{"id":107261,"date":"2009-12-28T02:13:14","date_gmt":"2009-12-28T07:13:14","guid":{"rendered":"http:\/\/www.stoth.com\/2009\/12\/28\/privacy-theater-why-social-networks-only-pretend-to-protect-you\/"},"modified":"2009-12-28T02:13:14","modified_gmt":"2009-12-28T07:13:14","slug":"privacy-theater-why-social-networks-only-pretend-to-protect-you","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/107261","title":{"rendered":"Privacy Theater: Why Social Networks Only Pretend To Protect You"},"content":{"rendered":"<p><\/p>\n<p><img decoding=\"async\" class=\"shot2\" src=\"http:\/\/www.stoth.com\/wp-content\/plugins\/wp-o-matic\/cache\/94fa9_Theatershadows.jpg\" alt=\"\" \/><\/p>\n<p><em><strong>Editor&#8217;s note<\/strong>: The following guest post was written by <a href=\"http:\/\/www.crunchbase.com\/person\/rohit-khare\">Rohit Khare<\/a>, the co-founder of <a href=\"http:\/\/www.angstro.com\/\">Angstro<\/a>.  Building his latest project, <a href=\"http:\/\/www.techcrunch.com\/2009\/11\/20\/knx-to-is-your-social-graph-and-address-book-rolled-into-one\/\">social address book Knx.to<\/a>, gives him a deep familiarity with the privacy policies of all the major social networks.<\/em><\/p>\n<p>I\u2019d be wishing everyone a happier New Year if it were easier to mail out greeting cards to friends on Facebook and colleagues on LinkedIn. I\u2019d like to use <a href=\"http:\/\/knx.to\/\">knx.to<\/a>, our free, real-time social address book, but their \u2018privacy\u2019 policies prevent us from downloading contact information, even for my own friends.<\/p>\n<p>At least those Terms of Service (<a href=\"http:\/\/www.foxnews.com\/story\/0,2933,496766,00.html\">ToS<\/a>) that force us to copy addresses and phone numbers one-by-one also prevent scoundrels from stealing our identity; reselling our friends to marketers; and linking our life online to the real world. Right?<\/p>\n<p><em>Wrong<\/em>. When RockYou can stash <a href=\"http:\/\/www.techcrunch.com\/2009\/12\/14\/rockyou-hack-security-myspace-facebook-passwords\/\">32 million passwords<\/a> in the clear; when RapLeaf can index <a href=\"http:\/\/blog.rapleaf.com\/database-milestones\/\">600 million<\/a> email accounts; and when Intelius can <a href=\"http:\/\/www.ft.com\/cms\/s\/0\/79f55d18-d862-11de-b63a-00144feabdc0.html\">go public<\/a> by <a href=\"http:\/\/www.techcrunch.com\/2009\/04\/29\/spock-and-intelius-uh-oh\/\">buying<\/a> <a href=\"http:\/\/venturebeat.com\/2006\/10\/31\/spock-offers-an-ambitious-people-search-engine\/\">100 million<\/a> profile pages; then our social networks have traded away our privacy for mere <a href=\"http:\/\/www.techdirt.com\/blog.php?tag=privacy+theater\">\u201cprivacy theater.\u201d<\/a><\/p>\n<p>With apologies to <a href=\"http:\/\/en.wikipedia.org\/wiki\/Bruce_Schneier\">Bruce Schneier\u2019s<\/a> brilliant coinage, \u201c<a href=\"http:\/\/en.wikipedia.org\/wiki\/Security_theater\">security theater\u201d<\/a> (e.g. the <a href=\"http:\/\/jeffreygoldberg.theatlantic.com\/archives\/2009\/12\/more_magical_thinking_from_the.php\">magical thinking<\/a> behind forcing passengers to sit down and shut up for the last hour of international flights), social networks have been dogged by <a href=\"http:\/\/www.time.com\/time\/business\/article\/0,8599,1880376,00.html\">one disaster<\/a> after <a href=\"http:\/\/www.techcrunch.com\/2009\/07\/01\/the-looming-facebook-privacy-fiasco\/\">another<\/a> in 2009 because they pursue policies that provide the \u201cfeeling of improved privacy while doing little or nothing to actually improve privacy.