Top Tips to Protect Your Privacy and Data (PDF)

Total Page:16

File Type:pdf, Size:1020Kb

Top Tips to Protect Your Privacy and Data (PDF) Top Tips to Protect Your Privacy and Data Monday, Jan. 28th is Data Privacy Day Data Privacy Day is held on January 28th every year. It is an effort to empower people to protect their privacy and control their digital footprint and escalate the protection of privacy and data as everyone’s priority. Presented by: Tim Gurganus 1/28/2013 Data Privacy Day 2013 Top Tips to Protect Your Privacy and Data January is Data Privacy Month OIT is hosting several activities during Data Privacy Month (January) to empower campus users to protect their privacy and to control their digital footprint. All events will be held in DH Hill Library Auditorium 12pm – 1pm Tuesday: “What Data is sensitive and How do we keep it private?” Thursday: “Data Protection, Privacy and the Law” NCSU Privacy Month website: http://go.ncsu.edu/dpm2013 Top Tips to Protect Your Privacy and Data Student Data Privacy @ NCSU The University publishes an directory online. You can control what information is displayed using the instructions in this document: http://www.ncsu.edu/registrar/forms/pdf/privacyblock.pdf You can update or remove your personal information by logging into the MyPack portal at: http://mypack.ncsu.edu Under the FOR STUDENTS tab in MyPack Portal, select Privacy Settings . Top Tips to Protect Your Privacy and Data Faculty/Staff Data Privacy @ NCSU The University publishes an directory online. You can update or remove your personal information by visiting this website: https://ssl.ncsu.edu/directory/updatelisting.php The University also maintains other personal information about you that you can view and update in the MyPack Portal: http://mypack.ncsu.edu Under the FOR Faculty and STAFF tab in MyPack Portal, select Employee Self-Service and then Personal Information Top Tips to Protect Your Privacy and Data Pick Good Passwords • Passwords should be hard to guess and longer is better • Use good passwords with strength appropriate for the importance of the site. – Banking website password should be stronger than a forum site – If a site stores your credit card info, it should have a stronger password – Use different passwords for different websites or types of websites • Online Banking • Personal Email • Unity ID • Online shopping • Facebook, Twitter, LinkedIn, Pinterest Password strength testing • If you have an idea for a password, test it here: https://passfault.appspot.com/password_strength.html#menu Top Tips to Protect Your Privacy and Data Be Careful of Linked Accounts • If your email account can be used to reset the password for your Bank account, the passwords should be different and at least the same strength • Avoid connecting too many accounts and be wary of using your Facebook or twitter account to login to sites that are not well known • Firefox plug-in shows password use and re-use http://connectioni.st/2012/01/visualize-your-password-reuse.html Password strength testing • If you have an idea for a password, test it here: https://passfault.appspot.com/password_strength.html#menu • Password suggestions: https://onyen.unc.edu/cgi-bin/unc_id/services Top Tips to Protect Your Privacy and Data Manage your passwords • If you store passwords in your web browser, set a master password • Consider using a password vault like Keepass from: http://keepass.info – Works in Windows, Linux and Mac – Works in Android, iPhone, Blackberry and Windows phone – Password vault is opened with a master password – Passwords are encrypted while in memory – Once you find a password, double click on it to copy it to the clipboard then paste it in the login screen – Keepass can automatically clear the clipboard after a certain time has passed. • Use a mnemonic or association to help you remember the password chosen for a given login Top Tips to Protect Your Privacy and Data Gmail Email Security and Privacy • Setting up mail delegation - http://support.google.com/mail/bin/answer.py?hl=en&ctx=mail&answer=138350 • You can delegate access to your Gmail to another person so they can read, send, and delete messages on your behalf. • For example, you can delegate e-mail rights to an admin in your organization, or you could delegate your personal email access to your spouse. • The delegate can also access the other person's contacts by clicking the Contacts link. Clicking the To , Cc , or Bcc links in the mail compose window will also bring up your contacts. • You won't be able to give anyone permission to change your account password or account settings, or chat on your behalf. • Only delegate email access to a trusted person • This is one of the settings you should check if your account has been compromised Top Tips to Protect Your Privacy and Data Gmail Email Filters and Forwarding • Email filters and forwarding are another way to share access to