Risk

12/17/2009
05:09 PM
50%
50%

Privacy Group Files Complaint To FTC About Facebook

Recent changes will make too much user information available to the public, maintains the Electronic Privacy Information Center

A group that advocates Internet privacy has filed a formal complaint with the Federal Trade Commission over Facebook's decision to open more of its members' information to public view unless they actively take steps to limit their data's exposure.

"More than 100 million people in the United States subscribe to the Facebook service. The company should not be allowed to turn down the privacy dial on so many American consumers," said Marc Rotenberg, executive director of the Electronic Privacy Information Center, in a statement.

Rotenberg said the changes will make too much user information available to the public, and also to third-party application developers that create games, contests, and other programs for Facebook.

In filing the case, EPIC said it received support from the American Library Association, the Center for Digital Democracy, the Consumer Federation of America, Patient Privacy Rights, and other advocacy groups.

Users' biggest complaint about the changes is that the default privacy setting on Facebook now opens their status updates to the entire Web, unless they proactively takes steps to modify the settings.

Facebook claimed Wednesday that it's implementing the changes in an effort to make it easier for members to control who can see which pieces of information they post.

"Facebook is transforming the world's ability to control its information online by empowering more than 350 million people to personalize the audience for each piece of content they share," said Facebook communications VP Elliot Schrage, in a statement.

Facebook added a tool that lets users select privacy settings for literally each post they place on the social networking site. Via a new dropdown menu, users can specify whether the post should be made to the general public, all their Facebook friends, or a list of particular friends, family members, or work colleagues.

Facebook also launched a "transition tool" to guide members through the new settings.

Additionally, Facebook is eliminating regional networks—user groups that allow members within a given geographical region to automatically share content with other network members. Facebook operates such networks around the world, including far-flung areas like India and China.

Facebook founder Mark Zuckerberg has said the regional networks are becoming too large to ensure members' privacy.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Robert Lemos, Technology Journalist/Data Researcher,  4/19/2019
Tips for the Aftermath of a Cyberattack
Kelly Sheridan, Staff Editor, Dark Reading,  4/17/2019
Why We Need a 'Cleaner Internet'
Darren Anstee, Chief Technology Officer at Arbor Networks,  4/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-11486
PUBLISHED: 2019-04-23
The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions.
CVE-2019-11487
PUBLISHED: 2019-04-23
The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hu...
CVE-2018-7576
PUBLISHED: 2019-04-23
Google TensorFlow 1.6.x and earlier is affected by: Null Pointer Dereference. The type of exploitation is: context-dependent.
CVE-2018-8825
PUBLISHED: 2019-04-23
Google TensorFlow 1.7 and below is affected by: Buffer Overflow. The impact is: execute arbitrary code (local).
CVE-2019-10688
PUBLISHED: 2019-04-23
VVX products using UCS software version 5.8.0 and earlier with Better Together over Ethernet Connector (BToE) application version 3.8.0 and earlier uses hard-coded credentials to establish a connection between the host application and device.