\u201d<\/p>\n<p>As long as the same information that social networks piously prohibit their own customers from using is being bought and sold on the open market by giant marketing companies, social networks are only <em>pretending<\/em> <a href=\"http:\/\/battellemedia.com\/archives\/005076.php\">protect your privacy<\/a>.<\/p>\n<h2>Industrial-Scale Identity Theft<\/h2>\n<p>Last week\u2019s <a href=\"http:\/\/www.techcrunch.com\/2009\/12\/14\/rockyou-hacked\/\">headlines<\/a> brought <a href=\"http:\/\/digital.venturebeat.com\/2009\/12\/15\/rockyou-explains-how-a-hacker-stole-32-million-passwords-and-what-its-doing-about-it\/\">news<\/a> that RockYou had accumulated 32,603,388 identities over the past few years \u2014 and <a href=\"http:\/\/www.theemailadmin.com\/2009\/01\/social-media-company-cant-stop-making-email-blunders\/\">negligently<\/a> stored them in <a href=\"http:\/\/www.techcrunch.com\/2009\/12\/14\/rockyou-hack-security-myspace-facebook-passwords\/\">plaintext<\/a> in an <a href=\"http:\/\/www.net-security.org\/secworld.php?id=8612\">incompetently<\/a> protected database.<\/p>\n<p>RockYou\u2019s <a href=\"http:\/\/www.rockyou.com\/help\/securityMessage.php\">official bluster<\/a> about \u201cillegal intrusion\u201d should fool no one: blaming Imperva, the firm who <a href=\"http:\/\/blog.imperva.com\/2009\/12\/have-a-rockyou-account-better-change-your-password.html\">exposed the flaw<\/a>, or accusing the hacker(s) of being the identity thieves is misdirection: it was actually RockYou who <em>stole<\/em> those credentials, and RockYou should be held to account.<\/p>\n<p>I realize that I\u2019m using the incendiary terms \u201cidentity theft\u201d and \u201cstole,\u201d even though I would agree that users voluntarily consented to type their passwords into RockYou\u2019s forms. I assume that both users and RockYou\u2019s developers actually only intended to share some particular bits of information: a contact list, a user photo, a friend\u2019s gender; but the bottom line is that instead of sharing that specific data, RockYou retained enough secrets to impersonate those users at will.<\/p>\n<ul>\n<li>Don\u2019t blame the victims. Bemoaning the absence of open standards for users to share their own data; or complaining about the weaknesses of users\u2019 password choices is merely changing the subject.<\/li>\n<li>Don\u2019t blame \u201csecurity\u201d technology. More encryption, better encryption, or stronger firewalls would not help, since the default RockYou username in this case was a user\u2019s primary email address. For anyone who chose to use a <a href=\"http:\/\/www.theregister.co.uk\/2009\/12\/17\/rockyou_security_snafu\/\">popular Webmail service<\/a>, that granted access to every other online service they\u2019ve ever used \u2014 because of those ubiquitous \u201cForgot your password?\u201d buttons to email it back to you (just a<a href=\"http:\/\/www.techcrunch.com\/2009\/07\/14\/twitters-ev-confirms-hacker-targeted-personal-accounts-attack-was-highly-distressing\/\">sk Twitter<\/a> how much <a href=\"http:\/\/www.techcrunch.com\/2009\/07\/19\/the-anatomy-of-the-twitter-attack\/\">fun<\/a> that is).<\/li>\n<li>Don\u2019t blame RockYou\u2019s partners, who hosted their widgets. They just wanted to give their users some fancy new slideshows and scoreboards and other features to put on their pages; that shouldn\u2019t have required an all-out war for viral growth that demanded users to log in and advertise their new widgets to all of their friends.