About Us | Contact Us
View Cart

The Rise of “Shadow Data”

By Vigilize | Monday, October 8, 2018 - Leave a Comment

Even if you haven’t ever used Facebook, your friends and family may have already let them build a profile on you…


An article review.


For this week’s review we had initially planned on using this interesting piece from Brian Krebs, about the dangers of resold personal information ending up in the cloud (and the dark web groups that buy and sell it). However, while we were reading more on the subject we stumbled upon a related article concerning Facebook, and couldn’t pass up the opportunity to talk about it.

Admittedly, the subject of Facebook and its data mining operations is nothing new. In fact, it’s so well known some of our own employees have left the social networking site entirely, and perhaps some of you have as well. For those that have, it may surprise you to learn that not being on Facebook isn’t enough to keep you out of their advertisers’ clutches: you may have already been sold out by your friends or family.

The practice involves “shadow profiles,” which consist of data that is not readily accessible by the user (or non-user). For example, you may not have any phone numbers listed in your profile, but if a friend or relative shares their contacts with the Facebook app and your name and number is on their list, it is added to your shadow profile. You wouldn’t be able to see this data or have it removed, because it’s not part of your profile–it’s part of the other person’s data, technically.

Naturally, Facebook had denied that such “shadow data” could be used to target advertising…that is, until a reporter for Gizmodo proved that the organization was indeed doing just that, targeting a Northwestern University professor whose own office number wasn’t ever associated with his profile. The number was, however, in the reporter’s contacts when they shared them with the Facebook app, and was promptly accessible through the company’s “custom audiences” advertisement targeting feature.

Unfortunately, there isn’t much that can be done at this time regarding this data, though some have questioned whether this could create trouble for Facebook in European Union nations that are covered by the GDPR. For the rest of us, all that can be done at present is to be aware of this practice…and perhaps try to persuade our contacts to be sparing with their sharing.


Original article by Steven Melendez writing for Fast Company.


same_strip_012513


 

Latest News
    Why It Rhymes With SEEM (And its Not the I Before E Rule) Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . It’s the Gestalt. The idea that the whole is greater than the sum of it’s parts. That’s not something that is often brought […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office. Interested in one of ours […]
    Questions about China’s new disclosure laws only highlight the uncertainty about disclosure in general… An article review. China recently made waves in the security world by announcing a new set of data security laws, one of which has added new fuel to a long running debate: how and when should security vulnerabilities be disclosed…and to […]
    Four Conditions … …For Why a Network Can be Anything But a Network! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . I have to admit that infotex is being called into engineering meetings with larger organizations these days that are NOT community based banks.  We […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office. Interested in one of ours […]
    If Zero days need Zero clicks, are there any secure devices in the mix? Tanvee Dhir explores the Pegasus spyware. Another technical post, meant to inspire thought about IT Governance . . . . Introduction Over the past couple of weeks, we have seen multiple stories regarding a powerful piece of spyware called Pegasus sold […]
    Our Lead Non-Technical Auditor takes a look at the new AIO Guidance… Architecture, Infrastructure, and Operations (AIO) is the latest booklet released by the Federal Financial Institutions Examination Council (FFIEC) in their line of  IT Examination Handbooks. It is an update to their 2004 Operations booklet and, as the name implies, expands into the areas […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office. Interested in one of ours […]
    Many organizations still fail to consider the unique risks posed by cloud computing… An article review. Last month thousands of Western Digital MyCloud device owners learned about the risks of cloud-based solutions the hard way: their data had been wiped remotely due to a flaw in the internet-facing component of their external hard drives. While […]
    infotex does not use Kaseya… We are protecting our Clients! Another blog post meant to inspire thought about IT Governance . . . . To all infotex managed security service Clients: As you may be aware there was a large ransomware attack recently that leveraged a remote management tool called Kaseya that is used by many […]