Feeds

Facebook defends teen security tricks

No change is good

Providing a secure and efficient Helpdesk

RSA Facebook has defended its privacy protection despite the possibility that this has been circumvented for the first time by an alleged sexual predator.

The teen-tastic site's chief privacy officer Chris Kelly told security experts Facebook offers a robust system to protect identities of its 16 million participants and to exclude pedophiles. Facebook uses a combination of algorithms to spot dodgy traffic with "real-world" social techniques.

He rejected employing technology such Zephyr at MySpace, which enables parents to track their children's name, age and sites visited in MySpace, and objected to emailing Facebook participants about potential dangers online and safety steps as tantamount to spam.

Kelly, speaking during an RSA Conference panel on youth and the internet, offered his re-assurances despite an Illinois man having been arrested the day before for allegedly using Facebook to lure a 15-year-old boy while posing as a teenage girl. He told the Chicago Tribune this was the first time Facebook has been used to contact a minor for predatory reasons

Facebook, of course, made its mark as a network for college students, with participants using university-based email address to access the service.

The site is broadening its catchment pool to include school kids. As most schools don't offer pupils email networks, Facebook has introduced a system where new members can be invited to join - presumably by other students.

Highlighting this system's inherent weakness in keeping out adults, Kelly suggested one way for anxious parents to keep an eye on their teens would be to get their own Facebook profile and "befriend" their child online.

But reports that one in seven children are sexually propositioned online has now propelled politicians to act on social networking sites. Bi-partisan legislation was last week introduced by senators John McCain and Charles Schumer that would force offenders to submit their email addresses and online identities and that would allow social networking sites and law enforcement to detect screen out sexual predators. Facebook, like MySpace, are backing the Keeping the Internet Devoid of Sexual Predators (KIDS) Act of 2007.

In the meantime, Facebook is working on a set of tips for online safety for use by schools.®

New hybrid storage solutions

More from The Register

next story
Google recommends pronounceable passwords
Super Chrome goes into battle with Mr Mxyzptlk
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
Reddit wipes clean leaked celeb nudie pics, tells users to zip it
Now we've had all THAT TRAFFIC, we 'deplore' this theft
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
TorrentLocker unpicked: Crypto coding shocker defeats extortionists
Lousy XOR opens door into which victims can shove a foot
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.