<\/li>\n<\/ul>\n<p>The fault, dear Reader, is not in <a href=\"http:\/\/www.enotes.com\/shakespeare-quotes\/fault-dear-brutus-our-stars\">our stars<\/a>; it lies with sites that <a href=\"http:\/\/forbrukerportalen.no\/Artikler\/2009\/social_network-sites_grossly_undermines_users_privacy\">pretend<\/a> to <a href=\"http:\/\/www.facebook.com\/terms.php#Section_4.5\">waive<\/a> <a href=\"http:\/\/www.google.com\/accounts\/TOS#Section_6\">all<\/a> care and duty by idly warning their users <a href=\"http:\/\/www.linkedin.com\/static?key=user_agreement\">not to share<\/a> their account passwords with anyone else.<\/p>\n<p>In the absence of vigorous enforcement of those ToS agreements, any RockYou developer who passed up the opportunity to, say, <a href=\"http:\/\/www.mywot.com\/en\/scorecard\/rockyou.com\/comment-1068361#comment-1068361\">phish<\/a> MySpace passwords was putting their own employer at a disadvantage to any other startup that was willing to race them to the bottom.<\/p>\n<h2>APIs: Automating Privacy Intrusions?<\/h2>\n<p>RockYou minimized the scope of this breach by maintaining that it only affected their \u201clegacy platform\u201d for widgets rather than its larger \u201cpartner applications platforms\u201d that use \u201cindustry standard security protocols.\u201d After all, the advent of social networks\u2019 partner APIs was supposed to make impersonation and scraping obsolete.<\/p>\n<p>Those APIs came with their own new ToS agreements that added new, overlapping, and sometimes-contradictory restrictions as they worked through all of the implications of letting third parties in on the fun. The ACLU released a fun quiz that makes quite clear how much information is at stake, from your hometown to your friends\u2019 sexual orientation.<\/p>\n<p>For example, if you upload a photo of me that I find embarrassing, I could prevent you from tagging me in it, but I can\u2019t forbid you from keeping your own photo online (or keeping it private, <a href=\"http:\/\/www.techcrunch.com\/2009\/03\/20\/facebook-bug-reveals-private-photos-wall-posts\/\">bugs aside<\/a>). I can\u2019t even forbid another friend of ours from caching a copy in his or her browser.<\/p>\n<p>However, the Facebook API ToS can (and does) prevent a third-party application from caching a link to the photo for more than a day (a week on Orkut). Unfortunately, direct links to the photo server didn\u2019t double-check the privacy policy, so a third-party app would be at risk of leaking images users <a href=\"http:\/\/www.itwire.com\/content\/view\/23975\/1231\/1\/1\/\">thought were private<\/a>, unless the developer remembered to make a separate API call every time to re-verify every photo on a page.<\/p>\n<h2>He (or She) Who Must Not Be Named<\/h2>\n<p>In an ideal world, a third party developer shouldn\u2019t have to store any personally-identifiable information (PII). In many jurisdictions, PII is akin to toxic waste, because of the regulatory burdens and civil, even <a href=\"http:\/\/www.sgrlaw.com\/resources\/trust_the_leaders\/leaders_issues\/ttl2\/600\/\">criminal<\/a>, liability for acquiring and disposing of it.<\/p>\n<p>Here again, Facebook is the pacesetter: it\u2019s possible to display \u201cShe liked 7 photos uploaded by Mr. Smith two weeks ago\u201d using little more than a numeric user id. The developer writes a sentence in Facebook Markup Language (FBML), and Facebook\u2019s servers will dynamically substitute the name, gender, item count, and ensure grammatical agreement of pronouns, singular\/plural choices, and time intervals.<\/p>\n<p>OpenSocial gadgets have to copy PII into the browser to format a sentence like that. LinkedIn\u2019s partners even have to copy PII to their own servers, since their Open API is currently incompatible with AJAX authentication.