Privacy Requirements of Social Networking Service Muhammad Farrukh Anwar

Total Page:16

File Type:pdf, Size:1020Kb

Privacy Requirements of Social Networking Service Muhammad Farrukh Anwar Privacy requirements of social networking service Muhammad Farrukh Anwar University of Tampere School of Information Sciences Computer Science / Int. Technology M.Sc. thesis Supervisor: Zheying Zhang June 2016 1 University of Tampere School of Information Sciences Computer Science / Software Development Forename Surname: Muhammad Farrukh Anwar M.Sc. thesis, 62 pages, 56 index and appendix pages June 2016 Users’ privacy in the setting of an open internet environment, combined with a social networking environment has increased privacy related vulnerabilities. Privacy vulnerability represents the flaws in an environment or the lack of security from service providers to prevent privacy problems beforehand. Failure to protect user privacy could increase the chances that users’ data would be transferred without consent, duplicated, shared or used in an inappropriate context. Social networking services (SNS) mostly rely on user data to operate properly, user data can be provided by user, can be collected from alternate sources, or could be requested by SNS themselves. Data shared by the user may contain personal information, and inappropriate use of that personally identified information (PII) is the main concern in this study. This study aims at analyzing privacy vulnerabilities in a social media context. The study explores vulnerabilities and privacy policies, and falls in the category of qualitative research. A method to analyze risk imposed by each vulnerability is also discussed at the end of this study. These heuristics are outcome of analysis of various privacy related concepts and privacy taxonomy proposed by Anton (2004). Individual interviews were also carried out to validate findings of this research where developers were asked questions related to privacy vulnerabilities extracted from Facebook privacy policies and other available documents. The outcome of this research highlights the use of goal based requirement analysis method to evaluate requirements and to determine amount of vulnerabilities related to Facebook and also how the vulnerabilities can be narrowed down. Considering the original study by Anton (2004) was designed for e-commerce websites, some elements had to be modified to suit social networking services where data sharing and data transfer are the core features of the service. Keywords: Social media, privacy, privacy requirements, privacy vulnerabilities, privacy protection. 2 Acknowledgements First of all, I would like to express by deepest gratitude to my supervisor Zheying Zhang, who worked tirelessly to ensure I was on the right path, I would also like to thank her for the continuous support of my masters’ thesis, for her patience and immense knowledge in the subject. Your advice on the subject and continuous insight on the progress of my thesis have been priceless. A special thanks to my family as well, for providing continuous support and motivation throughout the course of my thesis. Muhammad Farrukh Anwar June 2016, Tampere 3 Table of Contents 1. Introduction ....................................................................................................... 7 1.1 Research Questions ................................................................................................. 7 1.2 Research methodology ............................................................................................ 8 1.3 Thesis outline ........................................................................................................ 10 2. Social networking services ............................................................................. 11 2.1 Different types of data in social networking services ........................................... 13 2.1.1 Data collected on Facebook ......................................................................... 13 2.2 Read, write, edit and delete ................................................................................... 14 2.2.1 Data collection .............................................................................................. 18 2.2.2 Data generation ............................................................................................. 19 2.3 Data use and data transfer ..................................................................................... 20 2.4 Data control ........................................................................................................... 20 3. Privacy and privacy threats in social networking services ............................. 22 3.1 Privacy and concepts related to privacy ................................................................ 22 3.1.1 Privacy paradigms ........................................................................................ 24 3.1.2 Right to be forgotten ..................................................................................... 25 3.2 Privacy threats in Facebook .................................................................................. 26 3.3 Privacy goal taxonomy .......................................................................................... 30 3.4 Privacy protection classifications .......................................................................... 30 3.4.1 Notice and awareness ................................................................................... 31 3.4.2 Choice and consent ....................................................................................... 32 3.4.3 Access and participation ............................................................................... 32 3.4.4 Integrity and security .................................................................................... 33 3.4.5 Enforcement and redress .............................................................................. 33 3.5 Privacy vulnerability classifications ..................................................................... 33 3.5.1 Information monitoring ................................................................................ 34 3.5.2 Information aggregation ............................................................................... 35 3.5.3 Information storage ...................................................................................... 35 3.5.4 Information transfer ...................................................................................... 36 3.5.5 Information collection .................................................................................. 36 3.5.6 Information personalization ......................................................................... 