1
2
3
4
5
It is the first responsibility of every citizen to question authority. – Benjamin Franklin
6
7
“provide you” “Our automated systems analyze your content (including emails) to provide you personally relevant product features, such as customized search results, tailored advertising, and spam and malware detection,”
“We want our policies to be simple and easy for users to understand,” “simple and easy”
8
Foreword Internet privacy involves the right or mandate of personal privacy concerning the storing, re-purposing, provision to third parties, and displaying of information pertaining to oneself via the Internet. Around December, 2014 Google released the developer version of the Google Inbox app. A user friendly, automated e-mail application that has smart filtering functions and easy to use cataloguing tools for your e-mails. On May 28th, 2015, the app has been released for the public, and as a Gmail user with and awful messy and unsorted inbox, I thought it would be an interesting idea to give it a try. At first, as many other users you have to get used to the new functions, the different layout and go through the settings. Based on my usual attitude towards Terms & Agreements and user interface tutorials, I just clicked accept and skipped the latter. A few weeks later I noticed my phone giving off a notification signal. I had a flight scheduled in a few days to Hungary, and it was warning me to do the web check-in procedure, generated a travelling schedule to the airport, and asked me if it should warn me again a few minutes prior to the time that I had to leave home. All I did was buy the ticket online a few days prior and received a confirmation e-mail in Inbox. The rest has been figured out by the software written by Google. This really made me think about modern applications and technology that is supposed to make our lives easier. Who has the authority, How much are we still in control of our privacy? What are these ‘capitalist giants’ doing with our information?
9
10
11
12
Values I didn’t only look at the way how I have changed and adapted as an internet user, but out of curiosity looked a bit behind the scenes of how secure the internet user’s information is. With my project I want to share with the average consumer my research and also a product which will perhaps shock people into thinking twice about placing an image online, or updating their Facebook status. Therefore my product in the end isn’t something physical, but instead has become the privacy and security that I try to give back to the average user. That I try to make people aware of not to accept our fate that has been made for us by these enormous companies of the 21st Century. During my research I have interviewed and discussed the matter with prof. Dr. D. J. F. Kamann, a professor in the faculty of Economics and Business at the University of Groningen and R&D member of the University of Pannonia in Hungary. The well informed person in economics, and also an average user of the internet and all of what it has to offer like Yahoo, Facebook, Google, aged 68 became the starting point of my target group. I soon came to realize that hearing the knowledge of a computer addict in his twenties—like myself— makes you think very different about social media, email providers and the internet in general. You already have zero privacy. Get over it.
Scott G. McNealy CEO of Sun Microsystems Inc
13
Internet I’m still a Google Inbox user today, even though I am aware of the fact that so called crawling bots are going through every single sentence of my emails looking for information in order to ‘organize’ everything for the better user experience. Googlebots (illustration made by Google on the right) are monitoring 96% of all websites that have a DNS address. “Googlebot’s crawl process begins with a list of web page URLs, generated from previous crawl processes and augmented with Sitemap data provided by webmasters. As Googlebot visits each of these websites it detects links (SRC and HREF) on each page and adds them to its list of pages to crawl. New sites, changes to existing sites, and dead links are noted and used to update the Google index.”
14
Working as an infinitely spreading virus of the internet it is collecting information from websites, so they can appear in the Google search engine. Even though people are mostly aware of this, and the way Google search engine works, it became a bit scary for me at the point where these bots become intelligent, and start filtering and organizing the data. For example when there are bots in your phone monitoring your location. Without myself adding it as a setting on my smartphone ‘it figured’ it out where I live and what my most visited points of interests are. For example my job in The Hague, and the art academy in Rotterdam. It warns me when I have to leave my apartment to get to school on time, and it also warns me when to catch the last subway at 1AM in order to still get home. The only place still secure from any crawlers is the so called deep web. It’s size is estimated to be about 500 times the size of ‘the surface web’. We can only access about 4% of the information stored in databases with the regular use of internet. The reason for this is because most connections in the deep web are a one-way tunnel. There servers are configured to receive only in-bound connections, leaving the address and information of the server anonymous. The deep web can only be accessed through an onion browser, for example Tor browser.