<\/p>\n<p>Even though copying PII is the root of all privacy risks, there are three reasons it can be necessary: latency, history, and agility. Without caches, slow API calls can make an app\u2019s performance suffer. Without archives, analyzing only the most recent events can mislead an app\u2019s trend detection or recommendation services. Without \u201coffline\u201d access, waiting for a user to log in again delays an app\u2019s reaction to events in real-time.<\/p>\n<p>There aren\u2019t many technical countermeasures once data has been copied. LinkedIn spent more than a year tinkering with their public API, but the only substantial difference is that it now encrypts every member id with the identity of the developer and application to trace the source of a breach. I applaud them as an industry pioneer \u2014 though they\u2019re so dependent on search-engine optimization that they still include the public numeric ids in the profile page URLs anyway.<\/p>\n<p>Exporting PII with legal strings attached is the best policy we can hope for. While Amazon\u2019s ToS requires its associates to display accurate, <a href=\"https:\/\/affiliate-program.amazon.com\/gp\/advertising\/api\/detail\/agreement.html#Section_n\">up-to-date prices<\/a>, Twitter has only recently realized the implications of <a href=\"http:\/\/www.techcrunch.com\/2009\/10\/24\/twitter-finally-removing-deleted-tweets-from-search-results\/\">searching deleted tweets<\/a> and doesn\u2019t yet <a href=\"https:\/\/twitter.com\/privacy\">oblige<\/a> its <a href=\"https:\/\/twitter.com\/apirules\">API partners<\/a> to update their copies when tweets are deleted or protected.<\/p>\n<h2>Buying Back Your Own Data? Priceless.<\/h2>\n<p>If PII is so hard to protect, then the only way for social networks to protect their users\u2019 privacy must be to prohibit partners from accessing contact information in the first place. I might not be able to export my holiday card mailing list from my favorite social network\u2014 a <a href=\"http:\/\/www.readwriteweb.com\/archives\/linkedin_hits_50_million_users_still_a_roach_motel.php\">roach motel<\/a> for our data \u2014 but giant marketing corporations can buy and sell our private information with impunity.<\/p>\n<p>I could go to Rapleaf right now to buy an analysis of any list of email addresses to learn its makeup by gender, income, residence, and all manner of other demographic data. Who\u2019s to say how short that list could be\u2014it\u2019s a slippery slope from aggregate info to personal info. Or I could shop at one of Intelius\u2019 many <a href=\"http:\/\/forum.abestweb.com\/showthread.php?t=123271\">fronts<\/a> and affiliates who are selling PII explicitly (<a href=\"http:\/\/www.prnewswire.com\/news-releases\/intelius-earns-prestigious-truste-web-privacy-seal-of-approval-69279587.html\">TRUSTe-certified!<\/a>). Or I could barter some of the stray business cards on my desk on Jigsaw to fill in the rest of the puzzle. All of these businesses depend on PII data harvested from social networks.<\/p>\n<p>How is that possible? None of the social networks that we\u2019ve integrated with has an API for reading email addresses \u2014 but all of them have no problem asking you to \u201cInvite your friends!\u201d \u00a0After all, most social networks remain hypocritical enough to phish passwords to other social networks themselves as soon as they ask you to \u201cInvite your friends\u201d for their own viral growth!