Whispers in the Dark: Analysis of an Anonymous Social Network
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
What Is Gab? a Bastion of Free Speech Or an Alt-Right Echo Chamber?
What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber? Savvas Zannettou Barry Bradlyn Emiliano De Cristofaro Cyprus University of Technology Princeton Center for Theoretical Science University College London [email protected] [email protected] [email protected] Haewoon Kwak Michael Sirivianos Gianluca Stringhini Qatar Computing Research Institute Cyprus University of Technology University College London & Hamad Bin Khalifa University [email protected] [email protected] [email protected] Jeremy Blackburn University of Alabama at Birmingham [email protected] ABSTRACT ACM Reference Format: Over the past few years, a number of new “fringe” communities, Savvas Zannettou, Barry Bradlyn, Emiliano De Cristofaro, Haewoon Kwak, like 4chan or certain subreddits, have gained traction on the Web Michael Sirivianos, Gianluca Stringhini, and Jeremy Blackburn. 2018. What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber?. In WWW at a rapid pace. However, more often than not, little is known about ’18 Companion: The 2018 Web Conference Companion, April 23–27, 2018, Lyon, how they evolve or what kind of activities they attract, despite France. ACM, New York, NY, USA, 8 pages. https://doi.org/10.1145/3184558. recent research has shown that they influence how false informa- 3191531 tion reaches mainstream communities. This motivates the need to monitor these communities and analyze their impact on the Web’s information ecosystem. 1 INTRODUCTION In August 2016, a new social network called Gab was created The Web’s information ecosystem is composed of multiple com- as an alternative to Twitter. -
Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation
Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation vorgelegt von Dipl.-Inform. Sebastian Jürg Göndör geb. in Duisburg von der Fakultät IV – Elektrotechnik und Informatik der Technischen Universität Berlin zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften - Dr.-Ing. - genehmigte Dissertation Promotionsausschuss: Vorsitzender: Prof. Dr. Thomas Magedanz Gutachter: Prof. Dr. Axel Küpper Gutachter: Prof. Dr. Ulrik Schroeder Gutachter: Prof. Dr. Maurizio Marchese Tag der wissenschaftlichen Aussprache: 6. Juni 2018 Berlin 2018 iii A Bill of Rights for Users of the Social Web Authored by Joseph Smarr, Marc Canter, Robert Scoble, and Michael Arrington1 September 4, 2007 Preamble: There are already many who support the ideas laid out in this Bill of Rights, but we are actively seeking to grow the roster of those publicly backing the principles and approaches it outlines. That said, this Bill of Rights is not a document “carved in stone” (or written on paper). It is a blog post, and it is intended to spur conversation and debate, which will naturally lead to tweaks of the language. So, let’s get the dialogue going and get as many of the major stakeholders on board as we can! A Bill of Rights for Users of the Social Web We publicly assert that all users of the social web are entitled to certain fundamental rights, specifically: Ownership of their own personal information, including: • their own profile data • the list of people they are connected to • the activity stream of content they create; • Control of whether and how such personal information is shared with others; and • Freedom to grant persistent access to their personal information to trusted external sites. -
Naval Reserve Command
NAVAL RESERVE OFFICER TRAINING CORPS Military Science –1 (MS-1) COURSE ORIENTATION Training Regulation A. Introduction: The conduct of this training program is embodied under the provisions of RA 9163 and RA 7077 and the following regulations shall be implemented to all students enrolled in the Military Science Training to produce quality enlisted and officer reservists for the AFP Reserve Force. B. Attendance: 1. A minimum attendance of nine (9) training days or eighty percent (80%) of the total number of ROTC training days per semester shall be required to pass the course. 2. Absence from instructions maybe excuse for sickness, injury or other exceptional circumstances. 3. A cadet/ cadette (basic/advance) who incurs an unexcused absence of more than three (3) training days or twenty percent (20%) of the total number of training during the semester shall no longer be made to continue the course during the school year. 4. Three (3) consecutive absences will automatically drop the student from the course. C. Grading: 1. The school year which is divided into two (2) semesters must conform to the school calendar as practicable. 2. Cadets/ cadettes shall be given a final grade for every semester, such grade to be computed based on the following weights: a. Attendance - - - - - - - - - - 30 points b. Military Aptitude - - - - - 30 points c. Subject Proficiency - - - - 40 points 3. Subject proficiency is forty percent (40%) apportioned to the different subjects of a course depending on the relative importance of the subject and the number of hours devoted to it. It is the sum of the weighted grades of all subjects. -
A Close Look at Tinder Bots
