On TechCrunch, Avi Charkham provides an excellent side-by-side comparison of an older Facebook design and the latest one, showing how the service has moved to minimize the extent to which its users are notified of the privacy "choices" they make when they interact with the service. The Facebook rubric is that people don't value their privacy ("privacy is dead, get over it,") and we can tell that because they demonstrate it by using Facebook. But really, Facebook is designed to minimize your understanding of the privacy trades you're making and your ability to make those trades intelligently.
All privacy offers on FB are take-it-or-leave-it: you give up all your privacy to play Angry Birds, or you don't play Angry Birds. There's no "give up some of your privacy to play Angry Birds" offer, or "here's a game that's 95% as fun as Angry Birds but requires that you only yield up the most trivial facts of your life to play it" that we can test the market against.
Charkham's five examples from the visual interface design are very good evidence that FB isn't a harbinger of the death of privacy; rather, it's a tribute to the power of deceptive hard-sell tactics to get people to make privacy trade-offs they wouldn't make in a fair deal.
#3: The Tiny Hidden Info Symbol Trick
In the old Design Facebook presented a detailed explanation about the “basic” information you’re about to expose to the apps you’re adding. In the new design they decided to hide that info. If you pay careful attention you’ll see a tiny little “?” symbol and if you hover over it you’ll discover that this app is about to gain access to your name, profile pic, Facebook user ID, gender, networks, list of friends and any piece of info you’ve made public on Facebook. Quite a lot of info for a 20×10 pixel tiny hidden info symbol don’t you think?!
Of course, the interface is only a small part of the tactics used to manipulate privacy decisions on FB. More insidious and likely more effective is the use of the proprietary algorithms to apply intermittent social reward for disclosure, driving users to greater and greater disclosures -- something well documented in The Filter Bubble, Eli Pariser's 2011 book on the subject.
5 Design Tricks Facebook Uses To Affect Your Privacy Decisions
(via Hacker News)
A new phishing attack hops from one Gmail account to the next by searching through compromised users’ previous emails for messages with attachments, then replies them from the compromised account, replacing the link to the attachment with a lookalike that sends you to a fake Google login page (they use some trickery to hide the […]
An anonymous editor from Crimethinc writes, “As 2017 opens, we face new challenges in an increasingly volatile world. Since last summer, we’ve been hard at work expanding our networks and updating our infrastructure to prepare for the global situation that is now unfolding. Over the next month, we’ll be announcing several ambitious new projects.”
danah boyd writes, “Yesterday, a group of us at Data & Society put out six essays on ‘media, technology, politics.’ Taken together, these pieces address different facets of the current public conversation surrounding propaganda, hate speech, and the US election. Although we only allude to specifics, we have been witnessing mis/disinformation campaigns for quite some […]
Using my iPhone while it’s charging is always a hassle. With tucked-away outlets and the meager length of included lightning cables, comfortable scrolling while plugged in is annoying. These 10-Ft MFi-Certified Lightning Cables are super convenient and probably the best iPhone accessory purchase I’ve made.At over three times the length of normal cables, these reach anywhere you […]
With countless applications for modern life, artificial intelligence (AI) is one of the most in-demand fields of study in tech. Beyond modelling human decision making processes and learning abilities, AI can be used to analyze massive volumes of data and create complex interactive systems.This Machine Learning & AI for Business Bundle made mastering these concepts possible for […]
Computer hacking isn’t just something happening to the DNC. Major software companies need white-hat hackers to ensure the security of their products and users, and I came across a Computer Hacker Professional Certification Package that conveniently teaches those advanced IT techniques online.This course package will prepare you for various computer security certification exams with over 60 hours […]