ITE: Twitter survey is presented in NDSS next month

Foundation for Research and Technology (ITE): Old Twitter posts could reveal too much about you. More than you think, according to a research released. Tweets could reveal places you visited, and things you did, even if you did not mention them.

ITE

Researchers from the Institute of Technology and Research (ITE) in Greece and the University of Illinois found this after they wrote a tool called LPAuditor. The software automatically discovers all tweets data that are available to the public using a service API.

Using the tool, the researchers analyzed metadata, the hidden information from each tweet, to identify a of the users, the workplaces and the sensitive places they visited. In dozens of cases, they were able to determine the exact identity of users, even behind anonymous Twitter accounts.

In the research that is titled Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta) Data, (PDF) researchers report:

Or even if users are cautious and do not reveal anything in the tweets, the site information can be retrieved which can lead to significant loss of personal data.

Prior to 2015, users simply looking at the Twitter app or the application's website, without knowing it, gave their location and other information. Users did not know the existence of the data because it only appeared on the primary data collected through the API. Although Twitter stopped collecting this data from 2015, the information is still available to the public through the API.

So the researchers were able to obtain GPS coordinates and used commonly available geolocation services to map them to an address. They then grouped tweets that corresponded to the same address, creating clusters of tweets and matching trends, the and the timing of the user's tweets from specific locations.

Researchers also mapped the user's tweets coordinates in relation to other addresses referenced in Foursquare. This has revealed them from which other sites users could have made the tweets. This created potentially sensitive clusters (PSCs from potentially sensitive clusters) that suggested sensitive sites likely to be visited by users.

All of the above they were able to discover without even examining the real thing of tweets. Only by correlating the metadata could they obtain a clear του τι έκανε ο . By searching for phrases such as "at home" or "at work", they could confirm that a location was a home or work address.

Similarly, searching for large keyword lists related to medical, religious, and sexual activities or nightlife activities has been able to confirm that a user is in a sensitive location and deals with a specific activity, even though the tweet did not even mention the place nor his behavior.

Researchers were able to infer more about users than their tweets, and they were able to accurately track many anonymous twitter accounts, according to the PDF.

Twitter allows users to delete their tweets or remove their location data. The problem, however, is that data is available to the public, and data "hunters" may already have copies of it.

So deleting location data from Twitter data will not stop someone who wants to find you and knows how.
Researchers will present their study at Network and Distributed System Security Symposium (NDSS) next month.

____________________

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).