<\/p>\n<p>Putting aside the hypocrisy of phishing passwords to scrape those friends\u2019 email addresses in the first place, the subtler flaw is that social networks are more than happy to search their member database for those addresses to share a list of suggested friends. That\u2019s how a Rapleaf could take a mailing list, pretend that those are all friends of theirs, and slowly accumulate a \u201creverse phonebook\u201d that maps emails to social network profiles.<\/p>\n<p>Or you could just crawl their websites. Social networks depend on search engines for traffic, so they almost universally have public pages for every member with well-known URLs and directory listings by name for crawlers to index. A <a href=\"http:\/\/www.time.com\/time\/business\/article\/0,8599,1649121,00.html\">mini-boomlet<\/a> in funding &#8220;<a href=\"http:\/\/searchenginewatch.com\/3626678\">people search<\/a>&#8220;\u00a0startups underwrote this massive exercise, but they sold their archives to <a href=\"http:\/\/www.crunchgear.com\/2008\/01\/31\/privacy-alert-intelius-database-could-have-your-cellphone-number\/\">less<\/a>&#8211;<a href=\"http:\/\/www.techflash.com\/seattle\/2009\/11\/intelius_classmates_under_scrutiny_as_marketing_tactics_investigated.html\">than<\/a>&#8211;<a href=\"http:\/\/blogs.seattleweekly.com\/dailyweekly\/2009\/11\/despite_intelius_denial_former.php\">savory<\/a> marketers.<\/p>\n<p>Now, merely indexing public web pages can\u2019t be evil\u2014but reconciling online identities and <a href=\"http:\/\/www.informationweek.com\/news\/internet\/social_network\/showArticle.jhtml?articleID=219401268\">3rd-party advertising<\/a> cookies with real-world credit reports, government records, and other databases can be. Adding in all that information doesn\u2019t increase Mr. Smith\u2019s anonymity; Jeff Jonas has made a small fortune proving that semantic reconciliation dramatically <a href=\"http:\/\/jeffjonas.typepad.com\/jeff_jonas\/2007\/07\/how-to-use-a-gl.html\">collapses uncertainty<\/a>. Just think about combining Spock\u2019s 100M profiles with Intelius\u2019 20B other data points; or Wink\u2019s <a href=\"http:\/\/blog.wink.com\/2007\/wink-people-search-200-million-profiles\/\">200M profile<\/a>s with Reunion MyLife\u2019s <a href=\"http:\/\/www.sfgate.com\/cgi-bin\/article.cgi?f=\/c\/a\/2006\/01\/10\/BAGC5GKONE1.DTL\">34M<\/a> members and 700M records\u2026<\/p>\n<h2>Whose Data Is It, Anyway?<\/h2>\n<p>The philosophical question at hand is what rights do I have in my friends\u2019 information. When I accept a business card from someone I\u2019ve just met, I don\u2019t believe I have the right to re-sell it on <a href=\"http:\/\/www.techcrunch.com\/2009\/12\/20\/the-world-has-changed-is-jigsaw-still-evil\/\">Jigsaw in good conscience<\/a> (they\u2019d disagree <a href=\"http:\/\/about.jigsaw.com\/\">18M<\/a> times). If it\u2019s a colleague\u2019s card, on the other hand, I might take the initiative to forward a new lead, or even buy a gift subscription to a magazine. Does that constitute a violation of their privacy, or spam?<\/p>\n<p>Social networks haven\u2019t let their users make their own decisions on this issue. Through selective enforcement of their policies, some startups get <a href=\"http:\/\/gigaom.com\/2008\/02\/12\/notchup-linkedin-and-the-walled-garden-dilemma\/\">locked out<\/a> while big partners get exemptions. Power.com ended up <a href=\"http:\/\/www.insidefacebook.com\/2009\/01\/02\/facebook-files-suit-against-social-network-aggregator-powercom\/\">in<\/a> (and <a href=\"http:\/\/www.techcrunch.com\/2009\/10\/23\/judge-throws-out-power-coms-countersuit-against-facebook\/\">out<\/a> of) court. Plaxo found out the hard way that they couldn\u2019t <a href=\"http:\/\/scobleizer.com\/2008\/01\/03\/what-i-was-using-to-hit-facebook\/\">assist<\/a> their paying customers to <a href=\"http:\/\/blogs.zdnet.com\/BTL\/?p=7474\">OCR<\/a> Facebook email addresses; or to synchronize with LinkedIn. It says a lot about LinkedIn\u2019s draconian ToS that even with paying customers demanding it, Comcast hasn\u2019t signed up for their API. Even if users manually download their own LinkedIn address books, it won\u2019t even include links back to folks\u2019 <em>public<\/em> profile pages.