A Close Look at Tinder Bots Tahora H. Nazer∗ Fred Morstatter∗ Gareth Tysony Huan Liu∗ Abstract Tinder is a popular dating app that allows users to discover potential dating partners with close geographical proximity. Tinder is the first dating app in several countries and has more than 50 million users. However, many of these users are bots with malicious intent. The first step in dealing with this issue is understanding the characteristics of Tinder bots. Toward this aim, we have proposed a ground truth collection method to acquire bots to study. Our method combines honeypot methods and manual annotation. We find that probing messages is a reliable method to distinguish bots from humans as bots promote malicious URLs and direct users to phishing sites. Our observations on the collected bots show that they are more complex than bots that are studied in other social media sites. Tinder bots have profiles that are very hard to differentiate from normal users. We explore activity and profiles of these bots and report the characteristics that can be used in building a supervised learning approach for bot detection. 1 Introduction Tinder1 is one of the most popular dating applications for Android and iOS mobile phones. Tinder is recognized as the most downloaded app in 18 countries with the biggest app Figure 1: User life-cycle on Tinder. After a user joins Tinder, markets. In several countries including USA, UK, Canada, majority of the time is spent for matching and messaging. and Australia, Tinder is the most popular dating app2. Tinder has more than 50 million users [1] and they spend around 77 is no way to access user profiles unless they are shown by an minutes on it [5] every day. -
DRC Diaspora Programme, DEMAC and GIZ, As Well As Consultations with Diaspora Communities in Europe for Possible Modalities of Diaspora Engagement
DRC DIASPORA PROGRAMME, DEMAC & GIZ’ Recommendations on behalf of diasporas to the Global Compact on Refugees’ Programme of Action Key considerations and recommendations to UNHCR and United Nations’ Member States 1 This paper sets forth joint recommendations of Danish Refugee Council Diaspora Programme, DEMAC (Diaspora Emergency Action and Coordination) and Deutsche Gesellschaft für Internationale Zusammenarbeit (GIZ) GmbH (Sector Project Forced Displacement, on behalf of the German Federal Ministry for Economic Cooperation and Development, BMZ) for the Global Compact on Refugees’ Programme of Action, bringing together perspectives from a humanitarian and a development point of view. It is based on the experiences of DRC Diaspora Programme, DEMAC and GIZ, as well as consultations with diaspora communities in Europe for possible modalities of diaspora engagement. The objective of this paper is to ensure that the voices and perspectives of diaspora organisations will be reflected in the Global Compact on Refugee’s Programme of Action. Diasporas are dispersed collectives residing outside their country of origin who “maintain regular or occasional contacts with what they regard as their homeland and with individuals and groups of the same background residing in other host countries” (Sheffer: 2003, 9-10). Diasporas include first generation emigrants and their descendants, former refugees and asylum seekers. “Diaspora and refugee overlap significantly and are neither linear, nor static categories. The terms “refugee” and “diaspora” are situational identities that overlap and shift over time and depending on context. There is no bright line demarcation”. (Research paper No.278: 2016, UNHCR, 4) DRC, DEMAC and GIZ are focusing in this paper on diaspora organisations which are formally constituted entities comprising diaspora members that operate in their countries of settlement and countries of origin, and may also work in neighbouring (third) countries. -
Dating App 20140708.Key
From ‘Like’ to Love: How Brands Can Woo Users on Messaging and Dating Apps 7/10/14 Dating goes digital The generation accustomed to communicating at all times is coming of age and bringing the same attitude to their romantic lives. ! “ I think in the time I was in a relationship, all dating communication went exclusively to text. You can’t call anybody anymore. If you call someone, they’re like ‘What? Are you on fire? Then quit wasting my time. Text me that [stuff].’” – Aziz Ansari, Comedian Credit: Comedy Central © 2013 IPG Media Lab. Proprietary & Confidential 2 We heart mobile dating apps Online dating services and apps are an increasingly common way to meet potential mates: • 1 in 3 single Americans have used an online dating service • 1 in 6 couples married in the last three years met online ! Graph Sources: marketingland.com/founders-whisper-tinder-75424; www.internetlivestats.com ! ! Sources: www.pewinternet.org/2013/10/21/online-dating-relationships/ cp.match.com/cppp/media/CMB_Study.pdf © 2013 IPG Media Lab. Proprietary & Confidential 3 Dating apps moved to mobile as messaging apps began to proliferate © 2013 IPG Media Lab. Proprietary & Confidential 4 But it’s not just dating apps Dating apps, social networks, and messaging apps are blurring as people seek, create, and document new relationships: • Glimpse connects people based on their Instagram photos • LinkedUp turns the professional site into a dating platform • Kik users share usernames instead of digits on multiple platforms © 2013 IPG Media Lab. Proprietary & Confidential 5 What’s going on here? As we noted in our white paper on Messaging Apps , messaging platforms are fighting for consumers and introducing new features to increase audience engagement. -