15
Internet Onion browsers are transferring data encapsulated in multiple layers of encryption. The name derives from the layered structure of onions. In order to get to the core of an onion you have to penetrate through all the separate layers. Onion websites are also not accessible through regular DNS (Domain Name System, for example www.abc123.com) names. They can be accessed through so called pseudo-top-level domains, which aren’t participating in- or registered by the Domain Name System. The usual procedure for registering a domain is to buy them from a provider. These domains are unregistered user-generated access keys.
16
Arms Dealer: 2kka4f23pcxgqkpv.onion/ UK Passports: vfqnd6mieccqyiit.onion/ Nordic Scandinavian Porn: xnordic6virmmls3.onion/ Fund the Islamic Struggle: teir4baj5mpvkg5n.onion/ As shown by the examples above the Tor network is also being used as a black market for criminal activities. One of the biggest network called Silk Road (named after the 6000km trade route through Eurasia, the online Silk Road was closed down in 2013, 2014 by the FBI, current version 3.0 is still online) enables the user to get in touch with contract killers, hackers, buy drugs, arms through an almost untraceable connection. Payments are being done with Bitcoin, a virtual currency that is mined by computers by solving equations (image to the right) in giant server halls, the size of multiple class rooms.
17
18
Mr. Dotcom Billionaire and internet activist called Kim Dotcom, nicknamed The Most Wanted Man on the Internet, has been under the spotlight of the more experienced web user. Starting at a very young age, Dotcom was already into scams, breaching into securities and manipulating people. At the age of 20 in 1994, he was arrested for 11 counts of computer fraud, 10 counts of data espionage, and an assortment of other charges. In 2001 he turned a €375,000 investment of shares into €1.5 million in stock by simply manipulating people and giving out false information. Later in 2005 a website called Megaupload appeared. A few years later the file sharing and cloud storage website exploded and had 50 million daily users, with about US$ 175 million in ad revenues. In January 2012 indictments were filed against Megaupload for online piracy, copyright infringement by reason of the website also being used for sharing software, movies, TV shows. All of Dotcom’s assets were frozen and seized by the FBI at the time, and a case costing millions, judged by the supreme court still continues up to this point. But after the Dotcom earned his freedom and assets back he became an internet activist defending the user’s privacy on the internet and the fight against internet censorship. In January 2013 he released a website called mega.co.nz that is an online cloud storage and internet security website for encrypted data transfer, e-mails (that can also self-destruct after reading) in a similar way to the deep web, but without the need of a separate Tor browser.
19
Facebook So I became curious, how safe is the user exactly whilst using Facebook? I already mentioned Google and what they have been doing with the information in their control “Such detailed tracking would have been an impossibility even 10 years ago, and we’re largely clueless as to its effects. This is the core of the main comfort: despite their mountain of data, Google and Facebook seem largely clueless, too” On the 23rd of June out of curiosity I tried out Facebook’s function made available by Facebook to create an offline backup of your profile. I wasn’t only shocked by the sheer amount of data that has been made available by me about myself, but I also noticed a change in pattern, a change in the use of my Facebook.
20
Today I would never post something that I had posted back in 2009, when Facebook was already a popular thing in the US. I have become aware of the ‘Big Brother’ effect of constantly being watched through social media. Not by the FBI, or police or any other organization, but by companies for example. When I have been applying for jobs in the winter of 2014 I noticed that people have started visiting my LinkedIn, my Facebook, my Google+ profiles. I started filtering what I put online and what I allow to be placed on my wall around 2010. Since then I have been blocking people, censoring my images and friends list—categorizing them and only showing posts to a certain few. I also have my profile specifically adjusted that 60% of my content is made public, so in case of a person visiting me without being ‘friends’, they can still view what I have online. It became a marketing tool for me as for some other people I know as well. A social media site that is supposed to be about sharing your own personal life and made to connect with old friends has changed into something else.
