+ All Categories
Home > Documents > A F ew Topics on Privacy

A F ew Topics on Privacy

Date post: 25-Feb-2016
Category:
Upload: renee
View: 30 times
Download: 0 times
Share this document with a friend
Description:
A F ew Topics on Privacy. Sankar Roy. Acknowledgement. In preparing the presentation slides and the demo, I received help from Professor Simon Ou Professor Gurdip Singh Professor Eugene Vasserman. What is private? What should be?. Your email and your phone calls - PowerPoint PPT Presentation
Popular Tags:
43
A Few Topics on Privacy Sankar Roy 1
Transcript
Page 1: A  F ew Topics on Privacy

1

A Few Topics on Privacy

Sankar Roy

Page 2: A  F ew Topics on Privacy

2

Acknowledgement

In preparing the presentation slides and the demo, I received help from• Professor Simon Ou• Professor Gurdip Singh• Professor Eugene Vasserman

Page 3: A  F ew Topics on Privacy

What is private? What should be?

• Your email and your phone calls• Your location throughout the day• Your detailed activity throughout the day• Patterns of your activity• Your web locations throughout the day– Surfing history

• Whether you’re on vacation– Is your house empty?

Page 4: A  F ew Topics on Privacy

What are privacy leaks?

• Public vs. private exposure:– Your email and your phone calls are exposed– Your activity/actions/movement are tracked– Your patterns of activity are exposed– Your web activity/history is exposed– Your online purchases are exposed– Your medical records are exposed

Page 5: A  F ew Topics on Privacy

Agenda• Web tracking

• Social network privacy

• Geo-tracking

• Cross-reference with public records (e.g. census)

• University policies for your privacy

Page 6: A  F ew Topics on Privacy

6

Web Tracking

• Information about people’s web activities have business value

• Many companies are trying to – collect your web data – develop a profile of you (what you like or dislike)

• Broadly speaking, two types of tracking– monitoring your visits to several websites, online

shopping, etc.– monitoring your queries to search engines, keywords

used in your emails, etc.

Page 7: A  F ew Topics on Privacy

Web Bug : A Tracking Tool• Web bugs – used to be images (also known as tracking pixels)– now can be HTML iFrame, style, script, input link– are loaded on a webpage when you browse it

• Typically, web pages are not self-contained– the main content comes from the relevant server (e.g. citi.com)– additional content (including web bugs) come from a 3rd party

server (tracker)• The tracker can get information such as– visitor’s IP address, time of visit, type of browser, previously set

cookies, etc.

Page 8: A  F ew Topics on Privacy

More on Web Bugs

• A simplified tracking example– consider a tracking company that has ties with a

network of sites– all images (e.g. web bugs) are stored on one host

computer while the web pages are stored in different servers.

– so, web bugs tool can recognize users traveling around the different servers

– advantage: tracking becomes easy because statistics can be collected centrally

Page 9: A  F ew Topics on Privacy

DoubleClick (Google) System• Doubleclick is an online ad management system – its clients are advertisers and publishers– tracks users via browser cookies as users travel from

website to website (and records which advertisements they view and select).

• Runs background analysis: can mine trends over– multiple web sites, types of visitors, periods of time,

etc.

Page 10: A  F ew Topics on Privacy

The Business Model of DoubleClick

• Ad-serving: publishers display ad on their websites• Ad delivery: advertisers control the ad frequency, time• Behavioral targeting: based on the visitor’s past

activities, guesses the adverts he/she would like to see

Page 11: A  F ew Topics on Privacy

Web-tracking by DoubleClick

• What information of the visitor is tracked?– visit time, ad placement id, advert id, user id, user IP

address, referral URL, etc. • Can track someone visiting multiple web sites – if these web sites participate in AdSense (Google)

• May give a label to a visitor – E.g. “sports lover”, “computer & electronics”, etc.