<\/p>\n<h2>Don\u2019t Accept Incompetence<\/h2>\n<p>I also claim that social networks are engaging in Privacy Theater because there\u2019s no shortage of examples of organizations on the Web that process vast quantities of PII while providing real privacy protection. Do you think that the \u201cbad guys\u201d haven\u2019t gone after Webmail services to phish passwords and harvest contact information? Aren\u2019t e-commerce sites sharing product information and reviews out to legions of affiliates without leaking your purchase history? How long do you think RockYou would have gotten away with it if they were asking for your online banking username instead of your email address?<\/p>\n<p>Social network sites have <a href=\"http:\/\/pocketseo.com\/web-20\/130\">not<\/a> (<a href=\"http:\/\/www.insidefacebook.com\/2008\/09\/12\/facebook-responds-to-recent-wall-post-spam\/\">yet<\/a>) demonstrated the high degree of proactive surveillance and enforcement characteristic of other organizations that deal with PII on the Internet. Users see <a href=\"http:\/\/en.wikipedia.org\/wiki\/Samy_(XSS)\">worms on MySpace<\/a> and <a href=\"http:\/\/www.nytimes.com\/2009\/12\/14\/technology\/internet\/14virus.html\">viruses<\/a> on <a href=\"http:\/\/voices.washingtonpost.com\/securityfix\/2009\/03\/koobface_worm_resurfaces_on_fa.html\">Facebook<\/a>, but not on Hotmail \u2014 because they defend against <a href=\"http:\/\/www.reddit.com\/r\/xss\/comments\/affkd\/rockyoucom_xss\/\">cross-site-scripting attacks<\/a>. Users find <a href=\"http:\/\/securitylabs.websense.com\/content\/Blogs\/3051.aspx\">malware distributed on Slide<\/a>, but not on Wikipedia \u2014 because they filter content aggressively. Users are blocked by <a href=\"http:\/\/www.techcrunch.com\/2009\/08\/07\/geopolitical-attacks-on-twitter-intensified-almost-tenfold-last-night\/\">DDoS attacks<\/a> and <a href=\"http:\/\/www.theregister.co.uk\/2009\/12\/21\/twitter_dns_hack_follow_up\/\">DNS attacks<\/a> on Twitter \u2014 but Amazon stays up because they can react in real-time (<a href=\"http:\/\/www.pcworld.com\/businesscenter\/article\/185458\/ddos_attack_on_dns_hits_amazon_and_others_briefly.html\">mostly<\/a>). How much more quickly do Cease &amp; Desist letters for putting up a fake PayPal logo go out than for impersonating a Facebook Page?<\/p>\n<p>From personal conversations, I\u2019m beginning to wonder if the recent rise of Hadoop is part of the problem, surprisingly. Trying to detect patterns of abusive crawling and suspicious bursts of activity from partner apps by analyzing yesterday\u2019s log files alerts you too late to react. The culture of many social networking websites seems to emphasize page load times (especially after the great Friendster meltdown), which isn\u2019t quite the same as the enterprise IT, networking, and transactional database backgrounds of other leading Web architects. And unlike the formal (and informal) networks of security officials at online financial institutions to track distributed threats, I fear we have little evidence of coordinated responses to privacy threats that correlate identities across social networks.