21
22
Mr. Andersson But I still needed a Facebook for other activities, for example administering pages that I wouldn’t want to have a connection with. Or just trying out the new functions or apps that have been put online, without it messing up my little ‘project’ of my personal profile. In 2011 is when I opened a new Facebook account under the name of Peter Andersson. (Based on the conversations between Neo and Mr. Smith from the movie The Matrix where Neo was called Mr. Anderson) “In an updated regulatory filing released Wednesday, the social media company said that 8.7 percent of its 955 million monthly active users worldwide are actually duplicate or false accounts.” A total of 83 million fake or undesired accounts. August 3,2012 This persona that I have created now has over 250 people in it’s network. I found it uneasy but at the same time was interested in the power that I haven’t been able to use before on Facebook. Not everybody uses Facebook the way I do, on my actual profile, some people share images of themselves after they left the gym, show wedding photographs, express their political opinion and engage into fiery arguments. I was having fun with the creation of Mr. Anderson, thinking about his personality and engaging him in events and conversations like a normal user would do. And I could sit back anonymously with a bag of popcorn and enjoy the ‘show’. At this time I was only accessing the page through proxy connections so the location that I was connecting from was actually in Michigan, where Mr. Andersson lives. After a while I have used this Facebook account to confront pet profiles with a card game my roommate has made based on them. I found it astonishing that there are actual Facebook profiles that have been made for dogs and cats, and their owner speaks first person in cat or dog language.
23
24
Faceboo The project was called ‘FaceBoo card game’, named after the famous ‘public figure’ pet on Facebook, Boo the dog. But a few other notable characters are Grumpy cat, Moki the Wobbly Cat, Hazel Fluffypants, Ty the Bull Terrier and the list just goes on and on. I have placed my room-mate’s illustrations and the card game on a Facebook page with a description criticizing the mental health and the purpose of their jobs as a full-time pet blogger. But also stating that it is against Facebook’s Terms & Agreements to have Facebook accounts of non-human beings. The page was shared and spread around in the pet Facebook community causing a big stir. The illustrations were based on photographs that were copyrighted material outside of Facebook. But Facebook’s terms state that any information (text, documents, images) placed online, and set to public is under copyright any longer. The owners and supporters of the various pet profiles had tried to pull the page offline by reporting it for copyright infringement, but as we didn’t break the rules of Facebook, and still refused to take any content offline it turned into a series of offensive comments received by the followers and supporters of these pet profiles. Elevating the otherwise dull card game to an interesting social experiment.
25
When administering the page you can decide whether to post under the Admin’s name, or the page’s. I tried to keep Peter Andersson hidden for as long as I could, but somehow the pet profile fanatics have figured out his identity. This was the point when I realized how valuable this made-up profile was, and that it was a good idea to keep my own identity hidden from these people. The Faceboo Card Game page slowly fading away in time, losing likes daily, but still active today even though it had been flagged for copyright infringement on multiple occasions.
26
At this point I started realizing what a valuable profile Peter Andersson actually is. Entire online movements could be started by manipulating social media through fake Facebook accounts, whilst keeping most of your identity hidden. Keep in mind, even if you hide your connection through a proxy, you can be traced down through your internet provider. European law forbids the providers to sell this information, but authorities can ask for a certain person’s online activity in the case of breaking the law, for example online piracy, trading illegal goods. Even through the Tor network. The information I had access to, all the profiles and personal information exposed from people suddenly turned into a source of data and inspiration.
“Campaigners estimate that only around 29% of the information Facebook possesses on any given user is accessible through the site’s tools.” The Guardian, 2012
27
Data Mining Here is where my little experiment started whether I could crawl through all of these people’s profiles using a data mining software, similar to Googlebot. Gathering information and turning them into graphs, or downloading images. Facebook allows people to register as developers to create applications and games for Facebook, or integrate Facebook’s functions into a website. After becoming a developer, by following a few step guide you can generate API keys to gain access to data provided by Facebook.
28
Unfortunately Facebook has started closing the doors on data mining information posted by your network—in order to protect the privacy of others—but in reality they started realizing how valuable the information that Facebook owns is, and don’t want to expose it this easily. Based on one of the reports (2012) found on The Guardian, Facebook only gives us access to around 29% of the data generated. The information not shared is based on for example the user experience. Which ads you have clicked on, how much time you spend on Messenger, how much time you look at people’s images etc. Unfortunately now as a developer I would say you only have access to 5% of the data stored on your Facebook due to the recent changes in privacy since 2013 and 2014. And I’m taking the assumption that they are also monitoring what developers do, but in the end; That’s why I have Peter Andersson.