Suspect Social Web Sites Tinder – a Photo/ Messaging Dating App For
May 12, 2017 PO Box 190242 ● Boise ID 83719 Suspect Social Web Sites Tinder – A Photo/ Messaging dating app for browsing pictures within a certain-mile radius of user’s location. It can be dangerous for teens to meet up with strangers within their geographic location. Instagram – Lets users snap, edit and share photos as well as 15 second videos publicly or with network of followers. Public Photos is the default setting unless privacy settings are used. Private messaging is also an option through Instagram Direct. Teens can be on lookout for “Likes” or “Comments” as a measure of “success”, self-worth and popularity. Snapchat – Lets users put time limit on photos/ videos sent before disappearing. Teens use to send embarrassing images believing they won’t go public. Persons receiving can take screen shot before image disappears and has also been hacked for recovery purposes. Makes “sexting” seem safe encouraging users to send sexual images; some of which have been used for extortion of sender commonly known as “Sextortion”. Tumblr – Streaming scrapbook of texts, photos, and/or video/audio clip postings. Porn easy to find via raunchy, pornographic images & videos which often also depict violence, self-harm, drug use and offensive language. First profiles are public and viewable by any internet user with subsequent privacy settings only available via awkward workarounds. Posts are often copied and shared. Kik-Messenger – A texting app that allows communication with strangers using their Kikusernames to find people to chat with. Also has a Kikcommunity blog where users can submit photos of themselves and screenshot messages; sometimes displaying user’s full name. -
Introduction to Online Dating
INTRODUCTION TO ONLINE DATING Whatever you’re looking for…it’s out there What is Online Dating Searching for a romantic partner on the Internet via a dedicated website usually with the goal of creating a real-world relationship Other People via their Online Profile You Your Online Profile What is Online Dating 35, doctor, likes outdoors 42, accountant, divorced, plays in a band You 37, fireman, loves to cook Some Numbers Online Dating is a good place to meet people* 2005: 44% 2015: 59% Online dating is the 2nd most common way to meet people** 66% of online dating users have gone on a date with someone they met online* 50% of couples expected to meet online by 2031** *PEW Research **eHarmony Study Pros & Cons Low pressure, not Behind a screen face to face at start May cost money, Time and cost-effective does take time Big pool of users Big pool of users Customize to your taste 3 Types of Dating Sites All-Purpose Phone App (Swipers) Niche Age Match Tinder Race OKCupid Bumble Religion eHarmony Interests Choosing Your Site(s) Cost Depth of profiles User Base Reputation Match.com Well-known, respectable. Largest paid user base in the U.S. In-depth questionnaire takes about 30 minutes to complete Free to join (email) and browse – must subscribe to communicate Match.Com Match.Com Sends you daily “matches” based on profiles Reverse Matching: Search profiles of people who say they are looking for the things in your profile Date Spark: Propose a date idea and see who responds or respond to a proposed idea OKCupid Well-known, large user base Profile is quick to set-up, with additional questions to answer as you see fit. -
Hard-Coded Censorship in Open Source Mastodon Clients — How Free Is Open Source?
Proceedings of the Conference on Technology Ethics 2020 - Tethics 2020 Hard-coded censorship in Open Source Mastodon clients — How Free is Open Source? Long paper Juhani Naskali 0000-0002-7559-2595 Information Systems Science, Turku School of Economics, University of Turku Turku, Finland juhani.naskali@utu.fi Abstract. This article analyses hard-coded domain blocking in open source soft- ware, using the GPL3-licensed Mastodon client Tusky as a case example. First, the question of whether such action is censorship is analysed. Second, the licensing compliance of such action is examined using the applicable open-source software and distribution licenses. Domain blocking is found to be censorship in the literal definition of the word, as well as possibly against some the used Google distribu- tion licenses — though some ambiguity remains, which calls for clarifications in the agreement terms. GPL allows for functionalities that limit the use of the software, as long as end-users are free to edit the source code and use a version of the appli- cation without such limitations. Such software is still open source, but no longer free (as in freedom). A multi-disciplinary ethical examination of domain blocking will be needed to ascertain whether such censorship is ethical, as all censorship is not necessarily wrong. Keywords: open source, FOSS, censorship, domain blocking, licensing terms 1 Introduction New technologies constantly create new challenges. Old laws and policies cannot al- ways predict future possibilities, and sometimes need to be re-examined. Open source software is a licensing method to freely distribute software code, but also an ideology of openness and inclusiveness, especially when it comes to FOSS (Free and Open-source software). -
