The Many Shades of Anonymity: Characterizing Anonymous Social Media Content
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
What Is Gab? a Bastion of Free Speech Or an Alt-Right Echo Chamber?
What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber? Savvas Zannettou Barry Bradlyn Emiliano De Cristofaro Cyprus University of Technology Princeton Center for Theoretical Science University College London [email protected] [email protected] [email protected] Haewoon Kwak Michael Sirivianos Gianluca Stringhini Qatar Computing Research Institute Cyprus University of Technology University College London & Hamad Bin Khalifa University [email protected] [email protected] [email protected] Jeremy Blackburn University of Alabama at Birmingham [email protected] ABSTRACT ACM Reference Format: Over the past few years, a number of new “fringe” communities, Savvas Zannettou, Barry Bradlyn, Emiliano De Cristofaro, Haewoon Kwak, like 4chan or certain subreddits, have gained traction on the Web Michael Sirivianos, Gianluca Stringhini, and Jeremy Blackburn. 2018. What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber?. In WWW at a rapid pace. However, more often than not, little is known about ’18 Companion: The 2018 Web Conference Companion, April 23–27, 2018, Lyon, how they evolve or what kind of activities they attract, despite France. ACM, New York, NY, USA, 8 pages. https://doi.org/10.1145/3184558. recent research has shown that they influence how false informa- 3191531 tion reaches mainstream communities. This motivates the need to monitor these communities and analyze their impact on the Web’s information ecosystem. 1 INTRODUCTION In August 2016, a new social network called Gab was created The Web’s information ecosystem is composed of multiple com- as an alternative to Twitter. -
Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation
Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation vorgelegt von Dipl.-Inform. Sebastian Jürg Göndör geb. in Duisburg von der Fakultät IV – Elektrotechnik und Informatik der Technischen Universität Berlin zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften - Dr.-Ing. - genehmigte Dissertation Promotionsausschuss: Vorsitzender: Prof. Dr. Thomas Magedanz Gutachter: Prof. Dr. Axel Küpper Gutachter: Prof. Dr. Ulrik Schroeder Gutachter: Prof. Dr. Maurizio Marchese Tag der wissenschaftlichen Aussprache: 6. Juni 2018 Berlin 2018 iii A Bill of Rights for Users of the Social Web Authored by Joseph Smarr, Marc Canter, Robert Scoble, and Michael Arrington1 September 4, 2007 Preamble: There are already many who support the ideas laid out in this Bill of Rights, but we are actively seeking to grow the roster of those publicly backing the principles and approaches it outlines. That said, this Bill of Rights is not a document “carved in stone” (or written on paper). It is a blog post, and it is intended to spur conversation and debate, which will naturally lead to tweaks of the language. So, let’s get the dialogue going and get as many of the major stakeholders on board as we can! A Bill of Rights for Users of the Social Web We publicly assert that all users of the social web are entitled to certain fundamental rights, specifically: Ownership of their own personal information, including: • their own profile data • the list of people they are connected to • the activity stream of content they create; • Control of whether and how such personal information is shared with others; and • Freedom to grant persistent access to their personal information to trusted external sites. -
DRC Diaspora Programme, DEMAC and GIZ, As Well As Consultations with Diaspora Communities in Europe for Possible Modalities of Diaspora Engagement
DRC DIASPORA PROGRAMME, DEMAC & GIZ’ Recommendations on behalf of diasporas to the Global Compact on Refugees’ Programme of Action Key considerations and recommendations to UNHCR and United Nations’ Member States 1 This paper sets forth joint recommendations of Danish Refugee Council Diaspora Programme, DEMAC (Diaspora Emergency Action and Coordination) and Deutsche Gesellschaft für Internationale Zusammenarbeit (GIZ) GmbH (Sector Project Forced Displacement, on behalf of the German Federal Ministry for Economic Cooperation and Development, BMZ) for the Global Compact on Refugees’ Programme of Action, bringing together perspectives from a humanitarian and a development point of view. It is based on the experiences of DRC Diaspora Programme, DEMAC and GIZ, as well as consultations with diaspora communities in Europe for possible modalities of diaspora engagement. The objective of this paper is to ensure that the voices and perspectives of diaspora organisations will be reflected in the Global Compact on Refugee’s Programme of Action. Diasporas are dispersed collectives residing outside their country of origin who “maintain regular or occasional contacts with what they regard as their homeland and with individuals and groups of the same background residing in other host countries” (Sheffer: 2003, 9-10). Diasporas include first generation emigrants and their descendants, former refugees and asylum seekers. “Diaspora and refugee overlap significantly and are neither linear, nor static categories. The terms “refugee” and “diaspora” are situational identities that overlap and shift over time and depending on context. There is no bright line demarcation”. (Research paper No.278: 2016, UNHCR, 4) DRC, DEMAC and GIZ are focusing in this paper on diaspora organisations which are formally constituted entities comprising diaspora members that operate in their countries of settlement and countries of origin, and may also work in neighbouring (third) countries. -
