Feeds

Facebook to encrypt user IDs to block 'inadvertent sharing'

Nobody pimps our bitches but us

Boost IT visibility and business value

Facebook has introduced plans to encrypt user IDs in a move seemingly designed to placate critics following recent privacy kerfuffles.

The social network prohibits the sharing of user IDs with data brokers in its privacy policies. However, the Wall Street Journal reported earlier this week that personally identifiable information was shared by developers of some of the most popular applications on Facebook, such as FarmVille and Texas Hold 'Em, despite this policy. The story broke just as US politicians are considering a potential Congressional inquiry into Facebook, so the timing could hardly be worse for the social network, ReadWriteWeb reports.

This is also bad news for Zynga, maker of six of the top 10 Facebook games. The game developer has been hit by a federal lawsuit accusing it of pimping Facebook user IDs to advertisers and data brokers.

The actual harm that might be done if a user's Facebook ID is exposed is debatable. Nonetheless, Facebook has responded to a further round of adverse publicity over its privacy policies by introducing a proposal to encrypt user ID information in URLs.

The social network said the approach addresses Facebook's end of a wider industry problem and prevents the accidental disclosure of user IDs by developers. "While this proposal will address the inadvertent sharing of this information on Facebook, the underlying issue of data sharing via HTTP headers is a web-wide problem," it said.

Facebook wants to offer parameter encryption as an option to developers over the next few weeks, before bundling the technology in its software development kits. The social network said it wanted to work with the web standards community and browser vendors in developing a more compressive approach to tacking the issue.

Parameter encryption, assuming it is widely accepted by developers, might make it trickier to track the activities of users on Facebook by the likes of intelligence agencies (irrespective of whether they do this with a warrant or not), something that might put a spanner in the works of Facebook's cunning plan.

Whether or not the plan comes together in its present form, it is wise to remember that user data is the product Facebook sells to its real customers, advertisers. As such, the company will always be pushing users to open up more and share information - because that is what adds value to the data on its books. ®

Gartner critical capabilities for enterprise endpoint backup

More from The Register

next story
Microsoft: We plan to CLEAN UP this here Windows Store town
Paid-for apps that provide free downloads? Really
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Hear ye, young cyber warriors of the realm: GCHQ wants you
Get involved, get a job and then never discuss work ever again
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
BYOD's dark side: Data protection
An endpoint data protection solution that adds value to the user and the organization so it can protect itself from data loss as well as leverage corporate data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?