email • You can set up filters to forward messages that meet specific criteria. • You can create 20 filters that forward to other addresses. • You can maximize your filtered forwarding by combining filters that send to the same address. • Setting up a forward: http://support.google.com/mail/bin/answer.py?hl=en&ctx=mail&answer= 10957 • Creating filters: http://support.google.com/mail/bin/answer.py?hl=en&answer=6579 • Filters and forwards should be checked after an account is compromised Top Tips to Protect Your Privacy and Data Displaying Images or Remote Content and Privacy • Be aware that displaying images or other remote content in an email may communicate to the sender that you read the email or identify you to the sender Top Tips to Protect Your Privacy and Data Displaying Images or Remote Content and Privacy • Be aware that displaying images or other remote content in an email may communicate to the sender that you read the email or identify you to the sender Top Tips to Protect Your Privacy and Data Did you know ??? • The Wall Street Journal says companies are increasingly connecting consumers' real-life identities to where they hang out online. • The newspaper cited a Georgia man shopping for a car who input his name and contact information on a car dealer's website. • While this data went to the dealership, it also was transmitted to a company that tracks the online movements of people shopping for vehicles. The company then was able to pair the man's personal information with an analysis of the automotive websites he had visited and hand over all of this data to the car dealer, which could use it to more easily land a sale. • One company that can pull off this kind of data mining is Dataium LLC, based in Nashville, Tenn. • Describing itself as "the world's largest compiler of online automotive shopping behavior," Dataium says every month it "observes over 20 million automotive shoppers across over 10,000 automotive websites and then aggregates, indexes and summarizes this data into intelligent insights." Top Tips to Protect Your Privacy and Data More and more, You are being tracked online: How it works: http://online.wsj.com/article/SB1000142412788732478440457814 3144132736214.html#project%3DANONYMITY1208%26article Tabs%3Dinteractive 1. When you visit a website, a tracking company like Dataium or DataLogix put a cookie on your computer 2. As you visit other sites that also use data tracking companies, the cookie data gets updated using your computer browser’s id. 3. If at some point you enter your real name on a website, like to register, your ID is connected with the cookie information collected earlier. Top Tips to Protect Your Privacy and Data • Sites are sharing personally identifiable information and some personal information (age, zip code) with 3 rd parties – Ask.com – Linkedin.com – Photobucket.com – Match.com http://online.wsj.com/article/SB10001424127887324784404578143144132736214.html #project%3DANONYMITY1212%26articleTabs%3Dinteractive Top Tips to Protect Your Privacy and Data When you login to a site, other companies may access the data from your profile via: • Image Advertising on the pages • Social network code such as Like, Google+, LinkedIn or Tweet – If you are signed in to Facebook and go to a site with a Like button, the site can know your Facebook identity even if you don’t click on the Like button • Advertising banners, headers, sidebars and footers – Some use transparent images that you will not see Top Tips to Protect Your Privacy and Data Firefox Browser Settings • Remember history, search history downloads • Don’t Accept tracking cookies • Don’t Accept third party cookies • Cookie Expiration Accept third-party cookies : If selected, Firefox will accept cookies from http://site2.com when you are visiting http://site1.com . Some advertisers use these types of cookies to track your visits to the various websites on which they advertise. If you are concerned about this, you can disable third-party cookies in Firefox. Top Tips to Protect Your Privacy and Data Firefox Browser Settings •Firefox allows you to show your cookies by name and content. •Here you see all the cookies related to Twitter Top Tips to Protect Your Privacy and Data Firefox Browser Settings • See saved passwords and remove or show them • Firefox can protect sensitive information such as saved passwords and certificates by encrypting them using a master password . • If you create a master password, each time you start Firefox, it will ask you to enter the password the first time it needs to access a certificate or stored password. Top Tips to Protect Your Privacy and Data Firefox Browser Settings • Pages you view are normally stored in a special cache folder for quicker viewing the next time you visit the same page. • You can specify the amount of disk space the cache can use here. • You can also immediately clear the contents of the cache.
