Feeds

Please don't leave me... bitch

Breaking up with Facebook is (less) hard to do

The Power of One eBook: Top reasons to choose HP BladeSystem

It was a long time coming but the web's favourite has-been-in-the-making, Facebook, has finally agreed to let users who are bored with it wrest their personal information from its advertising salesmens' clutches.

Facebook made a botched attempt at unlocking the prison gates last week, after the New York Times deigned to notice its infamous Hotel California data policy. Refugees from the social network at first found parts of their profile were still available, despite a newly-added option to delete it all.

Over the weekend, spinners for the company said it had ironed out technical problems, and promised that it's now possible and simple to commit Facebook suicide without leaving a pickled cadaver of personal information.

The method is still well-hidden and comes across as slightly petulant. To quit Facebook you have to fill in this form - there's a group explaining the process here.

Since Facebook's inception in 2005 contact information, photographs, and all other account details were retained in its enormous targeting database when people tried to leave. Facebook always said the "deactivation" policy was in place for users' benefit in case they changed their oh-so fickle minds and realised that they absolutely must be part of the revolution in online Tupperware-party-style marketing.

As the site took hold in the mainstream last year this ludicrous position raised eyebrows with the Information Commissioner's Office, the UK privacy watchdog. Today the ICO told the Reg its investigation is ongoing.

Facebook's hypocrisy on data was highlighted in December when its 23-year-old founder Mark "I'm CEO... bitch" Zuckerberg went to court in a failed attempt to silence a magazine that had published personal details from his days at Harvard online.

Now that it has accepted that stripping people of ownership of their family photographs in perpetuity isn't a PR winner, the worry for Facebook now must be that too many people notice.

It was the unquestioning bovine herd-brain in all of us that fired its explosive growth, with millions powerless to resist invitations from their "friends". Again it's this inner teenager that Facebook has been hoping to exploit by not allowing you to delete your account; the invitations keep on coming.

The same process could easily work in reverse, however. It only takes a few buffalo to start a stampede.

In fact, it doesn't even need to be a stampede for Facebook to "jump the shark", as the irritating parlance goes (see also: "Drink the Kool-Aid", a pop culture expression that certainly has jumped the shark), and head the same way as Friendster (an early web 2.0 darling, now rarely spoken of) before it.

Designing a Defense for Mobile Applications

Next page: Alarm bells

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.