notifications off. ON [username] turns on notifications for a specific person on your phone (without “@”). Example: ON Yury- Chemerkin OFF [username] turns off notifications for a specific person on your phone (without “@”). Example: OFF Yury- Chemerkin FOLLOW [username] allows you to start following a specific user, as well as receive SMS notifications. Example: FOLLOW YuryChemerkin, or f YuryChemerkin UNFOLLOW [username] allows you to stop following a specific user. Example: UNFOLLOW YuryChemerkin LEAVE [username] stops receiving SMS notifications for a specific user without having to unfollow them. Exam- ple: LEAVE YuryChemerkin, or l YuryChemerkin STOP, QUIT, END, CAN- will deactivate your account if you are an SMS-only user. CEL or UNSUBSCRIBE Table 2. Additional Features @[username] + message shows your Tweet as a reply directed at another person. Example: @YuryChemerkin newpost D [username] + message sends that person a Direct Message that goes to their device, and saves in their web archive. RT [username] sends that user's latest Tweet to your followers (also known as a Retweet). SET LOCATION [place name] updates the location field in your profile. Example: set location Moscow SET BIO edits your Bio information on your Twitter profile. Example: set bio I'm a writer in Hakin9! SET LANGUAGE [language name] selects the language you'd like to receive notifications in. Example: set language Russian SET NAME [name here] sets the name field on your Twitter profile. Example: set name Yury Chemerkin SET URL [url here] sets the URL field on your profile. Example: set url http://re.vu/yury.chemerkin WHOIS [username] retrieves the profile information for any public user on Twitter. Example: whois yurychemerkin or w yurychemerkin GET [username] retrieves the latest Twitter update posted by that person. Example: get yury- chemerkin or g yurychemerkin FAV [username] marks that user's last Tweet as one of your favorites Examples: fav yurychemerkin, or favorite yurychemerkin STATS [username] this command returns the given user's number of followers, how many people they're following, and their bio information SUGGEST this command returns a listing of Twitter users' accounts we think you might enjoy following 32 08/2012
  • 7. Social Network Privacy Guide – II your password means Twitter developers is on need to know it usually takes around 30 minutes right track. Now you may set password recover- and Twitter grants to delete all location data, but ing via phone that maybe more secure than via no one grants to delete location data accumulates email. However, in order to I wrote in article “The in Third-Party apps on something RSS news as a backroom message that stolen your deal” (March Twitter is still allowed to gain data for public pro- 2011) [http://goo.gl/YUzjk], your SMS messages files via RSS. may include C&C based on SMS for Facebook Twitter Privacy turn on/off your account’s pub- or Twitter. This SMS-management is vulnerable licity and means you need approve everyone to and leads to auto-post anything without asking see you tweet or never manage it. Public Tweets or notification to the social network additionally as a default setting are visible to anyone whether charges you and extracts all one-time passwords someone has a Twitter account. If you had pub- you need type to approve on public computers. lic twitter profile at once, then these tweets will Below I discuss commands and features of SMS always be public and searchable despite chang- exploitation. ing settings. Future tweets that will make after Twitter SMS Commands It can help you to per- you turn on privacy will be protected. This option form certain actions, like following a user or mark- may often be interested to control who sees your ing a friend's update as a favorite (see in Main messages. Moreover, links you made via “t.co” Features and Additional Features) (Table 1 and are public, because any links are able to view the Table 2). content through the world except filtering case. By the way, Facebook has SMS command as In addition, when privacy is turn on keep in mind well but it is shortly than Twitter. You can text to that: the Facebook to update your status, message your • Each follower request have to be approval as I friends, receive messages, and wall posts from wrote above your friends as it happens. All SMS commands • Your Tweets will only be visible to users you've send to number “3223” (Table 3). approved Adding location to the tweets neither for not vul- • Only approved users are able to retweet your nerable for users without context. For example, tweets user posts about his travel with location tracking • Protected tweets will not indexed by Twitter during several months and then he makes a post search, or Google search or any search engine when he is in airport. As you see his last tweet and didn’t appear in anywhere but not includes a location data, because it is • All @replies users send to the user A will not enough to rob as a fact nobody is at home. The be seen by him if he wasn’t approved before main idea is its non-systemic actions, tweet and • You cannot share permanent links to tweets location then intruders need more time and re- with anyone other than your approved follow- sources to analyze dependence; if not, you will be ers. Permanent link is a static URL (except if it easy caught! If you want delete location info, you was deleted) to the tweet you’ll find in browser ‘s address bar when you click on the tweet and Did you know? then on his details is often include Your service provider may split SMS messages great- • The exact time the tweet was posted er than 160 characters into multiple messages. In this case, the second message will post as a normal Tweet because it does not begin with d+username, as the first message did. Table 3. Facebook Commands Update status is at john's party Add friend by name add john smith (or phone number) add 1234567890 Subscribe to status subscribe john smith Photos help photos Unsubscribe unsubscribe Help help Stop sms stop Start sms on Figure 10. Permanent links www.hakin9.org/en 33