Recommended publications
  • AI, Robots, and Swarms: Issues, Questions, and Recommended Studies
    AI, Robots, and Swarms Issues, Questions, and Recommended Studies Andrew Ilachinski January 2017 Approved for Public Release; Distribution Unlimited. This document contains the best opinion of CNA at the time of issue. It does not necessarily represent the opinion of the sponsor. Distribution Approved for Public Release; Distribution Unlimited. Specific authority: N00014-11-D-0323. Copies of this document can be obtained through the Defense Technical Information Center at www.dtic.mil or contact CNA Document Control and Distribution Section at 703-824-2123. Photography Credits: http://www.darpa.mil/DDM_Gallery/Small_Gremlins_Web.jpg; http://4810-presscdn-0-38.pagely.netdna-cdn.com/wp-content/uploads/2015/01/ Robotics.jpg; http://i.kinja-img.com/gawker-edia/image/upload/18kxb5jw3e01ujpg.jpg Approved by: January 2017 Dr. David A. Broyles Special Activities and Innovation Operations Evaluation Group Copyright © 2017 CNA Abstract The military is on the cusp of a major technological revolution, in which warfare is conducted by unmanned and increasingly autonomous weapon systems. However, unlike the last “sea change,” during the Cold War, when advanced technologies were developed primarily by the Department of Defense (DoD), the key technology enablers today are being developed mostly in the commercial world. This study looks at the state-of-the-art of AI, machine-learning, and robot technologies, and their potential future military implications for autonomous (and semi-autonomous) weapon systems. While no one can predict how AI will evolve or predict its impact on the development of military autonomous systems, it is possible to anticipate many of the conceptual, technical, and operational challenges that DoD will face as it increasingly turns to AI-based technologies.
    [Show full text]
  • Facebook Graph Search POV
    January 2013 Facebook Graph Search POV Facebook Graph Search POV Introduction On January 15, 2013 Facebook introduced the world to Graph Search. Released in beta, Graph Search joins News Feed and Timeline as Facebook’s third foundational pillar, allowing users to search their social graphs with queries such as: • Friends who like Florence + the Machine • National Parks liked by people who speak Russian and live in Burlington, VT • Photos taken before 2005 Search results draw from any information a Page, place, group, app, game, or person has shared with connections or the public. The first version of Graph Search focuses on people, photos (excluding Instagram), places, and interests, but will expand to include data from posts, status updates, and third- party apps. Search results are unique to each person as no two social graphs are the same. Also, results are based not just on relationships, but rather strength of the relationships. A search for “People who like the things I like” might yield a set of results that look something like the image below. Since that particular search results in over 1,000 people it might be worth filtering. Using the column on the right, users can filter by categories like gender, relationship, current city, and employer. Figure 1 Sample Graph Search results for People who like the things I like 1 Facebook Graph Search POV Results are not just unique based on social graphs, they are also dependent on what Facebook determines to be the category of search. If Facebook thinks it’s a recruiting search the results will contain snippets of people’s work history.
    [Show full text]
  • A Pilot Study for Fiji English André Huber Universi
    Zurich Open Repository and Archive University of Zurich Main Library Strickhofstrasse 39 CH-8057 Zurich www.zora.uzh.ch Year: 2015 Facebook graph search for refined screen-based data collection in CMC:A pilot study for Fiji English Huber, André DOI: https://doi.org/10.1016/j.dcm.2015.03.001 Posted at the Zurich Open Repository and Archive, University of Zurich ZORA URL: https://doi.org/10.5167/uzh-115932 Journal Article Accepted Version The following work is licensed under a Creative Commons: Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) License. Originally published at: Huber, André (2015). Facebook graph search for refined screen-based data collection in CMC: A pilot study for Fiji English. Discourse, Context Media, 10:10-18. DOI: https://doi.org/10.1016/j.dcm.2015.03.001 Facebook Graph Search for Refined Screen-Based Data Collection in CMC – A Pilot Study for Fiji English André Huber University of Zürich, English Department, Plattenstrasse 47, 8032 Zürich, Switzerland. [email protected], (+41) 44 634 39 37 Abstract In sociolinguistics, the advantages of web-based research are often lost because it can rarely satisfy the need for social variables without additional offline data. Facebook Graph Search is a new query tool, which allows highly specific retrieval of Facebook users and can thus mitigate this dilemma. In this paper, Facebook Graph Search will be introduced and a pilot study in computer-mediated communication and Fiji English will demonstrate the suitability of Graph Search for exploratory research in a speech community. The pilot study shows that there are differences in language choice based on age and context of use: English is preferred over local indigenous languages by younger users and in wall posts.
