PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Access Logs : Underestimated Privacy Risks

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Access logs may offer service providers a lot of information about specific users. Depending on the type of the service offers, the operator is capable of obtaining the user’s IP, location, communication habits, device information and so on. In this paper, we analyze a sample instant messenger service that is operating for a certain period of time. In our sandbox, we gathered enough data to correlate user communication habits with their localization, and even contacts. We show how seriously metadata may impact the user’s privacy and make some recommendations about mitigating the quantity of data collected in connection with this type of services.
Słowa kluczowe
Twórcy
autor
  • Military University of Technology, Faculty of Cybernetics, Institute of Mathematics and Cryptology
  • Military University of Technology, Faculty of Cybernetics, Institute of Mathematics and Cryptology
Bibliografia
  • [1] M. Lee, “The metadata trap,” [Online]. Available: https://theintercept.com/2019/08/04/whistleblowers-surveillance-fbi-trump/ [Accessed: 03-Dec-2019]
  • [2] I. K. W. Lai, G. Shi, “The impact of privacy concerns on the intention for continued use of an integrated mobile instant messaging and social network platform” International Journal of Mobile Communications, vol. 13(6), 2015, pp. 641–669 [Conference, 2016, pp. 300-307].
  • [3] R. Hoyle, S. Das, A. Kapadia, A. J. Lee, K. Vaniea, “Was my message read?: Privacy and Signaling on Facebook Messenger.” Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (pp. 3838-3842). ACM, May 2017.
  • [4] D. Lemay, T. Doleck, P. Bazelais, “Passion and concern for privacy” as factors affecting snapchat use: A situated perspective on technology acceptance.” Computers in Human Behavior, vol. 75, 2017, pp. 264-271.
  • [5] WhatsApp “Frequently Asked Questions” [Online]. Available: https://faq.whatsapp.com/en/general/ [Accessed: 05-Dec-2019]
  • [6] Viber Support Portal [Online]. Available: https://support.viber.com [Accessed: 05-Dec-2019]
  • [7] IP Geolocation [Online] Available: https://ipgeolocation.io [Accessed 04-Dec-2019]
  • [8] O. Dan, V. Parikh, B. D. Davison, “Improving IP Geolocation using Query Logs”, Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, ACM, 2016, pp. 347-356
  • [9] J. Lin, L. Zhang, M. He, H. Zhang, G. Liu, X. Chen, Z. Chen, “Multi-path relationship preserved social network embedding”, IEEE Access, 2019, pp. 26507-26518
Uwagi
This work was presented at the International Scientific Conference Mathematical Cryptology & Cybersecurity (MC&C 2020), Warsaw, 16- 17.01.2020.
Opracowanie rekordu ze środków MNiSW, umowa Nr 461252 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2020).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-8e8535bf-a075-4c39-ba22-3a814865f18f
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.