36 3.5.7 Contact .......................................................................................................... 37 3.6 Summary ............................................................................................................... 37 4. Goal based requirement analysis method ....................................................... 38 4.1 Goal based requirement analysis model: Elements ............................................... 39 4.2 GBRAM process ................................................................................................... 40 4 4.2.1 Goal identification ........................................................................................ 41 4.2.2 Goal organization ......................................................................................... 42 4.2.3 Goal refinement ............................................................................................ 44 4.2.4 Goal operationalization ................................................................................ 46 4.3 Summary ............................................................................................................... 51 5. Privacy vulnerability analysis ......................................................................... 53 5.1 Vulnerability classification ................................................................................... 56 5.1.1 Data collection and interviews ..................................................................... 56 5.1.2 Vulnerability assessment process models .................................................... 59 5.2 Vulnerability analysis ........................................................................................... 62 5.2.1 Information monitoring goals ....................................................................... 62 5.2.2 Information aggregation goals ...................................................................... 64 5.2.3 Information storage goals ............................................................................. 64 5.2.4 Information transfer goals ............................................................................ 65 5.2.5 Information collection goals ......................................................................... 66 5.2.6 Information personalization goals ................................................................ 66 5.3 Results ................................................................................................................... 67 6. Conclusion, limitations and future work ......................................................... 69 7. References ....................................................................................................... 70 5 List of figures Figure 1. Facebook data operations ................................................................................ 15 Figure 2. Haystack structure [Beaver et al, 2010] .........................................................
Recommended publications
  • AI, Robots, and Swarms: Issues, Questions, and Recommended Studies
    AI, Robots, and Swarms Issues, Questions, and Recommended Studies Andrew Ilachinski January 2017 Approved for Public Release; Distribution Unlimited. This document contains the best opinion of CNA at the time of issue. It does not necessarily represent the opinion of the sponsor. Distribution Approved for Public Release; Distribution Unlimited. Specific authority: N00014-11-D-0323. Copies of this document can be obtained through the Defense Technical Information Center at www.dtic.mil or contact CNA Document Control and Distribution Section at 703-824-2123. Photography Credits: http://www.darpa.mil/DDM_Gallery/Small_Gremlins_Web.jpg; http://4810-presscdn-0-38.pagely.netdna-cdn.com/wp-content/uploads/2015/01/ Robotics.jpg; http://i.kinja-img.com/gawker-edia/image/upload/18kxb5jw3e01ujpg.jpg Approved by: January 2017 Dr. David A. Broyles Special Activities and Innovation Operations Evaluation Group Copyright © 2017 CNA Abstract The military is on the cusp of a major technological revolution, in which warfare is conducted by unmanned and increasingly autonomous weapon systems. However, unlike the last “sea change,” during the Cold War, when advanced technologies were developed primarily by the Department of Defense (DoD), the key technology enablers today are being developed mostly in the commercial world. This study looks at the state-of-the-art of AI, machine-learning, and robot technologies, and their potential future military implications for autonomous (and semi-autonomous) weapon systems. While no one can predict how AI will evolve or predict its impact on the development of military autonomous systems, it is possible to anticipate many of the conceptual, technical, and operational challenges that DoD will face as it increasingly turns to AI-based technologies.
    [Show full text]
  • M&A @ Facebook: Strategy, Themes and Drivers
    A Work Project, presented as part of the requirements for the Award of a Master Degree in Finance from NOVA – School of Business and Economics M&A @ FACEBOOK: STRATEGY, THEMES AND DRIVERS TOMÁS BRANCO GONÇALVES STUDENT NUMBER 3200 A Project carried out on the Masters in Finance Program, under the supervision of: Professor Pedro Carvalho January 2018 Abstract Most deals are motivated by the recognition of a strategic threat or opportunity in the firm’s competitive arena. These deals seek to improve the firm’s competitive position or even obtain resources and new capabilities that are vital to future prosperity, and improve the firm’s agility. The purpose of this work project is to make an analysis on Facebook’s acquisitions’ strategy going through the key acquisitions in the company’s history. More than understanding the economics of its most relevant acquisitions, the main research is aimed at understanding the strategic view and key drivers behind them, and trying to set a pattern through hypotheses testing, always bearing in mind the following question: Why does Facebook acquire emerging companies instead of replicating their key success factors? Keywords Facebook; Acquisitions; Strategy; M&A Drivers “The biggest risk is not taking any risk... In a world that is changing really quickly, the only strategy that is guaranteed to fail is not taking risks.” Mark Zuckerberg, founder and CEO of Facebook 2 Literature Review M&A activity has had peaks throughout the course of history and different key industry-related drivers triggered that same activity (Sudarsanam, 2003). Historically, the appearance of the first mergers and acquisitions coincides with the existence of the first companies and, since then, in the US market, there have been five major waves of M&A activity (as summarized by T.J.A.