Murphy V. Twitter, Inc
-1 F I LED 2 San FrancIsco County Superior Court JUN 1 2 2019 3 CLERK iO,R ~HE COURT 4 BY: J,\f,!lt(r).'J.W"--- . }t.I\ _ I, Deputy Clerk ·5 6 7 8 9 SUPERIOR COURT OF THE STATE OF CALIFORNIA 10 COUNTY OF SAN FRANCISCO 11 MEGHAN MURPHY, Case No. CGC-19-573712 12 Plaintiff, ORDER DENYING SPECIAL MOTION 13 TO STRIKE THE COMPLAINTi v. UNDER CALIFORNIA CODE OF 14 CIVIL PROCEDURE SECTIONI425.16 TWITTER, INC., a California corporation; AND SUSTAINING DEMURRER TO 15 TWITTER INTERNATIONAL COMPANY COMPLAINT WITHOUT LEAVE TO an Irish registered company, ' AMEND 16 Defendants. 17 18 19 20 21 22 23 24 25 26 27 28 I I Case No. CGG-19-S73712 ORDER 1 On May 7,2019, the Court heard Defendants Twitter, Inc. and Twitter International " I 2 Company's (together, "Twitter") special motion to strike the complaint under California Gode of 3 Civil Procedure section 425.16 and Defendants' demurrer to the complaint The parties a~eared 4 by their respective counsel of record. This "constitutes the Court's orders on both motions! 5 Factual Allegations of the Complaint 6 Twitter is a private internet communications platform that users can join and use f0r free by I " 7 posting content, limited to a certain number of characters, referred to as "Tweets." Plaintifff : 8 Meghan Murphy is a self-described "feminist writer and journalist" who resides in Vancouver, I I 9 British Columbia, Canada. (Compi. ~~ 5, 20,"70.) She joined the Twitter platform in Apq12011, 10 and used it to "disCuss news.~orth~ events and public ~ssues, ~hare ~c~es, podcasts and 1ideos,. -
The Many Shades of Anonymity: Characterizing Anonymous Social Media Content
Proceedings of the Ninth International AAAI Conference on Web and Social Media The Many Shades of Anonymity: Characterizing Anonymous Social Media Content Denzil Correay, Leandro Araújo Silvaz, Mainack Mondaly, Fabrício Benevenutoz, Krishna P. Gummadiy y Max Planck Institute for Software Systems (MPI-SWS), Germany z Federal University of Minas Gerais (UFMG), Brazil Abstract While anonymous online forums have been in existence since the early days of the Internet, in the past, such forums Recently, there has been a significant increase in the popu- larity of anonymous social media sites like Whisper and Se- were often devoted to certain sensitive topics or issues. In cret. Unlike traditional social media sites like Facebook and addition, its user population was relatively small and limited Twitter, posts on anonymous social media sites are not as- to technically sophisticated users with specific concerns or sociated with well-defined user identities or profiles. In this requirements to be anonymous. On the other hand, anony- study, our goals are two-fold: (i) to understand the nature mous social media sites like Whisper1 and Secret2 provide a (sensitivity, types) of content posted on anonymous social generic and easy-to-use platform for lay users to post their media sites and (ii) to investigate the differences between thoughts in relative anonymity. Thus, the advent and rapidly content posted on anonymous and non-anonymous social me- growing adoption of these sites provide us with an oppor- dia sites like Twitter. To this end, we gather and analyze ex- tunity for the first time to investigate how large user popu- tensive content traces from Whisper (anonymous) and Twitter lations make use of an anonymous public platform to post (non-anonymous) social media sites. -
Some Mobile Apps Add Anonymity to Social Networking
Log in / Create an account Search Subscribe Topics+ The Download Magazine Events More+ Connectivity Some Mobile Apps Add Anonymity to Social Networking Social-networking apps that eschew real names are gaining ground. by Rachel Metz February 6, 2014 On social networks like Facebook, Twitter, and LinkedIn, most people do not communicate freely, for fear of the repercussions. For just over a decade, Facebook has enforced the idea of an authentic online identity tied to each user of a social network. This might be fine for sharing news of a promotion or new baby with friends, but sometimes you’d probably like to post a status update that won’t go on your permanent record. This urge might explain why millions of people, many of them under the age of 25, are flocking to a free smartphone app called Whisper, which lets you share thoughts—a few lines of text set against a background image—without adding your real name. Secret, a newer free app for the iPhone that shares posts anonymously through your existing social networks, is based on the same idea. After years spent filling social networks like Facebook and Twitter with the minutiae of our lives, we’ve left permanent, heavily curated trails of personal data in our wake—over 1.2 billion of them on Facebook alone, judging by its user count. New apps allow us to continue being social without worrying about the repercussions of sharing the most personal confessions. “Facebook is more like the global social network; it’s like our communication layer to the world,” says Anthony Rotolo, an assistant professor at Syracuse University, who studies social networks.