Social networking sites leaking personal information to third parties, study warns
Data allows tracking companies to attach unique identities to browsing behavior
Computerworld - Many major social networking sites are leaking information that allows third party advertising and tracking companies to associate the Web browsing habits of users with a specific person, researchers warn.
That's the conclusion of a study on the leakage of personally identifiable information on social networks done at AT&T Labs and the Worcester Polytechnic Institute.
The findings (PDF document), which appear to have received scant public attention so far, were presented by the study's two researchers at a conference in Barcelona over a month ago. Earlier this week, civil liberties group Electronic Frontier Foundation (EFF) referred to the study in a blog post.
The research, by Craig Wills of Worcester Polytechnic and Balachander Krishnamurthy of ATT, presents "some interesting technical details" on how social networking sites are leaking personal data, the EFF blog post said.
"In some cases, the leakage may be unintentional, but in others, there is clever and surreptitious anti-privacy engineering at work," the EFF said.
Wills told Computerworld that he and Krishnamurthy surveyed 12 of the largest social networks for the study. They discovered that 11 of these networks were leaking personal identity information to third-parties including data aggregators, which track and aggregate user viewing habits for targeted ad-serving purposes.
The study shows that most users on social networking sites are vulnerable to having their identity information from their profiles associated with tracking cookies used by data aggregators, he said.
The information allows aggregators to scoop up personal data relatively easily from a user's social network page and to track that user's movement's across multiple Web sites.
While aggregators have typically claimed that a person's movement on the Internet is tracked just as an anonymous IP address, the information from social networking sites allows them to attach a unique identity to each profile, Wills said.
What remains unknown, however, is whether or not data aggregators are actually recording any of the personal identity information being relayed to them from social media sites, Wills said.
He explained that personal identity data or unique identifiers that point to a person's real identity are often relayed by social networking sites to third parties via so-called HTTP referrer headers. HTTP headers basically identify the URLs of any resources that link to a Web page.
In the case of the social networks surveyed, all of the URLs being relayed via such HTTP headers included the user's unique identifier, he said.
When a user's page is being loaded on such sites, third-party tracking and advertising services that have a relationship with the site get not only the data from their tracking cookies but also the data containing the users unique identifier from the HTTP header, he said.
- Combating Identity Theft in a Mobile, Social World Offering identity theft protection and remediation allows businesses to give their workforce the confidence to efficiently engage while bringing financial reward to the...
- After a Breach: Managing Identity Theft Effectively This white paper from LifeLock Business Solutions notes that FIs in addition to managing fraud should strive to turn a negative event for...
- Combating Identity Fraud in a Virtual World This slide presentation reveals findings from the Javelin Strategy & Research 2012 Identity Fraud Report about mobile and social trends, the real risks...
- API Playbook: Drive API Adoption Through Developer Engagement Learn the best practices of how to engage developers, whether your goal is to attract external developers to your public APIs or improve...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- API Management: The Key to Improving the Consumer Travel Experience Join PhoCusWright's Senior Technology Analyst, Norm Rose, as he shares his insights on how travel suppliers and intermediaries can improve industry data flow... All Privacy White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!