    [Show full text]
  • Safe on Social Guide to FACEBOOK
    2018 Safe on Social Guide to safeonsocial.com Facebook Published by Safe on Social Media Pty Ltd Copyright Safe on Social Media Pty Ltd 2017 The moral right of the author has been asserted No part of this e-book or its associated modules may be reproduced or transmitted by any person or entity in any for by any means, electronic or otherwise including photocopying, recording or scanning or by any information storage without prior permission other than the licensor who is licensed to use this information on their website, in newsletters and in print and has been granted permission from the publisher under an annual license. The publisher, authors, licensee, licensor and their respective employees or agents will not accept responsibility for injuries or damage, physical or emotional occasioned to any person as a result of a social media use or any other activities described in this e-book. Whilst every attempt has been made to ensure that the information in this e-book is accurate, it is the nature of social media to be constantly changing. Therefore, Safe on Social Media Pty Ltd gives no guarantees to the completeness or accuracy of the contents of this guide. Contents (currently updating) About Facebook....................................................................................................................................................4 Advantages and disadvantages of Facebook...................................................................................................5 Safety Check.........................................................................................................................................................5
    [Show full text]
  • Privacy Requirements of Social Networking Service Muhammad Farrukh Anwar
    Privacy requirements of social networking service Muhammad Farrukh Anwar University of Tampere School of Information Sciences Computer Science / Int. Technology M.Sc. thesis Supervisor: Zheying Zhang June 2016 1 University of Tampere School of Information Sciences Computer Science / Software Development Forename Surname: Muhammad Farrukh Anwar M.Sc. thesis, 62 pages, 56 index and appendix pages June 2016 Users’ privacy in the setting of an open internet environment, combined with a social networking environment has increased privacy related vulnerabilities. Privacy vulnerability represents the flaws in an environment or the lack of security from service providers to prevent privacy problems beforehand. Failure to protect user privacy could increase the chances that users’ data would be transferred without consent, duplicated, shared or used in an inappropriate context. Social networking services (SNS) mostly rely on user data to operate properly, user data can be provided by user, can be collected from alternate sources, or could be requested by SNS themselves. Data shared by the user may contain personal information, and inappropriate use of that personally identified information (PII) is the main concern in this study. This study aims at analyzing privacy vulnerabilities in a social media context. The study explores vulnerabilities and privacy policies, and falls in the category of qualitative research. A method to analyze risk imposed by each vulnerability is also discussed at the end of this study. These heuristics are outcome of analysis of various privacy related concepts and privacy taxonomy proposed by Anton (2004). Individual interviews were also carried out to validate findings of this research where developers were asked questions related to privacy vulnerabilities extracted from Facebook privacy policies and other available documents.
    [Show full text]
  • My Facebook® for Seniors
    My Facebook® for Seniors Michael Miller 800 East 96th Street, Indianapolis, Indiana 46240 USA My Facebook for Seniors Editor-in-Chief Greg Wiegand Copyright © 2014 by Pearson Education, Inc. All rights reserved. No part of this book shall be reproduced, stored in a retrieval system, or Acquisitions Editor transmitted by any means, electronic, mechanical, photocopying, recording, or otherwise, Michelle Newcomb without written permission from the publisher. No patent liability is assumed with respect Development Editor to the use of the information contained herein. Although every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors Charlotte Kughen or omissions. Nor is any liability assumed for damages resulting from the use of the informa- Managing Editor tion contained herein. Kristy Hart ISBN-13: 978-0-7897-5166-9 ISBN-10: 0-7897-5166-6 Senior Project Editor Library of Congress Control Number: 2013943644 Lori Lyons Printed in the United States on America Indexer First Printing: September 2013 Ken Johnson Trademarks Proofreader All terms mentioned in this book that are known to be trademarks or service marks have Kathy Ruiz been appropriately capitalized. Que Publishing cannot attest to the accuracy of this infor- mation. Use of a term in this book should not be regarded as affecting the validity of any Technical Editor trademark or service mark. Sheila McDermott Warning and Disclaimer Publishing Every effort has been made to make this book as complete and as accurate as possible, but Coordinator no warranty or fitness is implied. The information provided is on an “as is” basis.
    [Show full text]
  • Unicorn: a System for Searching the Social Graph
    Unicorn: A System for Searching the Social Graph Michael Curtiss, Iain Becker, Tudor Bosman, Sergey Doroshenko, Lucian Grijincu, Tom Jackson, Sandhya Kunnatur, Soren Lassen, Philip Pronin, Sriram Sankar, Guanghao Shen, Gintaras Woss, Chao Yang, Ning Zhang Facebook, Inc. ABSTRACT rative of the evolution of Unicorn’s architecture, as well as Unicorn is an online, in-memory social graph-aware index- documentation for the major features and components of ing system designed to search trillions of edges between tens the system. of billions of users and entities on thousands of commodity To the best of our knowledge, no other online graph re- servers. Unicorn is based on standard concepts in informa- trieval system has ever been built with the scale of Unicorn tion retrieval, but it includes features to promote results in terms of both data volume and query volume. The sys- with good social proximity. It also supports queries that re- tem serves tens of billions of nodes and trillions of edges quire multiple round-trips to leaves in order to retrieve ob- at scale while accounting for per-edge privacy, and it must jects that are more than one edge away from source nodes. also support realtime updates for all edges and nodes while Unicorn is designed to answer billions of queries per day at serving billions of daily queries at low latencies. latencies in the hundreds of milliseconds, and it serves as an This paper includes three main contributions: infrastructural building block for Facebook’s Graph Search We describe how we applied common information re- product. In this paper, we describe the data model and • trieval architectural concepts to the domain of the so- query language supported by Unicorn.
