Facebook stirs privacy ire with facial recognition
Earlier last year, Facebook was criticized after the company unveiled tools that would allow the sharing of user information with other Web sites. That move caused an uproar among users and prompted a handful of U.S. senators to send an open letter calling on Facebook to amend its privacy policies.
"You'd think that they would have learned something from the past pounding they've taken on privacy issues, but it doesn't look like they have," said Dan Olds, an analyst with The Gabriel Consulting Group. "This is pretty creepy ... Let's say some guy sees an attractive woman, he can snap a quick picture of her with his cellphone camera and then search Facebook to see who she is."
Olds added that people should quickly move to opt out of the feature but he's concerned that most users won't take the issue seriously enough.
But for those who want to turn the feature off, security company Sophos offers some how-tos:
- First, go to your Facebook "Account" in the upper right-hand corner of the page. Then click on "Privacy Settings."
- Next, click on "Customize settings."
- Then go to "Things others share."
- Beside the option titled "Suggest photos of me to friends. When photos look like me, suggest my name," click "Edit Settings."
- Click on "Edit settings."
- Then change it to "Disabled."
- Don't forget to press "Okay."
Not everyone is concerned about Facebook's facial recognition feature, though.
Rob Enderle, an analyst with the Enderle Group, said the technology is out there whether Facebook uses it or not. "If Facebook doesn't do this someone else likely will," he said. "Remember [Facebook isn't] making private things public with this. They are making public things easier to find."
Sharon Gaudin covers the Internet and Web 2.0, emerging technologies, and desktop and laptop chips for Computerworld. Follow Sharon on Twitter at @sgaudin or subscribe to Sharon's RSS feed . Her e-mail address is firstname.lastname@example.org.
- NSA defends collecting data from U.S. residents not suspected of terrorist activities
- Groups fear bill would allow free flow of data between private sector and NSA
- Google's move into home automation means even less privacy
- Bill to require warrant for email searches gains ground in House
- Coming soon to a fridge near you -- targeted ads
- Snowden leaks prompt tech firms to tout privacy, transparency policies
- License reader lawsuit can be heard, appeals court rules
- Is EU's 'right to be forgotten' really the 'right to edit the truth'?
- Tails 1.0: A bootable Linux distro that protects your privacy
- Privacy jitters derail controversial K-12 big data initiative
Read more about Web Apps in Computerworld's Web Apps Topic Center.
- The DDoS Threat Spectrum Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.
- Need to Replace MS Threat Management Gateway? Read this article to learn how F5's Secure Web Gateway solution provides a full set of features that can help you successfully migrate...
- The Shortfall of Network Load Balancing Applications running across networks encounter a wide range of performance, security, and availability challenges as IT department strive to deliver fast, secure access...
- Leave No App Behind with Software Defined Application Services F5 Software Defined Application Services (SDAS) is the next-generation model for delivering application services that enables service injection, consumption, automation, and orchestration across...
- What Does it Take to Deliver a Superior Customer Experience? The Two Top-Rated Online Retailers, B&H Photo and Crutchfield Electronics, Share Their Secrets Discuss practical CX tools and service methods such as contact center agents and the use of realtime speech analytics to help contact center...
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily... All Web Apps White Papers | Webcasts