Feeds

Facebook in futile attempt to block perverts from Graph Searching for teens

Flawed system relies on kids - and adults - being honest about their age

Maximizing your infrastructure through virtualization

Facebook has attempted to flatten fears about perverts using the company's Graph Search function to prey on teenagers on the network, by saying that controls would be in place to protect young people.

The Graph Search feature, which is currently in beta, was announced by Facebook in January. It is only available to a small number of people using the English (US) version of the site.

However, concerns have already been raised about the possibility of adults being able to search for teenagers studying at a specific school, for example.

For that reason, Facebook has explained how the service would work for youngsters using the network.

As with all of our products, we designed Graph Search to take into account the unique needs of teens on Facebook. On Facebook, many things teens are likely to do - such as adding information to their timelines or sharing status updates - can only be shared with a maximum of Friends of Friends.

In addition, for certain searches that could help to identify a young person by age or by their location, results will only show to that person's Friends, or Friends of Friends who are also between the age of 13-17.

Arguably though, there is a major flaw within those perceived safeguards.

Facebook openly admits that it can't always be certain someone is the age they say they are. Policing the identities of 1 billion people online is a massive task and not one that is actually enforced by Facebook, given that it doesn't request - for example - copies of someone's passport or driving licence when they sign up to the site.

In other words, there are no controls in place to prevent a male adult from claiming to be a 14-year-old girl who attends a local school. He could then quite easily befriend kids on the network and then use Graph Search for online grooming purposes.

Facebook has an age restriction of 13 for the site, but many kids under that age are understood to be connected to the network. All of this makes it even more surprising that Graph Search - which relies heavily on revealing information to friends-of-friends - isn't limited to being an adults-only playpen. ®

Seven Steps to Software Security

More from The Register

next story
Whoah! How many Google Play apps want to read your texts?
Google's app permissions far too lax – security firm survey
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
Do YOU work at Microsoft? Um. Are you SURE about that?
Nokia and marketing types first to get the bullet, says report
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Big Blue Apple: IBM to sell iPads, iPhones to enterprises
iOS/2 gear loaded with apps for big biz ... uh oh BlackBerry
OpenWRT gets native IPv6 slurping in major refresh
Also faster init and a new packages system
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.