    [Show full text]
  • Facebook, Inc. Strategic Analysis Faizan Qureshi BPS 4305.502 Soo Jung Kim
    Facebook, Inc. Strategic Analysis Faizan Qureshi BPS 4305.502 Soo Jung Kim Executive Summary Facebook, a company which attributes its humble beginnings to a student in a college dorm room, has had an explosive amount of growth in the past ten years. There isn‟t a major website, corporation, or even a university that doesn‟t have its own Facebook page. This staggering fact illustrates the profound impact that this company has had at all levels of business and has embedded itself in contemporary culture. In fact, Facebook‟s position in the social media market is so strong that there is no major platform that can directly compete with it. However, many of Facebook‟s most vocal critics have used the “bigger they are the harder they fall” approach when criticizing the success of Facebook by asserting that all it takes is another revolutionary website that will blindly attract the masses to knock Facebook out of its spotlight. It‟s a valid assertion given the fate of websites such as MySpace and Xanga. Given the fickle nature of consumers collectively, Mark Zuckerberg torpedoed an approach to this website in which the dynamics is constantly changing, new features are available, and most crucially, branding the name of his company into different aspects of people‟s lives. Facebook is not only an American name, but it is also an international brand which transcends to different nationalities and different cultures. Introduction The fundamental problem of Facebook has always been the issue of Privacy of its millions of users who unlike the founder, have a more limited definition of making the world a more open and connected place.
    [Show full text]
  • Identification – Toward an Identifiability-Based Framework for Privacy Impact Assessment
    Die approbierte Originalversion dieser Dissertation ist in der Hauptbibliothek der Technischen Universität Wien aufgestellt und zugänglich. http://www.ub.tuwien.ac.at The approved original version of this thesis is available at the main library of the Vienna University of Technology. http://www.ub.tuwien.ac.at/eng Chasing shadows: the interplay of privacy and (digital) identification – toward an identifiability-based framework for privacy impact assessment DISSERTATION submitted in partial fulfillment of the requirements for the degree of Doctor of Social and Economic Sciences by Stefan Strauß Registration Number 09855841 to the Faculty of Informatics at the Vienna University of Technology Advisor: Prof. Dr.Wolfgang Hofkirchner The dissertation has been reviewed by: _______________________ _______________________ (Prof. Dr. Ingrid Schneider) (PD Dr. Michael Nentwich) Wien, 25.07.2017 _______________________ (Stefan Strauß) Technische Universität Wien A-1040 Wien ■ Karlsplatz 13 ■ Tel. +43-1-58801-0 ■ www.tuwien.ac.at Chasing shadows: the interplay of privacy and (digital) identification – toward an identifiability-based framework for privacy impact assessment DISSERTATION zur Erlangung des akademischen Grades Doktor der Sozial- und Wirtschaftswissenschaften eingereicht von Stefan Strauß Matrikelnummer 09855841 An der Fakultät für Informatik der Technischen Universität Wien Betreuung: Prof. Dr.Wolfgang Hofkirchner Diese Dissertation haben begutachtet: _______________________ _______________________ (Prof. Dr. Ingrid Schneider) (PD Dr. Michael
    [Show full text]
  • 14684 FULLTEXT.Pdf (5.628Mb)
    Graph-Based Storage In Social Networks Kristine Steine Master of Science in Computer Science Submission date: May 2016 Supervisor: Svein Erik Bratsberg, IDI Norwegian University of Science and Technology Department of Computer and Information Science Abstract How do we efficiently store an ever-growing amount of data? How do we re- trieve and analyze relationships between data quickly? These are among the concerns faced by companies such as Google, Yahoo, Amazon, and Facebook today. As the world’s leading tech companies are tackling the challenge of their data aggressively increasing in size, NoSQL databases are emerging as their weapon of choice. Immediate consistency is sacrificed to gain higher scalability and availability. In the case of social networking services, NoSQL graph databases are obvious contenders for the role currently held by relational databases. This thesis explores the suitability of graph databases as the main storage for these services. Our research suggests that while using graph databases for social network- ing services eases the task of software development, today’s leading graph databases are not as robust and mature as these services require. ii Sammendrag Hvordan kan vi e↵ektivt lagre en stadig voksende mengde data? Hvordan kan vi raskt hente ut og analysere relasjoner mellom data? Dette er bekymringer selskaper som Google, Yahoo, Amazon og Facebook møter i dag. Samtidig som verdens ledende teknologiselskaper takler utfordringen med at dataene deres øker aggressivt i størrelse, vokser NoSQL-databaser frem som deres redning. Umiddelbar konsistens ofres for ˚aoppn˚abedre skalerbarhet og til- gjengelighet. For tilfellet sosiale nettverk er NoSQL-grafdatabaser ˚apenbare utfordrere for rollen relasjonsdatabaser har i dag.
