If you watched even a bit of Mark Zuckerberg’s ten hours of congressional testimony over the past two days, then you probably heard him proudly explain how users have “complete control” via “inline” privacy controls over everything they share on the platform. Zuckerberg’s language here misses the critical distinction between the information a person actively shares, and the information that Facebook takes from users without their knowledge or consent. But that’s just the tip of the iceberg. Below the surface are Facebook’s often-invisible methods for collecting and generating information on users without their knowledge or consent, including (but not limited to): - Third-party tracking in the form of Facebook’s “like” buttons across the web. - Maintaining shadow profiles on people who don’t even use Facebook. - Logging users’ calls and texts. - Computational inferences that can conclude characteristics and preferences a user never told Facebook about. Facebook’s ethos of connection and growth at all costs cannot coexist with users' privacy rights. https://www.eff.org/deeplinks/2018/04/facebook-not-what-complete-user-control-looks .............................................................................................................................................. #MUG #MindsUserGroup #EFF #Facebook
61Upvotes
12Reminds

More from MindsUserGroup

This malware campaign is infecting Windows devices with Chtonic banking malware, a variant of infamous ZeusVM (Zeus family of malware) which means that cybercriminals are aiming at the victims’ banking and payment card credentials. This campaign relies on a delivery mechanism that leverages social engineering and abuses a legitimate file hosting service. The ‘bait’ file consists of a script rather than a malicious executable, giving the attackers the flexibility to develop interesting obfuscation and fingerprinting techniques. This is not the first time when hackers have used Chrome and Firefox browsers as bait to target unsuspecting users. Previously, fake Chrome and Firefox font update were used to drop a malware leading to Locky ransomware infection. https://www.hackread.com/fake-chrome-firefox-browser-update-lead-users-to-malware/ .................................................................................................................................................... #MUG #MindsUserGroup #scam #Security #malware #Firefox #Chrome #WindowsSucks
617 views ·

More from MindsUserGroup

This malware campaign is infecting Windows devices with Chtonic banking malware, a variant of infamous ZeusVM (Zeus family of malware) which means that cybercriminals are aiming at the victims’ banking and payment card credentials. This campaign relies on a delivery mechanism that leverages social engineering and abuses a legitimate file hosting service. The ‘bait’ file consists of a script rather than a malicious executable, giving the attackers the flexibility to develop interesting obfuscation and fingerprinting techniques. This is not the first time when hackers have used Chrome and Firefox browsers as bait to target unsuspecting users. Previously, fake Chrome and Firefox font update were used to drop a malware leading to Locky ransomware infection. https://www.hackread.com/fake-chrome-firefox-browser-update-lead-users-to-malware/ .................................................................................................................................................... #MUG #MindsUserGroup #scam #Security #malware #Firefox #Chrome #WindowsSucks
617 views ·
close
Speak freely and earn crypto.