29
I agree After receiving my API token I could access Facebook without having to use the actual website. This provides valuable new options on how you organize and control the data returned from the servers. Usually you are limited to the graphical interface made by the designers of Facebook. They are designed to be used by the Facebook user. But by doing so they also control your actions and make sure you stay on the right path. Using a software called Rgui and a bit of code I started ‘mining’ Facebook for information. As already mentioned before, recent changes to privacy have made accessing Mr. Anderson’s network information harder. For example on the right we see an image prior to 2014 of all Facebook friends, organized into groups based on their current location. The lines are drawn between users that have a mutual connection. Unfortunately for me this image was made prior to the changes by a data mining Facebook user, so I couldn’t try out similar methods as my path had been blocked.
30
The only way applications can access the user’s information now, is by accepting to share the information requested by this application. For example on an Android smartphone if you install an application some of them might require access to your contact’s list. This is valuable information for developer companies because they can then increase their database of information, similar to crawler bots. The developers can then create statistics based on the user group, they can see the percentage of male or female users. They can put all users into tables based on their age.
31
Even though I couldn’t access much information about Peter Andersson’s friend list, pages are still public on Facebook. I first went and searched for the most popular post on the University of Groningen’s Facebook page.
32 After running the first line of the code I get access to the ID of the page, marked by 24135579132. After the ID it records the name of the page, in this case called University of Groningen. Then the message given by the admin, describing an photograph of the university lit at dawn. The command saves the date of creation, and displays a direct link to the posts. In the last line it counts and shows the likes, comments and shares. After this point it is relatively easy to continue with mining to gather even more.
33
34
Out of curiosity I looked at the most and least popular post of the Police in the Netherlands. Data like this for example gives valuable information based on what people are interested in. The most liked and commented post was a 6 year old boy’s application form written to the Police. The least popular post, with only 1 comment and 1 share is about the abuse of a man and a woman in the Sarphatipark in Amsterdam. So our conclusion might be that people would much rather read something funny, instead of crime, on the Police’s Facebook page. Information and patterns of Facebook use can then be exported into Graphs.
35
After this I’ve downloaded T-mobile’s page with more daily users than the University of Groningen and the Police in the Netherlands. I could go back all the way to 2012 and record every single post, look at the comments, likes and shares and place these into a graph. The various phone companies release about 3-4 new devices each year. You can follow the release of each of these devices based on the peaks and lows of this infographic. Also interesting to see that there are nearly twice as many likes as there are comments and shares at each point of this period. Information like this becomes incredibly valuable as a market research for products, release patterns and also to manipulate people into buying and selling habits based on the reports.
36
37
I have also looked into a more popular page amongst teenagers with incredible amounts of daily visitors called 9gag. Even though Facebook is doing their best to keep user information hidden with the new restrictions, you can still for example download all of the profile pictures of the users that have placed a comment, or liked the page. Every single profile’s image can be exported as a Facebook link. Afterwards you can download these profile pictures, generating a demographic database of images.
38
39
As a last step I wanted to expose a bit more information that isn’t related to pages and their profiles, but to Peter Andersson and his connections. In no time I could monitor what is being posted on my wall, and save all the information. Including the person’s name, their Facebook ID, and whether the post was reblogged, and if so where from. On the next few pages I also expose the message added to the shared post, the amount of likes and the information of it being a video, image, or link type share. Similar to Googlebots, a script like this can be run on Facebook for an infinite amount of time. Constantly reading and storing data posted by every user in your Facebook network. You can also post as Peter Andersson through a data mining application, and for example copy the post of another Facebook user creating a fake identity, or posting content through a bot automatically further developing the identity of this person.
40
Unfortunately I’m unable to technically do so, but it would be an incredibly interesting experiment to release a chat bot—a bot that is able to read and respond to text—on Facebook and make it comment and engage in discussions on people’s statuses. Perhaps as a future idea!