Dating App 20140708.Key
From ‘Like’ to Love: How Brands Can Woo Users on Messaging and Dating Apps 7/10/14 Dating goes digital The generation accustomed to communicating at all times is coming of age and bringing the same attitude to their romantic lives. ! “ I think in the time I was in a relationship, all dating communication went exclusively to text. You can’t call anybody anymore. If you call someone, they’re like ‘What? Are you on fire? Then quit wasting my time. Text me that [stuff].’” – Aziz Ansari, Comedian Credit: Comedy Central © 2013 IPG Media Lab. Proprietary & Confidential 2 We heart mobile dating apps Online dating services and apps are an increasingly common way to meet potential mates: • 1 in 3 single Americans have used an online dating service • 1 in 6 couples married in the last three years met online ! Graph Sources: marketingland.com/founders-whisper-tinder-75424; www.internetlivestats.com ! ! Sources: www.pewinternet.org/2013/10/21/online-dating-relationships/ cp.match.com/cppp/media/CMB_Study.pdf © 2013 IPG Media Lab. Proprietary & Confidential 3 Dating apps moved to mobile as messaging apps began to proliferate © 2013 IPG Media Lab. Proprietary & Confidential 4 But it’s not just dating apps Dating apps, social networks, and messaging apps are blurring as people seek, create, and document new relationships: • Glimpse connects people based on their Instagram photos • LinkedUp turns the professional site into a dating platform • Kik users share usernames instead of digits on multiple platforms © 2013 IPG Media Lab. Proprietary & Confidential 5 What’s going on here? As we noted in our white paper on Messaging Apps , messaging platforms are fighting for consumers and introducing new features to increase audience engagement. -
Hard-Coded Censorship in Open Source Mastodon Clients — How Free Is Open Source?
Proceedings of the Conference on Technology Ethics 2020 - Tethics 2020 Hard-coded censorship in Open Source Mastodon clients — How Free is Open Source? Long paper Juhani Naskali 0000-0002-7559-2595 Information Systems Science, Turku School of Economics, University of Turku Turku, Finland juhani.naskali@utu.fi Abstract. This article analyses hard-coded domain blocking in open source soft- ware, using the GPL3-licensed Mastodon client Tusky as a case example. First, the question of whether such action is censorship is analysed. Second, the licensing compliance of such action is examined using the applicable open-source software and distribution licenses. Domain blocking is found to be censorship in the literal definition of the word, as well as possibly against some the used Google distribu- tion licenses — though some ambiguity remains, which calls for clarifications in the agreement terms. GPL allows for functionalities that limit the use of the software, as long as end-users are free to edit the source code and use a version of the appli- cation without such limitations. Such software is still open source, but no longer free (as in freedom). A multi-disciplinary ethical examination of domain blocking will be needed to ascertain whether such censorship is ethical, as all censorship is not necessarily wrong. Keywords: open source, FOSS, censorship, domain blocking, licensing terms 1 Introduction New technologies constantly create new challenges. Old laws and policies cannot al- ways predict future possibilities, and sometimes need to be re-examined. Open source software is a licensing method to freely distribute software code, but also an ideology of openness and inclusiveness, especially when it comes to FOSS (Free and Open-source software). -
Some Mobile Apps Add Anonymity to Social Networking
Log in / Create an account Search Subscribe Topics+ The Download Magazine Events More+ Connectivity Some Mobile Apps Add Anonymity to Social Networking Social-networking apps that eschew real names are gaining ground. by Rachel Metz February 6, 2014 On social networks like Facebook, Twitter, and LinkedIn, most people do not communicate freely, for fear of the repercussions. For just over a decade, Facebook has enforced the idea of an authentic online identity tied to each user of a social network. This might be fine for sharing news of a promotion or new baby with friends, but sometimes you’d probably like to post a status update that won’t go on your permanent record. This urge might explain why millions of people, many of them under the age of 25, are flocking to a free smartphone app called Whisper, which lets you share thoughts—a few lines of text set against a background image—without adding your real name. Secret, a newer free app for the iPhone that shares posts anonymously through your existing social networks, is based on the same idea. After years spent filling social networks like Facebook and Twitter with the minutiae of our lives, we’ve left permanent, heavily curated trails of personal data in our wake—over 1.2 billion of them on Facebook alone, judging by its user count. New apps allow us to continue being social without worrying about the repercussions of sharing the most personal confessions. “Facebook is more like the global social network; it’s like our communication layer to the world,” says Anthony Rotolo, an assistant professor at Syracuse University, who studies social networks. -
Social Construction of Privacy: Reddit Case Study