    [Show full text]
  • La Protección De La Intimidad Y Vida Privada En Internet La Integridad
    XIX Edición del Premio Protección de Datos Personales de Investigación de la Agencia Española de Protección de Datos PREMIO 2015 Las redes sociales se han convertido en una herramienta de comu- nicación y contacto habitual para millones de personas en todo el La protección de la intimidad mundo. De hecho, se calcula que más de un 75% de las personas Amaya Noain Sánchez que se conectan habitualmente a Internet cuentan con al menos un y vida privada en internet: la perfil en una red social. La autora plantea en el texto si las empre- sas propietarias de estos servicios ofrecen una información sufi- integridad contextual y los flujos de ciente a los usuarios sobre qué datos recogen, para qué los van a información en las redes sociales utilizar y si van a ser cedidos a terceros. En una reflexión posterior, propone como posibles soluciones el hecho de que estas empresas (2004-2014) pudieran implantar directrices técnicas compartidas y una adapta- ción normativa, fundamentalmente con la privacidad desde el di- seño, la privacidad por defecto y el consentimiento informado. Así, Amaya Noain Sánchez el resultado sería un sistema de información por capas, en el que el usuario fuera conociendo gradualmente las condiciones del trata- miento de su información personal. Este libro explica el funcionamiento de una red social, comenzan- do por la creación del perfil de usuario en el que se suministran datos, y analiza cómo la estructura del negocio está basada en la monetización de los datos personales, con sistemas como el targe- ting (catalogando al usuario según sus intereses, características y predilecciones) y el tracking down (cruzando información dentro y fuera de la red).
    [Show full text]
  • Facebook Timeline
    Facebook Timeline 2003 October • Mark Zuckerberg releases Facemash, the predecessor to Facebook. It was described as a Harvard University version of Hot or Not. 2004 January • Zuckerberg begins writing Facebook. • Zuckerberg registers thefacebook.com domain. February • Zuckerberg launches Facebook on February 4. 650 Harvard students joined thefacebook.com in the first week of launch. March • Facebook expands to MIT, Boston University, Boston College, Northeastern University, Stanford University, Dartmouth College, Columbia University, and Yale University. April • Zuckerberg, Dustin Moskovitz, and Eduardo Saverin form Thefacebook.com LLC, a partnership. June • Facebook receives its first investment from PayPal co-founder Peter Thiel for US$500,000. • Facebook incorporates into a new company, and Napster co-founder Sean Parker becomes its president. • Facebook moves its base of operations to Palo Alto, California. N. Lee, Facebook Nation, DOI: 10.1007/978-1-4614-5308-6, 211 Ó Springer Science+Business Media New York 2013 212 Facebook Timeline August • To compete with growing campus-only service i2hub, Zuckerberg launches Wirehog. It is a precursor to Facebook Platform applications. September • ConnectU files a lawsuit against Zuckerberg and other Facebook founders, resulting in a $65 million settlement. October • Maurice Werdegar of WTI Partner provides Facebook a $300,000 three-year credit line. December • Facebook achieves its one millionth registered user. 2005 February • Maurice Werdegar of WTI Partner provides Facebook a second $300,000 credit line and a $25,000 equity investment. April • Venture capital firm Accel Partners invests $12.7 million into Facebook. Accel’s partner and President Jim Breyer also puts up $1 million of his own money.