50 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50
posts 10204353 368010 175162 10152331 10153464 10204660 10205933 199633 815230 21 1066604 345591 10152370 152523 10205627 407570 10152331 114078 10205066 192565 10203047 114078 10205627 316958 10204353 305 429751 228 10153580 10152370 5 538918 73 10203594 538918 139404 538918 35 10203047 405925 228 5 5 345591 345591 10152334 10152594 10205627 316958 345591
ts from_id from_name to_id to_name 04353004962990 Jordan Dalian <NA> <NA> 68010956582538 Ambika Pillai <NA> <NA> 75162552581735 Bass Fishing Forever <NA> <NA> 52331058668386 Jackie Rambo 10201945735700728 John Kay 53464204108675 Ryan Amin <NA> <NA> 04660931224152 Josh Charles Hulet-raden <NA> <NA> 05933175434080 Brandon Fender <NA> <NA> 99633956730875 Tyrese Gibson <NA> <NA> 15230575206482 James Krogol <NA> <NA> 21105780752 University of Michigan 6711658857 The Ohio State University 66604186686976 Jackie Garlick <NA> <NA> 45591392232989 FOX Sports 1 174420392597431 Alex Morgan 52370025222294 Brandon Eddie Guyton <NA> <NA> 52523378140065 The â&#x20AC;&#x2DC;90s Are All That <NA> <NA> 05627227179408 Kevin Hayter <NA> <NA> 07570359384477 AJ+ <NA> <NA> 52331058668386 Jackie Rambo <NA> <NA> 14078235319234 Nova 919 <NA> <NA> 05066528280425 Keishia Neault <NA> <NA> 92565014125753 Prego & Mommy Chat <NA> <NA> 03047489169109 Victoria Berry 10104650905380153 Josh Wescott 14078235319234 Nova 919 <NA> <NA> 05627227179408 Kevin Hayter 10205963589236658 Kevin Hugh 16958185092603 Adrian Van Oyen <NA> <NA> 41 04353004962990 Jordan Dalian <NA> <NA> 305901075111 Street FX Motorsport & Graphics <NA> <NA> 29751220523642 Alexis Eberlin <NA> <NA> 228735667216 BBC News <NA> <NA> 53580923329474 Jierah Dixon <NA> <NA> 52370025222294 Brandon Eddie Guyton <NA> <NA> 5550296508 CNN 889307941125736 Hillary Clinton 38918066228286 Frederick Warren Carlock <NA> <NA> 73512366273 98.9 The Bear <NA> <NA> 03594116593619 Amanda Baydoun <NA> <NA> 38918066228286 Frederick Warren Carlock <NA> <NA> 39404366247846 Koka official <NA> <NA> 38918066228286 Frederick Warren Carlock <NA> <NA> 35790692776 Paul Wilbur <NA> <NA> 03047489169109 Victoria Berry <NA> <NA> 05925029589162 Playboy Handbook 405925029589162 Playboy Handbook 228735667216 BBC News <NA> <NA> 5550296508 CNN 84249551721 Seattle Seahawks 5550296508 CNN <NA> <NA> 45591392232989 FOX Sports 1 25678641019 Daytona International Speedway 45591392232989 FOX Sports 1 793397234069637 Jenny Taft 52334003163342 Wolf Stansson <NA> <NA> 52594534587449 Eric Bardusch <NA> <NA> 05627227179408 Kevin Hayter 10207603974964248 Mitchell Joseph Spillard 16958185092603 Adrian Van Oyen <NA> <NA> 45591392232989 FOX Sports 1 119746638058715 Austin Dillon
42
1 2 3 4 5 6 7 8 9 10 We’re closing in on The Ohio State Univers 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 “You just feel like your wh 29 30 31 Hillary Clinton tells CNN’s Brianna Keilar she’s “very disappointed 32 33 34 35 36 37 38 39 40 41 42 Seattle Seahawks quarterback Russell Wilson exp 43 “H 44 #NASCAR #RaceHu 45 Jenny Taft introduces the 2015 FIFA Women’s Wo 46 47 48 49 Holy f 50 How exactly did Austin Dillon get into the catch fence at D