<\/p>\n<p>I have first-hand experience that it takes more time (and more money) to ship applications that comply with social networks\u2019 privacy policies. If we weren\u2019t living with Privacy Theater, that might not have been a wasted investment. Inevitably, Gresham\u2019s Law kicked in, and the good guys are being driven out by the bad guys (<a href=\"http:\/\/librarianbyday.net\/tag\/socialminder\/\">spammy<\/a> apps, <a href=\"http:\/\/www.insidefacebook.com\/2009\/12\/18\/policy-watch-facebook-targets-dubious-subscription-and-download-ads-with-updated-guidelines\/\">scammy<\/a> apps, <a href=\"http:\/\/www.insidefacebook.com\/2007\/08\/12\/platform-updates-facebook-app-co-regs-cracking-down-on-notification-spam\/\">sneaky<\/a> apps, <a href=\"http:\/\/www.insidefacebook.com\/2007\/08\/01\/the-race-to-build-a-platform-within-the-platform-is-on\/\">conniving<\/a> apps).<\/p>\n<h2>Privacy Theater: The Show Must Go On\u2026<\/h2>\n<p>Naturally, I prefer to think of myself as one of the \u2018good guys.\u2019 I prefer to believe that privacy protection is a competitive advantage that users (citizens!) really value. Until this outrageous RockYou breach, I didn\u2019t fully realize how irrelevant that is.<\/p>\n<p>I\u2019d argue that the hapless state of ToS enforcement by the major social network platforms only provides the feeling of improved privacy while doing little or nothing to actually improve privacy: that\u2019s privacy theater.<\/p>\n<p>Unfortunately, that analogy is still unfair: TSA may screen children at the airport, but at least their security theater doesn\u2019t obscure the fact we haven\u2019t had a catastrophic security failure in the US air transportation system (<a href=\"http:\/\/www.nytimes.com\/2009\/12\/26\/us\/26plane.html\">yet<\/a>). Our major social networks\u2019 privacy theater is distracting us from ongoing, large-scale identity theft and misuse of private and personally-identifiable information.<\/p>\n<p>If the industry expects self-regulation to forestall government regulation, well, here\u2019s what I think it would take: An immediate ban on all of RockYou\u2019s applications by all of their partners, pending a public audit of all of their apps. That\u2019s taking a page from the audit provisions of LinkedIn\u2019s ToS and adding sunlight by publishing the results.<\/p>\n<p>Sounds harsh? I thought the market was supposed to provide swifter, surer justice than some pesky regulator with its clunky old notions of due process and presumptions of innocence. API agreements are a private matter between ruthless corporations. Heck, if they really wanted to put the rest of the ecosystem on notice, they ought to audit every application funded by Sequoia, Partech, DCM, and Softbank, all lead investors in RockYou.<\/p>\n<p>It\u2019s not like <a href=\"http:\/\/news.cnet.com\/8301-27080_3-10416265-245.html?part=rss&amp;subj=news&amp;tag=2547-1_3-0-20\">lawsuits<\/a> are being filed, as Marissa Mayer announced by going after work-from-home scam artists in an <a href=\"http:\/\/digital.venturebeat.com\/2009\/12\/09\/le-web-q-a-with-google-vp-marissa-mayer-on-the-future-of-search\/\">interview<\/a> with Mike Arrington at LeWeb. It\u2019s not like this is Scamville 2.0, since this isn\u2019t stealing users\u2019 cash, only their dignity. It\u2019s not like there\u2019s a <a href=\"http:\/\/news.cnet.com\/8301-13577_3-10417934-36.html?tag=mncol;mlt_related\">legal spotligh<\/a>t on the issue, since there\u2019s only $9M set aside for a hazy new privacy foundation in the latest Facebook class-action settlement. It\u2019s not like it\u2019s a political issue in the headlines, since a Facebook Chief Privacy Officer is <a href=\"http:\/\/www.kelly2010.com\/\">running for Attorney General<\/a>, the top law-enforcement office in California. It\u2019s not like it\u2019s as complicated as \u201cdon\u2019t be evil,\u201d since I can give you one simple tip to eliminate privacy theater: enforce your ToS and obey others\u2019 ToS \u2014 or else stop setting unrealistic expectations and just let users have their data back!