    [Show full text]
  • A Longitudinal Study of Facebook, Linkedin, & Twitter
    Session: Tweet, Tweet, Tweet! CHI 2012, May 5–10, 2012, Austin, Texas, USA A Longitudinal Study of Facebook, LinkedIn, & Twitter Use Anne Archambault Jonathan Grudin Microsoft Corporation Microsoft Research Redmond, Washington USA Redmond, Washington USA [email protected] [email protected] ABSTRACT messaging, and employee blogging were first used mainly We conducted four annual comprehensive surveys of social by students and consumers to support informal interaction. networking at Microsoft between 2008 and 2011. We are Managers, who focus more on formal communication interested in how these sites are used and whether they are channels, often viewed them as potential distractions [4]. A considered to be useful for organizational communication new communication channel initially disrupts existing and information-gathering. Our study is longitudinal and channels and creates management challenges until usage based on random sampling. Between 2008 and 2011, social conventions and a new collaboration ecosystem emerges. networking went from being a niche activity to being very widely and heavily used. Growth in use and acceptance was Email was not embraced by many large organizations until not uniform, with differences based on gender, age and the late 1990s. Instant messaging was not generally level (individual contributor vs. manager). Behaviors and considered a productivity tool in the early 2000s. Slowly, concerns changed, with some showing signs of leveling off. employees familiar with these technologies found ways to use them to work more effectively. Organizational Author Keywords acceptance was aided by new features that managers Social networking; Facebook; LinkedIn; Twitter; Enterprise appreciated, such as email attachments and integration with calendaring. ACM Classification Keywords Many organizations are now wrestling with social H.5.3 Group and Organization Interfaces networking.
    [Show full text]
  • Arxiv:1403.5206V2 [Cs.SI] 30 Jul 2014
    What is Tumblr: A Statistical Overview and Comparison Yi Chang‡, Lei Tang§, Yoshiyuki Inagaki† and Yan Liu‡ † Yahoo Labs, Sunnyvale, CA 94089, USA § @WalmartLabs, San Bruno, CA 94066, USA ‡ University of Southern California, Los Angeles, CA 90089 [email protected],[email protected], [email protected],[email protected] Abstract Traditional blogging sites, such as Blogspot6 and Living- Social7, have high quality content but little social interac- Tumblr, as one of the most popular microblogging platforms, tions. Nardi et al. (Nardi et al. 2004) investigated blogging has gained momentum recently. It is reported to have 166.4 as a form of personal communication and expression, and millions of users and 73.4 billions of posts by January 2014. showed that the vast majority of blog posts are written by While many articles about Tumblr have been published in ordinarypeople with a small audience. On the contrary, pop- major press, there is not much scholar work so far. In this pa- 8 per, we provide some pioneer analysis on Tumblr from a va- ular social networking sites like Facebook , have richer so- riety of aspects. We study the social network structure among cial interactions, but lower quality content comparing with Tumblr users, analyze its user generated content, and describe blogosphere. Since most social interactions are either un- reblogging patterns to analyze its user behavior. We aim to published or less meaningful for the majority of public audi- provide a comprehensive statistical overview of Tumblr and ence, it is natural for Facebook users to form different com- compare it with other popular social services, including blo- munities or social circles.
    [Show full text]
  • Redes Sociales: El Valor De La Información Y La Protección De La Privacidad
    REDES SOCIALES: EL VALOR DE LA INFORMACIÓN Y LA PROTECCIÓN DE LA PRIVACIDAD WILLIAM ALBERTO RENDÓN VERGEL Director Andrés Felipe Umaña Chaux Trabajo de grado presentado como requisito para optar por el título de abogado UNIVERSIDAD DE LOS ANDES FACULTAD DE DERECHO BOGOTÁ D.C. 2014 TABLA DE CONTENIDO. TABLA DE CONTENIDO. I. INTRODUCCIÓN………………………………………………………….……………4 A. METODOLOGÍA…………..……………………………………………. ………………6 B. REDES SOCIALES Y PRIVACIDAD………………………………….……. …………7 II. ANÁLISIS DE ASPECTOS RELEVANTES Y PROBLEMÁTICA DE LAS REDES SOCIALES…………..……………………………………………….….………..9 A. DATA MINING, BIG DATA Y LA CREACIÓN DE PERFILES DE USUARIOS MEDIANTE EL ANÁLISIS DE INFORMACIÓN PERSONAL. ………………………….9 i. Big data y la predicción de información……………………………... ………………12 B. IDENTIFICACIÓN PERSONAL MEDIANTE RECOLECCIÓN DE DATOS BIOMÉTRICOS………………………………………………………………... ………….14 C. RECOPILACIÓN, USO Y MANEJO INDEBIDO DE COOKIES…………………………….