I love food tricks Forget what he’s saying... Watch what he’s doing <NA> Gonna have to watch some of these! But without John Kay lol <NA> <NA> <NA> Is this true? lol http://smarturl.it/TyreseBlackRose <NA> iversity in Facebook fans! Help us get there by sharing this photo with your friends! GO BLUE! I’ve thought all of this at one point or another! Miss you girls!! “We’re going to be World Champions...forever.” - Alex Morgan <NA> Kel is coming back to Nickelodeon! Awww, here it goes! Bullshit This police stop in Harlem turned into a fist fight. Haha yessss! Anyone else? <3 Jackson and Lillii <3 Josh Wescott, found it!!! “Do you wanna go for a -” Kevin Hugh A simple message to all the haters Best funny car video hands down lol.. Where are the cool cars.. Can’t believe they got that Challenger on camera <NA> ur whole life is wasted and there’s no closure,” says Emma, who found out her husband was gay. Listen Up! 6AMU...Starting With What You Have <NA> inted” in Donald J. Trump for his comments on immigration. http://cnn.it/1dKrO6f #HillaryonCNN <NA> Watch those tootsie’s hanging out the windows ladies. <U+263A><U+FE0F>I love this, you go girl!!! <NA> <NA> <NA> Please SHARE!\nwww.wilburministries.com <NA> You will never be as confident as this kid dancing to Cuban Pete… Playboy Handbook “Chewie, we’re home...” n explained why he and girlfriend Ciara have chosen to abstain from sex: http://cnn.it/1JNAcjB “He was using a rock as a tool.” A grizzly bear caused a brief scare: http://cnn.it/1H9oidS aceHub looks at the worst catch fence wrecks in the history of Daytona International Speedway. ’s World Cup Champion U.S. Soccer team LIVE on a special edition of America’s Pregame!! #USWNT <NA> What in the actual fuck Mitchell Joseph Spillard oly fuck <ed><U+00A0><U+00BD><ed><U+00B8><U+00B3><ed><U+00A0><U+00BD><ed><U+00B8><U+00B3> LOL! at Daytona International Speedway? Larry Mac and Chad Knaus break it down... #NASCAR #RaceHUb
43
44
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50
id likes_count comments_count shares_count 10204353004962990_10206741538114826 2 1 0 368010956582538_816921531691476 91384 11231 490730 175162552581735_790279124403405 251 0 120 10152331058668386_10153127255858386 2 10 0 10153464204108675_10153463641968675 1 0 0 10204660931224152_10204656459352358 11 3 0 10205933175434080_10207536742202247 7 3 0 199633956730875_1350470764980516 140330 17688 76389 815230575206482_936357099760495 2 0 0 21105780752_10152192825675753 22715 1360 126995 1066604186686976_1105803896100338 7 6 1 345591392232989_741499032642221 32415 338 2115 10152370025222294_10152828381112294 3 0 0 152523378140065_920250638033998 29579 1827 21923 10205627227179408_10207540540771052 0 0 0 407570359384477_582808881860623 31899 5166 133442 10152331058668386_10153126295598386 18 1 0 114078235319234_924246484302401 89997 2699 78885 10205066528280425_10206876589770831 2 0 0 192565014125753_833961526652762 47736 1830 149099 10203047489169109_10204658729169102 3 0 0 114078235319234_964194140307635 76711 32957 53972 10205627227179408_10207540603892630 3 0 0 316958185092603_832263303562086 18370 3975 13135 10204353004962990_10206741527874570 2 0 0 305901075111_10155864688250112 41836 4806 21376 429751220523642_471254656373298 0 0 0 228735667216_10152933322932217 1893 349 237 10153580923329474_10153579007789474 1 0 0 10152370025222294_10152828735252294 0 0 0 5550296508_10153831451211509 2594 1322 289 538918066228286_787333564720067 2 0 0 73512366273_10152215422126274 58024 2811 79502 10203594116593619_10206983414243942 8 0 1 538918066228286_787283268058430 0 0 0 139404366247846_444768559044757 172639 2401 70625 538918066228286_787333638053393 1 0 0 35790692776_10152393883067777 27368 1154 214708 10203047489169109_10204658746769542 2 2 0 405925029589162_449457545235910 1372 300 4194 228735667216_10152933372182217 1348 72 178 5550296508_10153832390721509 3886 817 313 5550296508_10153832321636509 3130 305 463 345591392232989_741472085978249 517 36 441 345591392232989_741495565975901 1288 23 301 10152334003163342_10153056119277449 3 4 0 10152594534587449_10153056119277449 3 4 3 10205627227179408_10207540569251764 2 0 0 316958185092603_830458373742579 135467 112689 226776 345591392232989_741051649353626 1138 87 3723
