Risk
10/29/2010
07:15 PM
Connect Directly
RSS
E-Mail
50%
50%

Facebook Launches Friendship Pages, Raises Privacy Concerns

The new feature can show the relationship between two Facebook friends through the public information they've shared between each other through Wall posts, photos and more.

Facebook has raised privacy concerns again among some users by launching a feature that can show the relationship between two friends through the public information they've shared between each other.

Called "Friendship Pages," the feature, which is being rolled out gradually, would be accessible through a link under relevant Wall posts, relationship stories and the main photo on a person's profile page. Clicking the link would launch a standalone page that would include public Wall posts between the two people, photos in which both are tagged, events they have RSVP'd for together, mutual friends and mutual "likes."

Friendship Pages could only be retrieved by someone who is a friend with at least one of the two people and who has permission to view both their profiles. "When it's between two people who share a lot, the page really starts to reflect their friendship," Wayne Kao, the Facebook software engineer who developed the feature, said on the company's blog Thursday.

The new feature did draw concerns from some Facebook users. "While I'm all for innovation, privacy should come first," Rob Ahnemann, said on the comments section of Kao's blog. "If you introduce a new feature, notify the community when it arrives. (And) give a clear opt-in or opt-out button."

Others, however, felt the privacy concerns were overblown. "If you don't appreciate new applications because you perceive them a threat to the privacy of your golden gem of a Facebook profile, you are free to leave Facebook and no one will miss you," Amanda Meyer said.

Nearly every feature Facebook introduces is looked at through the privacy prism. Because Facebook's business is about helping people communicate, plan get-togethers and share photos and video of friends and family, the site cannot ignore the impact any new feature will have on privacy. Facebook's record on privacy is spotty and concerns over the handling of its 500 million users' personal information is under scrutiny by Congress.

To avoid having personal information seen by strangers or acquaintances, Facebook users need to carefully choose the people they allow into their social network, Augie Ray, analyst for Forrester Research, told InformationWeek. "Whom you follow and whom you friend are part of the privacy equation."

SEE ALSO:

Facebook Places A Bet Against Google

Facebook Places Privacy First

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.