Feeds

Facebook to encrypt user IDs to block 'inadvertent sharing'

Nobody pimps our bitches but us

Seven Steps to Software Security

Facebook has introduced plans to encrypt user IDs in a move seemingly designed to placate critics following recent privacy kerfuffles.

The social network prohibits the sharing of user IDs with data brokers in its privacy policies. However, the Wall Street Journal reported earlier this week that personally identifiable information was shared by developers of some of the most popular applications on Facebook, such as FarmVille and Texas Hold 'Em, despite this policy. The story broke just as US politicians are considering a potential Congressional inquiry into Facebook, so the timing could hardly be worse for the social network, ReadWriteWeb reports.

This is also bad news for Zynga, maker of six of the top 10 Facebook games. The game developer has been hit by a federal lawsuit accusing it of pimping Facebook user IDs to advertisers and data brokers.

The actual harm that might be done if a user's Facebook ID is exposed is debatable. Nonetheless, Facebook has responded to a further round of adverse publicity over its privacy policies by introducing a proposal to encrypt user ID information in URLs.

The social network said the approach addresses Facebook's end of a wider industry problem and prevents the accidental disclosure of user IDs by developers. "While this proposal will address the inadvertent sharing of this information on Facebook, the underlying issue of data sharing via HTTP headers is a web-wide problem," it said.

Facebook wants to offer parameter encryption as an option to developers over the next few weeks, before bundling the technology in its software development kits. The social network said it wanted to work with the web standards community and browser vendors in developing a more compressive approach to tacking the issue.

Parameter encryption, assuming it is widely accepted by developers, might make it trickier to track the activities of users on Facebook by the likes of intelligence agencies (irrespective of whether they do this with a warrant or not), something that might put a spanner in the works of Facebook's cunning plan.

Whether or not the plan comes together in its present form, it is wise to remember that user data is the product Facebook sells to its real customers, advertisers. As such, the company will always be pushing users to open up more and share information - because that is what adds value to the data on its books. ®

Mobile application security vulnerability report

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.