• Note: you may check and edit your label on your Google Ad Preferences manager page

Page 12: A  F ew Topics on Privacy

How to Check your label in Google’s Ad Preferences – Part I

Page 13: A  F ew Topics on Privacy

How to Check your label in Google’s ad preferences manager – Part II

Page 14: A  F ew Topics on Privacy

Do Not Track Me Online Act of 2011

• Sets the standards for the use of an online opt-out function– allows a consumer to forbid the use of private

information• Regarded as an online version of the Do Not Call

law• States that a business entity should disclose the

status of personal information collection • The opposition group (against this law) also has

some valid points

Page 15: A  F ew Topics on Privacy

Abine’s Tool: “Do Not Track Me”• This tool works as a browser (e.g. Firefox) plugin • Blocks the tracking capabilities – of advertisers, social networks, and data-collection

companies– can display the list of websites which are tracking you

now– opts you out of being tracked

• May still allow same number of adverts, – but can stop targeted advertising that uses your

personal information

Page 16: A  F ew Topics on Privacy

16

Using “Do Not Track Me”: Example I

Page 17: A  F ew Topics on Privacy

17

Using “Do Not Track Me”: Example II

Page 18: A  F ew Topics on Privacy

18

Web History Tracking

• Search engines, such as Google keep on storing the keywords you search – as well as your browsing history– and associates this information against your

Google account id– Google uses this information for targeted

advertisement in future• If misused, this information can lead to our

privacy breach

Page 19: A  F ew Topics on Privacy

19

A Google Web History Page

Page 20: A  F ew Topics on Privacy

20

Google’s Combining Distinct Privacy Policies

• Recently, Google combined 60 distinct privacy policies into one single policy in 2012– if you're signed in, Google treats you as a single

user across all of the products– combines information you've provided from one

service with information from the others– can use web search information to target an

advertisement to you in YouTube, Google Maps, and Gmail

Page 21: A  F ew Topics on Privacy

21

How to reduce risks of Google’s Tracking

• You may turn off the Web History– log in to your Google a/c – go to www.google.com/history and remove all– but this may not guarantee much

• You may not sign into Gmail while using Google search, maps or YouTube

• Or, you may create separate accounts for each Google service

Page 22: A  F ew Topics on Privacy

22

How to Turn Off the Search History

Page 23: A  F ew Topics on Privacy

Class Agenda• Web tracking

• Social network privacy

• Geo-tracking

• Cross-reference with public records (e.g. census)

• University policies for your privacy

Page 24: A  F ew Topics on Privacy

24

Online Social networks (OSN)• Becoming more and more popular– Facebook, Twitter, Google+, Linkedin, flickr, etc.

• Facebook is the largest OSN (Ref. epic.org). – 500 million active users, with 150

million in the United States. – 3 billion photos are uploaded each

month. – each day 100 million tags to photos.

Page 25: A  F ew Topics on Privacy

25

Mobile OSN (mOSN)• Currently, all major OSNs can be accessed via

smart phones• Location has been (mostly) missing between the

real world and OSNs – mOSN is providing the location link now– location is notorious for compromising privacy– a quarter of Facebook users are on a mobile device

Page 26: A  F ew Topics on Privacy

26

Privacy Concerns on Social Networks

• Too much personal information being displayed by the users may compromise their identity

• Location-based-service taking advantage of mobile devices causes more privacy concerns

• Storage of personal data: most social networking sites require users to agree for storage.

• Employment issues: employers are searching OSNs in order to screen potential candidates

• Stalking, and many other privacy problems.

Page 27: A  F ew Topics on Privacy

27

How to Mitigate Privacy Leaks in OSNs• Understand the risks or possible damage• Do not post – unnecessary information or confidential messages or private

photos • To protect against identity theft– do not make your birthday public– never expose your exact address, SSN, passport info

• Avoid cross-linking – your social network with your professional network

• Be watchful of your information leak – check what is leaking via a close family member or a friend

Page 28: A  F ew Topics on Privacy

28

Facebook’s Privacy Concerns

• Facebook displays social ads to targeted customers– the business model has some similarity with Google ad’s

• Claims retroactive rights to users’ personal information – even after a user has deleted her account.

• Discloses “publicly available information” to search engines– i.e., to all Internet users even they are not Facebook users.

• And many other concerns: e.g. face recognition, geo-tagging

Page 29: A  F ew Topics on Privacy

29

Facebook and Face Recognition• Facebook Becomes FaceBank?– by Janeth Lopez, 2012 (available on moglen.law.columbia.edu)

• After you upload new photos – Facebook scans them with facial recognition software – matches the new photos to other photos you are already

tagged in.

• When a user manually tags the friends in a photo – the Facebook machine learns more– making facial recognition more accurate in future.

Page 30: A  F ew Topics on Privacy

30

Facebook’s Photo-Tag Suggestions• You can tag a photo to show who’s in the photo– You can post a status update and say who you are with.