Social Construction of Privacy: Reddit Case Study December 13, 2020 A Thesis Prospectus Submitted to the Faculty of the School of Engineering and Applied Science University of Virginia ² Charlottesville, Virginia In Partial Fulfillment of the Requirements of the Degree Bachelor of Science, School of Engineering Rajiv Sarvepalli 1 1 INTRODUCTION In the technological age of today, privacy becomes a more and more valuable commod- ity. With so many companies that live off the idea that information is money, it becomes increasingly concerning the amount of an individual’s information that is public. It is public in every sense of the word, not just to a group of people, but to the whole world. Consider the constant data scandals that plague our technological world. Whether it is Facebook, Google, or governments, someone is always getting caught selling, collecting, or losing data that many consider infringes on their privacy. Therefore, as stewards of these technologies, we must develop preemptive ways of protecting the privacy of the individual in an information-based world focused on the collective. The heterogeneous nature of society, especially with respect to privacy, makes the perspective vary greatly from person to person. This study shall focus on Reddit, an anonymous social media since individuals within anonymous social media communities tend to view anonymity as some form of privacy and therefore tend to care about in some manner about privacy. In order to understand the perspective and definitions of privacy, privacy needs to be analyzed in the context of a society. The conundrum of our information society is the constant complaints of lack of privacy, yet no privacy-invasive companies change their conduct. -
Compared to Facebook, Instagram Use Causes More Appearance Comparison and Lower Body Satisfaction in College Women
Body Image 34 (2020) 38–45 Contents lists available at ScienceDirect Body Image journa l homepage: www.elsevier.com/locate/bodyimage Compared to Facebook, Instagram use causes more appearance comparison and lower body satisfaction in college women a,∗ a b c Renee Engeln , Ryan Loach , Megan N. Imundo , Anne Zola a Department of Psychology, Northwestern University, United States b Department of Psychology, University of California, Los Angeles, United States c Oxford Internet Institute, University of Oxford, United Kingdom a r t i c l e i n f o a b s t r a c t Article history: The current experiment tested the effect of social media use on college women’s appearance compar- Received 3 September 2019 isons, mood, and body satisfaction. We randomly assigned 308 undergraduate women (aged 18–26) to Received in revised form 26 April 2020 use Facebook, use Instagram, or play a matching game (the control condition) on an iPad for seven min- Accepted 26 April 2020 utes. Compared to the Facebook condition, Instagram users retrospectively reported spending more time viewing images or videos containing people. Participants in both the Facebook and Instagram conditions Keywords: also retrospectively reported engaging in more appearance comparisons relative to those in the control Instagram condition, but Instagram users reported significantly more appearance comparisons than those in the Facebook Facebook condition. Those who used Instagram, but not Facebook, showed decreased body satisfaction, Social media decreased positive affect, and increased negative affect. Results are consistent with previous research Body satisfaction Social comparison suggesting social media use influences body satisfaction and social comparison, and that Instagram may be a particularly harmful platform when it comes to body image because of its focus on photos over text. -
Cachet: a Decentralized Architecture for Privacy Preserving Social Networking with Caching
Cachet: A Decentralized Architecture for Privacy Preserving Social Networking with Caching Shirin Nilizadeh Sonia Jahid Prateek Mittal Indiana University University of Illinois at University of California, Bloomington Urbana-Champaign Berkeley [email protected] [email protected] [email protected] Nikita Borisov Apu Kapadia University of Illinois at Indiana University Urbana-Champaign Bloomington [email protected] [email protected] ABSTRACT and (b) use of social contacts for object caching results in Online social networks (OSNs) such as Facebook and significant performance improvements. Google+ have transformed the way our society communi- cates. However, this success has come at the cost of user Categories and Subject Descriptors privacy; in today's OSNs, users are not in control of their C.2.4 [Computer-Communication Networks]: Dis- own data, and depend on OSN operators to enforce access tributed Systems|Distributed Applications; K.6.m control policies. A multitude of privacy breaches has spurred [Management of Computing and Information research into privacy-preserving alternatives for social net- Systems]: Miscellaneous|Security working, exploring a number of techniques for storing, dis- seminating, and controlling access to data in a decentral- ized fashion. In this paper, we argue that a combination General Terms of techniques is necessary to efficiently support the complex Algorithms, Security functionality requirements of OSNs. We propose Cachet, an architecture that provides strong Keywords security and privacy guarantees while preserving the main functionality of online social networks. In particular, Cachet privacy, peer-to-peer systems, social networking, caching protects the confidentiality, integrity and availability of user content, as well as the privacy of user relationships. -
