Feeds

Facebook in futile attempt to block perverts from Graph Searching for teens

Flawed system relies on kids - and adults - being honest about their age

Secure remote control for conventional and virtual desktops

Facebook has attempted to flatten fears about perverts using the company's Graph Search function to prey on teenagers on the network, by saying that controls would be in place to protect young people.

The Graph Search feature, which is currently in beta, was announced by Facebook in January. It is only available to a small number of people using the English (US) version of the site.

However, concerns have already been raised about the possibility of adults being able to search for teenagers studying at a specific school, for example.

For that reason, Facebook has explained how the service would work for youngsters using the network.

As with all of our products, we designed Graph Search to take into account the unique needs of teens on Facebook. On Facebook, many things teens are likely to do - such as adding information to their timelines or sharing status updates - can only be shared with a maximum of Friends of Friends.

In addition, for certain searches that could help to identify a young person by age or by their location, results will only show to that person's Friends, or Friends of Friends who are also between the age of 13-17.

Arguably though, there is a major flaw within those perceived safeguards.

Facebook openly admits that it can't always be certain someone is the age they say they are. Policing the identities of 1 billion people online is a massive task and not one that is actually enforced by Facebook, given that it doesn't request - for example - copies of someone's passport or driving licence when they sign up to the site.

In other words, there are no controls in place to prevent a male adult from claiming to be a 14-year-old girl who attends a local school. He could then quite easily befriend kids on the network and then use Graph Search for online grooming purposes.

Facebook has an age restriction of 13 for the site, but many kids under that age are understood to be connected to the network. All of this makes it even more surprising that Graph Search - which relies heavily on revealing information to friends-of-friends - isn't limited to being an adults-only playpen. ®

Security for virtualized datacentres

More from The Register

next story
Netscape Navigator - the browser that started it all - turns 20
It was 20 years ago today, Marc Andreeesen taught the band to play
Sway: Microsoft's new Office app doesn't have an Undo function
Content aggregation, meet the workplace ... oh
Sign off my IT project or I’ll PHONE your MUM
Honestly, it’s a piece of piss
Return of the Jedi – Apache reclaims web server crown
.london, .hamburg and .公司 - that's .com in Chinese - storm the web server charts
NetWare sales revive in China thanks to that man Snowden
If it ain't Microsoft, it's in fashion behind the Great Firewall
Chrome 38's new HTML tag support makes fatties FIT and SKINNIER
First browser to protect networks' bandwith using official spec
Admins! Never mind POODLE, there're NEW OpenSSL bugs to splat
Four new patches for open-source crypto libraries
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.