• After a photo upload, Facebook apparently by magic– finds faces in a photo as a square frame– and suggests the name of your friend

• Facebook identifies your friends through your profile – using face recognition technology

Page 31: A  F ew Topics on Privacy

31

Privacy Concerns due to Face Recognition• We could take a photo of a stranger and pull up his/her

full name and public information

• We may cross-reference the information – with social dating sites to know the stranger's interests.

• Stores and restaurants may identify customers and their "likes" in real time – in order to offer them personalized advertising

• Law enforcement agents can use this face bank

Page 32: A  F ew Topics on Privacy

32

How to Reduce Photo Tagging Risks• You can untag photos you are tagged in by friends. – simply go to the photo and click on your name

• But no way to prevent friends from tagging you• You can prevent others from seeing the photos via your

tagged name. – from the Account menu, chose Privacy Settings, click

"Customize settings.”– you have the option of choosing who can see photos via your

tagged name. You can set it to "Only me”. – here, you also have the option of preventing specific

Facebook friends seeing photos via your tagged name.

Page 33: A  F ew Topics on Privacy

Class Agenda• Web tracking

• Social network privacy

• Geo-tracking or Geo-tagging

• Cross-reference with public records (e.g. census)

• University policies for your privacy

Page 34: A  F ew Topics on Privacy

34

Geo-tagging• It is the process of adding geographical identification

metadata to various media such as a photo (Wikipedia)

• Many tools: Camera, smart phones, etc.

Page 35: A  F ew Topics on Privacy

35

Geo-tagging on OSNs• Facebook has a feature called “Places” which

allows users to check-in at locations in real time– it is turned on by default– other users can “geo-tag” you– you may discover friends who are in the same place– friends can share interesting places– you may find out a spot from friends’

recommendations

Page 36: A  F ew Topics on Privacy

36

Risks of Geo-tagging• You may give a stalker or a potential thief your

exact whereabouts– say you post a photo of your house, and leave a

message on Twitter : “need to go to office now”.

• Particularly when your cross-post check-ins to interesting spots on multiple OSNs.

• Also, geo-tagging has the potential to establish patterns of your movements

Page 37: A  F ew Topics on Privacy

37

How to avoid risks of Geo-tagging

• Be familiar with the risks involved. • Learn how to disable your smart phone's geo-

tagging feature• Learn how to protect yourself on the geo-

tagging websites– control the people who are able to see where

you're located. – avoid automatic geo-tagging by default. Facebook

Places is active until disabled.

Page 38: A  F ew Topics on Privacy

Class Agenda• Web tracking

• Social network privacy

• Geo-tracking

• Cross-reference with public records (e.g. census)

• University policies for your privacy

Page 39: A  F ew Topics on Privacy

39

Privacy issues in public records

• Various public records and survey results: – Census, medical, genetic, financial data, location data,

purchasing histories, etc.– are extremely valuable for social science research,

epidemiology, strategic marketing, and so on

• But if these databases can be matched up with one another – then we may be able to generate a detailed picture of

a specific individual’s private life.

Page 40: A  F ew Topics on Privacy

40

Challenges and Solutions• In 2000, Latanya Sweeney analyzed data from the

1990 census and discovered– 87% of the U.S. population could be uniquely identified by

just a Zip code, date of birth, and gender. • Professor Sweeney now says it should be quite easy

to determine patient names – from the secondary health data sold by pharmacies and

analytics companies• Privacy experts have proposed algorithms to– anonymize public records before release– measure the degree of privacy and guarantee it

Page 41: A  F ew Topics on Privacy

Class Agenda• Web tracking

• Social network privacy

• Geo-tracking

• Cross-reference with public records (e.g. census)

• University policies for your privacy

Page 42: A  F ew Topics on Privacy

42

K-State Information Technology Usage : Privacy Policy

• Authorized access to data entails both privilege and responsibility– not only for the user, but also for the system administrator.

• The university will treat information stored on computers as confidential – However, there is no expectation for documents and

messages stored on University-owned equipment. – email and data stored on KSU's network of computers may

be accessed by the university for a few special purposes

Page 43: A  F ew Topics on Privacy

43

Summary

• We discussed common privacy issues.• We presented a few standard countermeasures

to mitigate the risks• Remainder:– the next homework is due before the next class (1pm

on March 7) – the next class will be held in Room 128


Recommended