Despite Mark Zuckerberg's internal war on transparency, the Facebook data abuse reveals just keep on coming.
The New York Times now reports that Facebook has given at least four Chinese companies access to user data, and that one of these firms was flagged by U.S. intelligence as a security threat.
Huawei is a Chinese telecom firm identified by America's intel services as a national security threat to the United States of America. If this thoroughly reported and credible story is to be believed, Facebook gave them your data, knowing Huawei were the bad guys.
Use Facebook at your own peril.
Chinese President Xi Jinping (L) talks with Facebook Chief Executive Mark Zuckerberg during a gathering of CEOs and other executives at Microsoft's main campus in Redmond, Washington September 23, 2015. REUTERS/Ted S. Warren
From the NYT:
Facebook has data-sharing partnerships with at least four Chinese electronics companies, including a manufacturing giant that has a close relationship with China’s government, the social media company said on Tuesday.
The agreements, which date to at least 2010, gave private access to some user data to Huawei, a telecommunications equipment company that has been flagged by American intelligence officials as a national security threat, as well as to Lenovo, Oppo and TCL.
The four partnerships remain in effect, but Facebook officials said in an interview that the company would wind down the Huawei deal by the end of the week.
Facebook gave access to the Chinese device makers along with other manufacturers — including Amazon, Apple, BlackBerry and Samsung — whose agreements were disclosed by The New York Times on Sunday.
The deals gave Facebook an early foothold in the mobile market starting in 2007, before stand-alone Facebook apps worked well on phones, and allowed device makers to offer some Facebook features, such as address books, “like” buttons and status updates.
Facebook officials said the agreements with the Chinese companies allowed them access similar to what was offered to BlackBerry, which could retrieve detailed information on both device users and all of their friends — including work and education history, relationship status and likes.
Facebook Gave Data Access to Chinese Firm Flagged by U.S. Intelligence
Fingerprint locks are catastrophically awful, part LXVII: the software security on the crowdfunded Tapplock "is basically nonexistent" -- the lock broadcasts its own unlock code over Bluetooth, and if you send it back to the lock, it pops open.
A team of computer scientists, psychologists and neuroscientists used eye-tracking and fMRI to measure how users perceived security warnings, such as warnings about app permissions and browser warnings about insecure pages and plugin installations.
Konrad Rieck has data-mined the nine top security conferences, compiling a decade-by-decade list of the papers most often cited in the presentations delivered at these events: top of the pile is Random Oracles are Practical: A Paradigm for Designing Efficient Protocols (Sci-Hub mirror), from the 1993 ACM Conference on Computer and Communications Security. Rieck has […]
The Adobe Creative Cloud is home to a suite of editing tools today’s creatives count on to produce their content. Whether you’re an aspiring photographer, animator, or graphic designer, Adobe’s programs can help you in your creative pursuits, and with the Complete Adobe CC Training Bundle, you can come to grips with six of them for […]
Your pet might be photogenic, but getting them to stare long enough at your camera to snap that Instagram-worthy photo isn’t as simple as telling them to sit. Bribing your pets with their favorite treat, however, might just do the trick, and with the Adjustable Pet Selfie Smartphone Attachment, you can do just that while getting […]
The cybersecurity landscape is changing, and now one of the most effective ways to counter hacking threats is to employ another hacker against them. Commonly referred to as ethical hackers, these professionals use a cybercriminal’s tools against them, checking networks for vulnerabilities and patching them up before they can be exploited. The Certified Ethical Hacker Bootcamp […]