  • 8. Basics • The service/application used to post the If you want to add a mobile number perform with Tweet actions below: • Users who retweeted the tweet • Follow [https://twitter.com/devices] or Tab “Mobile” in account settings leads you to the • Log in to twitter.com phone number management and is represented • Click on the person icon and select Settings by text notifications and sleep settings except fea- from the drop-down menu. ture let you find others by your phone number. It is • Click on the Mobile tab. the same graph extraction as email searching, so • Choose your country and enter your mobile you need to decide whether this feature should be number. checked. Check all of text notifications field is a • Click Activate phone to start verifying your good idea to keep yourself abreast of the news in phone. case your account is hacked. Similar idea is going • You need to send the word 'GO' via text mes- about email notifications settings is allowed you to sage to Twitter 8080 control: • Text the verification code from your phone to that short code. • Notification if direct message, reply or mention received Tab “Profile” mostly is up to you concerning Your • Notification if retweets, following or mark as fa- Name, Location, Web site, and biography ex- vorites happened cept linking with Facebook. You should under- • Notification regarding weekly stories stand if you want separate your tweets and Face- book posts then it’s good idea to create Face- book Page else (if you’re OK with mixing social up- dates) is good idea to link your Twitter to the Face- book profile only and keep Facebook pages for an- other content. Your name is a personal or business identifier or real name that displayed in your profile page and used to identify you to friends, especially if your username is mysterious like @XXX. MakeUseOf wrote an interesting article “Why You Shouldn’t Integrate Facebook, Twitter, & LinkedIn” [http://www.makeuseof.com/tag/integrate-face- book-twitter-linkedin/] where compares positive and negative aspects of linked social life stream Figure 11. Mobile settings Figure 13. Facebook linking Figure 12. Email settings Figure 14. Applications access settings 34 08/2012
  • 9. Social Network Privacy Guide – II on Facebook and Twitter. Quoting, on Twitter you General Activity on Twitter may want to gain followers by posting a tweet in- Delete account tentionally designed to get a reaction. While ran- The last feature of tab “account” gives rights to dom people will love the snark, the less tech-savvy deactivate your profile by agreeing with it and en- family members may take it seriously, and busi- tering password. Your data is going to keep for ness contacts may balk at the controversial nature one month only before it will be deleted. To reac- of it. However, on Facebook you may have some tive your account just login in. When a month is personal news that needs sharing with your near- over your account is vanished in a few minutes, est and dearest. While friends and family will be your data in a few days, and indexed data may keen to hear the news, Twitter people will not care keep as long as it can according to the search and LinkedIn people may resent what they will un- engine rules, except you write him asking to doubtedly consider spam and/or utter gibberish. wipe your data. (Example for Google is at [http:// Tab “Apps” in account settings allow you to man- www.google.com/support/webmasters/bin/an- age with third-party access. Here you will see app swer.py?answer=64033&ctx=sibling]) name, date and time when you granted access this application and access type (read, write, di- Delete Tweet rect messages). You can only revoke access or not How to delete account via long-term deactivation to grant access while Facebook gives feature to wrote above. You may want to block someone on set access types you want. Best practices say to Twitter also. In this case, you need go to the profile check from time to time this section and revoke ac- page of the person you want to block and click on cess for application you stopped using. On another side you’re allowed control who can see your Tweets (for Twitter application) on Face- book Application settings by clicking Edit for the Twitter app You still able to change settings to “On- ly for Me” state when no one tweet will be pub- lished on Facebook. Note, some applications may ask Twitter access and never post anything like a Chime.In because you setup your default Chime. In way of posting. However, Viadeo make your ac- counts cross-posted as soon as you link them. Figure 16. Delete Account Figure 15. Applications access settings www.hakin9.org/en 35
  • 10. Basics Figure 17. Delete Account Figure 18. Delete Tweet his person icon whereupon select Block. Forward Yury Chemerkin blocked accounts cannot add you in their lists or Graduated at Russian State University for the Humani- follow you until you unblock them, see your profile ties (http://rggu.com/) in 2010. At present postgraduate picture in their timeline. In addition, you can unfol- at RSUH. low or report as spam this person by select “Report Information Security Researcher since 2009 and cur- @username for spam” in that menu. rently works as mobile and social infoSecurity research- To delete tweet. er in Moscow. Locate the Tweet you want to delete and hover Experienced in Reverse Engineering, Software Program- mouse over the message and click Delete then. ming, Cyber & Mobile Security Researching, Documen- However, you cannot delete several tweets at a tation, and Security Writing as regular contributing. time, only manually one by one. Now researching Cloud Security and Social Privacy. Contacts: Grabbing twitter’s data from your account I have a lot of social contacts, that’s way to choose the To this day this feature is available only for Face- most suitable way for you on Re.Vu http://re.vu/yury. book users, while Twitter gives users access only chemerkin to the last few thousand posts made to the site. Regular blog: http://security-through-obscurity. Twitter has been slower to roll out a similar service, blogspot.com although a number of third-party services and de- Regular Email: yury.chemerkin@gmail.com velopers have cobbled together ways to let people Skype: yury.chemerkin sift through portions of Twitter’s vast collection of Other my contacts (blogs, IM, social networks) you will messages. On July 24th article in NY Times was find among http links and social icons before TimeLine published to announce that now Twitter is working section on Re.Vu on a tool to let their users to have exported all of their tweets that means tweet will be downloaded into a file. 36 08/2012