    [Show full text]
  • Mining Facebook: Analyzing Fan Pages, Examining Friendships, and More
    CHAPTER 2 Mining Facebook: Analyzing Fan Pages, Examining Friendships, and More In this chapter, we’ll tap into the Facebook platform through its (Social) Graph API and explore some of the vast possibilities. Facebook is arguably the heart of the social web and is somewhat of an all-in-one wonder, given that more than half of its 1 billion users1 are active each day updating statuses, posting photos, exchanging messages, chatting in real time, checking in to physical locales, playing games, shopping, and just about anything else you can imagine. From a social web mining standpoint, the wealth of data that Facebook stores about individuals, groups, and products is quite exciting, because Facebook’s clean API presents incredible opportunities to synthesize it into information (the world’s most precious commodity), and glean valuable insights. On the other hand, this great power commands great responsibility, and Facebook has instrumented the most sophisticated set of online privacy controls that the world has ever seen in order to help protect its users from exploit. It’s worth noting that although Facebook is self-proclaimed as a social graph, it’s been steadily transforming into a valuable interest graph as well, because it maintains rela‐ tionships between people and the things that they’re interested in through its Facebook pages and “Likes” feature. In this regard, you may increasingly hear it framed as a “social interest graph.” For the most part, you can make a case that interest graphs implicitly exist and can be bootstrapped from most sources of social data. As an example, Chap‐ ter 1 made the case that Twitter is actually an interest graph because of its asymmetric “following” (or, to say it another way, “interested in”) relationships between people and other people, places, or things.
    [Show full text]
  • Appendix A: Facebook Timeline (October 2003 – August 2014)
    Appendix A: Facebook Timeline (October 2003 – August 2014) 2003 October • Mark Zuckerberg releases Facemash , the predecessor to Facebook. It was described as a Harvard University version of Hot or Not . 2004 January • Zuckerberg begins writing Facebook . • Zuckerberg registers thefacebook.com domain. February • Mark Zuckerberg and co-founders Dustin Moskovitz , Chris Hughes , and Eduardo Saverin launch Facebook on February 4. • 650 Harvard students joined thefacebook.com in the fi rst week of launch. March • Facebook expands to MIT , Boston University , Boston College , Northeastern University , Stanford University , Dartmouth College , Columbia University , and Yale University . April • Zuckerberg, Dustin Moskovitz , and Eduardo Saverin form Thefacebook.com LLC, a partnership. © Springer Science+Business Media New York 2014 367 N. Lee, Facebook Nation, DOI 10.1007/978-1-4939-1740-2 368 Appendix A: Facebook Timeline (October 2003 – August 2014) June • Facebook receives its fi rst investment from PayPal co-founder Peter Thiel for US$500,000. • Facebook incorporates into a new company, and Napster co-founder Sean Parker becomes its president. • Facebook moves its headquarters to Palo Alto, California. August • To compete with growing campus-only service i2hub , Zuckerberg launches Wirehog . It is a precursor to Facebook Platform applications . September • Facebook launches Facebook Wall for users to post messages to their friends. • ConnectU fi les a lawsuit against Zuckerberg and other Facebook founders, resulting in a $65 million settlement. October • Maurice Werdegar of WTI Partner provides Facebook a $300,000 three- year credit line. December • Facebook achieves its one millionth registered user. 2005 February • Maurice Werdegar of WTI Partner provides Facebook a second $300,000 credit line and a $25,000 equity investment.
    [Show full text]