…………………………………………... ………..16 D. DERECHO AL OLVIDO………………………………………………………. ………18 E. PRIVACIDAD DE MENORES Y PROTECCIÓN ESPECIAL...………………. ……..18 F.LA EXTRATERRITORIALIDAD Y LOS OBSTACULOS QUE SUPONE……. ……19 III. LA POSICIÓN CONTRACTUAL DE LAS REDES SOCIALES OBJETO DE ESTUDIO………………………………………………………………………………….20 A. FACEBOOK………………………………………………………………………...…..21 B. TWITTER…………………………………………………………………………….....22 C.INSTAGRAM……………………………………………………………………………23 D. SNAPCHAT………………………………………………………………………….…24 IV. SITUACIÓN EN COLOMBIA………………………………….…………………..25 V. PROPUESTAS PARA LA PROTECCIÓN JURÍDICA DE LA PRIVACIDAD EN REDES SOCIALES…………………...………………………………………………….29
    [Show full text]
  • How to Make a Personal Facebook Account on Computer
    How to Make a Personal Facebook Account on Computer 1. Click on your internet browser to pull up a webpage. It may look like one of the following: 2. In the search bar at the top of the page, type www.facebook.com and press enter. This is the page that will be displayed: 3. Under the words “Sign Up”, enter your first name, last name, mobile number or email, password, birthdate, and gender. Then, click the green Sign-Up button at the bottom of the page (in the red box above). a. If you need assistance creating an email account, please refer to the instructional guide titled “Creating a personal email account”. 4. Verify your email or phone number. a. If registered with email: Go to your email account and you will see an email with the subject “_ number is your Facebook confirmation code”. Click the button “Confirm Your Account” (In red box below). Unique confirmation code to your account OR, return to the Facebook tab and enter the code in the box (In red box below). b. If registered by phone number, enter the code sent to your text messages in the red box above. IF YOU SUCCESSFULLY ENTERED CODE, PLEASE PROCEED TO STEP 5. IF NOT, SEE BELOW. Troubleshooting at this step: a. If you did not receive an email or text, click the “send email again” or “send text again.” When you receive the email or text, follow step 4. b. If you still do not receive an email, check the promotions and spam folders in your email.
    [Show full text]
  • Towards a Deeper Understanding of Facebook Resistance
    UNIVERSITEIT GENT FACULTEIT ECONOMIE EN BEDRIJFSKUNDE ACADEMIEJAAR 2014 – 2015 TOWARDS A DEEPER UNDERSTANDING OF FACEBOOK RESISTANCE Masterproef voorgedragen tot het bekomen van de graad van Master of Science in de Bedrijfseconomie Petra Truant onder leiding van Dr. Katrien Verleye en Dr. Simon Quaschning UNIVERSITEIT GENT FACULTEIT ECONOMIE EN BEDRIJFSKUNDE ACADEMIEJAAR 2014 – 2015 TOWARDS A DEEPER UNDERSTANDING OF FACEBOOK RESISTANCE Masterproef voorgedragen tot het bekomen van de graad van Master of Science in de Bedrijfseconomie Petra Truant onder leiding van Dr. Katrien Verleye en Dr. Simon Quaschning Vertrouwelijkheidsclausule PERMISSION Ondergetekende verklaart dat de inhoud van deze masterproef mag geraadpleegd en/of gereproduceerd worden, mits bronvermelding. Naam student:............................................................................................................................ Samenvatting Deze masterproef focust op Facebook resistance, een fenomeen dat erg actueel is, maar in de academische literatuur amper aandacht geniet. Van Dijck’s classificatie van sociale media langsheen een technoculturele (gebruikers en gebruik, content, technologie) en socio-economische dimensie (beleid, eigenaarschap, business model), lijkt geschikt om het onderwerp in de juiste context te kaderen. Doorheen deze zes niveaus komen van Dijck’s concepten van ‘friending’ en ‘sharing’ veelvuldig aan bod. Deze ervoeren een verschuiving van ‘connectedness’ naar ‘connectivity’. Dit betekent een verregaande commercialisering en comodificatie
    [Show full text]
  • Introduction to Web 2.0: Facebook, Texting, Twitter, Your Students, and You