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50
created_time 2015-07-08T05:12:33+0000 2014-11-14T11:16:12+0000 2015-07-07T10:29:51+0000 2015-07-08T01:36:14+0000 2015-07-08T03:07:21+0000 2015-07-06T19:58:36+0000 2015-07-08T02:14:58+0000 2015-07-07T23:58:26+0000 2015-07-07T13:38:45+0000 2014-03-10T17:12:04+0000 2015-07-07T15:47:06+0000 2015-07-07T18:25:14+0000 2015-07-08T01:26:18+0000 2015-07-07T17:00:01+0000 2015-07-07T19:28:40+0000 2015-07-03T20:20:53+0000 2015-07-07T15:57:19+0000 2015-04-21T00:30:00+0000 2015-07-08T00:32:06+0000 2015-01-11T03:05:45+0000 2015-07-07T19:46:53+0000 2015-07-03T12:02:01+0000 2015-07-07T19:39:37+0000 2015-07-07T03:25:01+0000 2015-07-08T05:08:53+0000 2015-07-08T00:00:02+0000 2015-07-08T01:38:31+0000 2015-07-08T07:52:41+0000 2015-07-07T14:46:57+0000 2015-07-08T07:23:26+0000 2015-07-07T20:44:32+0000 2015-07-07T17:30:12+0000 2014-06-23T20:43:46+0000 2015-07-07T15:05:33+0000 2015-07-07T14:45:34+0000 2015-07-02T15:00:01+0000 2015-07-07T17:30:24+0000 2014-05-19T09:07:13+0000 2015-07-07T19:54:34+0000 2015-07-07T18:05:53+0000 2015-07-08T08:51:21+0000 2015-07-08T05:01:01+0000 2015-07-08T04:01:00+0000 2015-07-07T16:50:24+0000 2015-07-07T18:12:56+0000 2015-07-07T18:13:28+0000 2015-07-07T17:47:20+0000 2015-07-07T19:34:49+0000 2015-07-06T11:46:50+0000 2015-07-06T22:26:24+0000
type video video photo link photo link video video photo photo link video video video video video photo photo photo photo video video video video video video link link video link video photo photo link photo photo photo photo video video link link link video video link link video video video
45
Conclusion I’m still a Facebook and Google user, still enjoy my Android phone and all it’s functionalities. Details like my name, address, credit card information is all over the internet. As a curious person I follow these trends and look into them. I’m looking at all these exciting new inventions and try to learn from them, and find something new. I didn’t do this project to pursue people into deleting their Facebook accounts. I’m merely warning them that whatever is released online, be that Google, Yahoo, Facebook or any other social media network will never be deleted.
46
As a second piece in my project I have ‘leaked out’ all of my data from Facebook you can download from your personal profile. The information placed in that book is just a fragment of information we hand out to corporations, ad agencies, e-marketing offices. Them generating personalized adverts, tweaking their websites so you’re more likely to spend more time on them.
47
48
Sources http://cran.r-project.org/web/packages/Rfacebook/Rfacebook.pdf http://www.r-bloggers.com/gender-analysis-of-facebook-post-likes/ http://thinktostart.com/analyzing-facebook-with-r/ https://github.com/JulianHill/R-Tutorials/blob/master/r_facebook_gender.r https://en.wikipedia.org/wiki/Deep_Web_(search_indexing) https://en.wikipedia.org/wiki/Web_crawler https://support.google.com/webmasters/answer/182072?hl=en https://en.wikipedia.org/wiki/Kim_Dotcom http://www.vice.com/video/kim-dotcom-the-man-behind-mega http://www.theguardian.com/technology/2012/apr/22/me-and-my-data-internet-giants http://www.theguardian.com/technology/2012/apr/22/big-data-privacy-information-currency http://www.theguardian.com/news/datablog/2012/apr/22/download-your-data-google-facebook https://support.google.com/webmasters/answer/182072?hl=en
49
50
51
52