<\/p>\n<p><em>(Photo credit: Flickr\/<a href=\"http:\/\/www.flickr.com\/photos\/faceme\/1669091688\/\">FaceMePLS<\/a>).<\/em><\/p>\n<p><strong><em>Crunch Network<\/em><\/strong>:  <a href=\"http:\/\/www.mobilecrunch.com\/\">MobileCrunch<\/a><em> <\/em>Mobile Gadgets and Applications, Delivered Daily.<\/p>\n<p><a href=\"http:\/\/feedads.g.doubleclick.net\/~at\/CgmE-yqeK5ZViHCV7LWogeeHxjA\/0\/da\"><img decoding=\"async\" src=\"http:\/\/www.stoth.com\/wp-content\/plugins\/wp-o-matic\/cache\/94fa9_di\" border=\"0\"><\/img><\/a><br \/>\n<a href=\"http:\/\/feedads.g.doubleclick.net\/~at\/CgmE-yqeK5ZViHCV7LWogeeHxjA\/1\/da\"><img decoding=\"async\" src=\"http:\/\/www.stoth.com\/wp-content\/plugins\/wp-o-matic\/cache\/94fa9_di\" border=\"0\"><\/img><\/a><\/p>\n<div>\n<a href=\"http:\/\/feeds.feedburner.com\/~ff\/Techcrunch?a=STOswiGeL0o:EKDcm3jYdFI:2mJPEYqXBVI\"><img decoding=\"async\" src=\"http:\/\/www.stoth.com\/wp-content\/plugins\/wp-o-matic\/cache\/94fa9_Techcrunch?d=2mJPEYqXBVI\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/Techcrunch?a=STOswiGeL0o:EKDcm3jYdFI:dnMXMwOfBR0\"><img decoding=\"async\" src=\"http:\/\/www.stoth.com\/wp-content\/plugins\/wp-o-matic\/cache\/94fa9_Techcrunch?d=dnMXMwOfBR0\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/Techcrunch?a=STOswiGeL0o:EKDcm3jYdFI:D7DqB2pKExk\"><img decoding=\"async\" src=\"http:\/\/www.stoth.com\/wp-content\/plugins\/wp-o-matic\/cache\/94fa9_Techcrunch?i=STOswiGeL0o:EKDcm3jYdFI:D7DqB2pKExk\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/Techcrunch?a=STOswiGeL0o:EKDcm3jYdFI:7Q72WNTAKBA\"><img decoding=\"async\" src=\"http:\/\/www.stoth.com\/wp-content\/plugins\/wp-o-matic\/cache\/0b9e1_Techcrunch?d=7Q72WNTAKBA\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/Techcrunch?a=STOswiGeL0o:EKDcm3jYdFI:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/www.stoth.com\/wp-content\/plugins\/wp-o-matic\/cache\/0b9e1_Techcrunch?d=yIl2AUoC8zA\" border=\"0\"><\/img><\/a>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.stoth.com\/wp-content\/plugins\/wp-o-matic\/cache\/0b9e1_STOswiGeL0o\" height=\"1\" width=\"1\" \/> <\/p>\n<p>Buy This Item: <a class=\"buy\" href=\"http:\/\/www.stoth.com\/buy.php\" ><span style=\"color: #33bc03\">[Click here to buy this item]<\/span><\/a><\/p>\n<p><a href=\"http:\/\/feedproxy.google.com\/~r\/Techcrunch\/~3\/STOswiGeL0o\/\" >Read Original Article<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Editor&#8217;s note: The following guest post was written by Rohit Khare, the co-founder of Angstro. Building his latest project, social address book Knx.to, gives him a deep familiarity with the privacy policies of all the major social networks. I\u2019d be wishing everyone a happier New Year if it were easier to mail out greeting cards [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-107261","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/107261","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=107261"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/107261\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=107261"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=107261"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=107261"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}