    Introduction to Web 2.0: Facebook, Texting, Twitter, Your Students, and You. Betha Whitlow, Curator of Visual Resources Washington University in Saint Louis Exploring Emerging Technology Drop-In Session emergingtech.wustl.edu There is a world of difference between the modern home environment of integrated electric information and the classroom. Today’s child… is bewildered when he enters the nineteenth century environment that still characterizes the educational establishment--where information is scarce, but ordered, and structured by fragmented, classified patterns, subjects, and schedules. Marshall McLuhan wrote this in 1967. And he was only talking about the influence of television on the way young people behave and learn. If NBC had run 24 hours straight since 1948, it would have published 500,000 hours of information. Dr. Michael Wesch, Kansas State University You Tube Has Produced More Hours of Content in the Past Few Months. Information Overload? • As of August, 2008, there were more 71 million blogs. That’s 71 million more than in 2003. • There are over 60 billion e-mail messages sent every day. • 40 billion gigabytes of UNIQUE, NEW information will be produced this year. That’s as much as 296, 000 Libraries of Congress. This Information Explosion is Largely Due to One Thing: Web 2.0. Web 1.0 • The passive web • Information was still thought of as something having physical form. • Content was relatively static. Web 2.0, 2003-Now • Also known as the “interactive” or “social” web • Web 2.0 enables collaboration, organization, and interaction • Web 2.0 puts seeking, organizing and creating content into YOUR hands, allowing easy creation, posting, distribution.
    [Show full text]
  • La Protección De La Intimidad Y Vida Privada En Internet La Integridad
    XIX Edición del Premio Protección de Datos Personales de Investigación de la Agencia Española de Protección de Datos PREMIO 2015 Las redes sociales se han convertido en una herramienta de comu- nicación y contacto habitual para millones de personas en todo el La protección de la intimidad mundo. De hecho, se calcula que más de un 75% de las personas Amaya Noain Sánchez que se conectan habitualmente a Internet cuentan con al menos un y vida privada en internet: la perfil en una red social. La autora plantea en el texto si las empre- sas propietarias de estos servicios ofrecen una información sufi- integridad contextual y los flujos de ciente a los usuarios sobre qué datos recogen, para qué los van a información en las redes sociales utilizar y si van a ser cedidos a terceros. En una reflexión posterior, propone como posibles soluciones el hecho de que estas empresas (2004-2014) pudieran implantar directrices técnicas compartidas y una adapta- ción normativa, fundamentalmente con la privacidad desde el di- seño, la privacidad por defecto y el consentimiento informado. Así, Amaya Noain Sánchez el resultado sería un sistema de información por capas, en el que el usuario fuera conociendo gradualmente las condiciones del trata- miento de su información personal. Este libro explica el funcionamiento de una red social, comenzan- do por la creación del perfil de usuario en el que se suministran datos, y analiza cómo la estructura del negocio está basada en la monetización de los datos personales, con sistemas como el targe- ting (catalogando al usuario según sus intereses, características y predilecciones) y el tracking down (cruzando información dentro y fuera de la red).
    [Show full text]
  • Facebook Upload Failed Notification
    Facebook Upload Failed Notification Dispatched Rutger accustoms constantly and physiognomically, she hypnotises her attires chirks inapplicably. Icky and transpolar Normie congratulatemismanaged allopathically.her beavers electrographs reticulated and constitutionalizes inboard. Guaranteed Obadiah sometimes withes any tankfuls Privacy policy page and upload notification appear daily lives with students are necessary steps that fail? Comment on the blog and union the forum discussions at cleveland. Instagram captions to constrain people take in the claim place. Or else by will force be reported by the recipients of unwanted notifications. How we Fix Instagram Share to Facebook Not Working. Is Instagram share to Facebook not prey for i too? She writes is necessary are failed, while using admin accepts a notification informing you facebook upload failed notification appear daily based on a terrible idea. Everything he writes is inspired by life experiences and study. Hope bank has the fix. Facebook is in American online social media and social networking service attempt is ride the biggest company sent its kind the the coach as none today. From the facebook messenger API details it is also though to upload and send files. This notification will fail to all of notifications will revoke access to the cloud files to the assignment enhancements feature, failed to provide a user. Bandwidth reserve not working with viewers for notifications again and complete, or long as your session has not available or tiff file. When uploading everything is uploaded while not displaying certain posts fail, upload notification from getting blocked by a page starts reaching out? Error updating an item. How most see are you looking know on facebook.
    [Show full text]