Characterizing Anonymous Social Media Content
The Many Shades of Anonymity: Characterizing Anonymous Social Media Content Denzil Correa†, Leandro Araújo Silva‡, Mainack Mondal†, Fabrício Benevenuto‡, Krishna P. Gummadi† † Max Planck Institute for Software Systems (MPI-SWS), Germany ‡ Federal University of Minas Gerais (UFMG), Brazil Abstract While anonymous online forums have been in existence since the early days of the Internet, in the past, such forums Recently, there has been a significant increase in the popu- larity of anonymous social media sites like Whisper and Se- were often devoted to certain sensitive topics or issues. In cret. Unlike traditional social media sites like Facebook and addition, its user population was relatively small and limited Twitter, posts on anonymous social media sites are not as- to technically sophisticated users with specific concerns or sociated with well-defined user identities or profiles. In this requirements to be anonymous. On the other hand, anony- study, our goals are two-fold: (i) to understand the nature mous social media sites like Whisper1 and Secret2 provide a (sensitivity, types) of content posted on anonymous social generic and easy-to-use platform for lay users to post their media sites and (ii) to investigate the differences between thoughts in relative anonymity. Thus, the advent and rapidly content posted on anonymous and non-anonymous social me- growing adoption of these sites provide us with an oppor- dia sites like Twitter. To this end, we gather and analyze ex- tunity for the first time to investigate how large user popu- tensive content traces from Whisper (anonymous) and Twitter lations make use of an anonymous public platform to post (non-anonymous) social media sites. -
Decentralized Social Networking Platforms: Current Status and Trends Protocols Used by Existing DOSN Platforms Taxonomy by Proto
Decentralized Social Networking Platforms: Current Status and Trends Andres Ledesma, George Pallis and Marios Dikaiakos Laboratory for Internet Computing (LInC), Department of computer Science, University of Cyprus. {aledesma, gpallis, mdd}@cs.ucy.ac.cy Protocols Used by Existing DOSN Platforms DOSN Platforms Trendy … Trendiest! Open Graph Activity Protocol XOXO + 400 k Stream users *Document Representation Collaboration Tent *Partial Connection to other OSN XRI OExchange *Desktop (e.g. Facebook) Content PubSubHubbub Peer-to-Peer *Project Fork pump.io Identification Exchange LAMP node.js (e.g. identi.ca) OEmbed Salmon RSS / Atom Taxonomy by Protocols and Release Stage Content protocols identify, represent and exchange social content (e.g. posts, likes The three circles represent the release stage of the platform (i.e. the maturity and comments) in DOSNs. of the platform). Libertree Thimbl PGP Protocols used: newebe Cunity Duuit! XMPP pump.io XMPP + Others buddycloud Security and DSNP OpenSSL OpenPGP All Lipsync.it Friendica Tent encryption XMPP + Ostatus Retroshare OpenLink Data Spaces Ostatus + Others Kune Diaspora* DOSN rely on protocols to make the communication as private and secure as possible. Partial Ostatus + Others Ostatus Jappix Lorea StatusNet Others stable WebID Authentication OpenID beta Salut à Toi alpha User Layered Overview OAuth Identification WebFinger Activity Streams hCard Social Content RSS/Atom User Protocols deal with authentication and identification. User authentication across PuHubSubbub Salmon services is an essential part of DOSNs. User identification provides limited and OStatus Comet XMPP Mr. Privacy Psyc controlled user data to service and application without giving up privacy. HTTP SMTP, IMAP P2P TCP/IP Social FOAF XFN Representation Food for thought… Social representation refers to protocols that express the social graph. -
Check Pending Requests Instagram
Check Pending Requests Instagram Ronen hasten impracticably? Mastoidal and calming Derk swingles: which Mahmoud is weightier enough? Petit and exaggerated Sampson dosed while conglobate Nathanil kedge her dag lambently and pistol-whips aurally. At the instagram requests received some issues But assist you delete Instagram, you permanently delete Instagram; that smart is gone forever. You can see fear of our pending requests from your dashboard and withdraw. All in that show lazy loaded images are checking account? What does this tool that you see. Facebook Tips 3 Simple Methods to thought Out Friend Gizbot. When both have too no pending requests LinkedIn will reduce that you're vision to tomorrow with people you may not expire To avoid potential. If you to't able to send an outstanding request in Instagrammeans the 'user ' or over account holder has been BLOCKED you convey you want to give request testimony the other social platform and whip the user Most of the currency you still find in same user in other social platform. Getting blocked stinks but music is also a peculiar way you see Instagram's. Accept Request. Instagram Has four Secret Inbox For Message Requests Bustle. When the collection title descriptive, automatically checked against this! Tap next step is visiting, check pending requests instagram has not. Accedere al sito Web in italiano? For instance, after you journey a partnership with gym, so you already beginning their rights. To dwell more information on these roles check will this lever on permissions. Next time i check the request access to sign using custom site and share it possible to stalk instagram login error occurred while processing this is.