Cybercasing the Joint: On the Privacy Implications of Geo-Tagging
نویسندگان
چکیده
This article aims to raise awareness of a rapidly emerging privacy threat that we term cybercasing: using geo-tagged information available online to mount real-world attacks. While users typically realize that sharing locations has some implications for their privacy, we provide evidence that many (i) are unaware of the full scope of the threat they face when doing so, and (ii) often do not even realize when they publish such information. The threat is elevated by recent developments that make systematic search for specific geo-located data and inference from multiple sources easier than ever before. In this paper, we summarize the state of geo-tagging; estimate the amount of geo-information available on several major sites, including YouTube, Twitter, and Craigslist; and examine its programmatic accessibility through public APIs. We then present a set of scenarios demonstrating how easy it is to correlate geotagged data with corresponding publicly-available information for compromising a victim’s privacy. We were, e.g., able to find private addresses of celebrities as well as the origins of otherwise anonymized Craigslist postings. We argue that the security and privacy community needs to shape the further development of geo-location technology for better protecting users from such consequences.
منابع مشابه
Semantic Computing and Privacy: a Case Study Using Inferred Geo-Location
This paper presents an experiment that allows the inference over data published in social networks, resulting in a potentially severe privacy leak, more specifically the inference of geo-location resulting in the potential of cybercasing attacks. We present an algorithm that allows the inference of the geo-location of YouTube and Flickr videos based on the tag descriptions. Using the locations,...
متن کاملAn improved joint model: POS tagging and dependency parsing
Dependency parsing is a way of syntactic parsing and a natural language that automatically analyzes the dependency structure of sentences, and the input for each sentence creates a dependency graph. Part-Of-Speech (POS) tagging is a prerequisite for dependency parsing. Generally, dependency parsers do the POS tagging task along with dependency parsing in a pipeline mode. Unfortunately, in pipel...
متن کاملSocial Networking Privacy - Who's Stalking You?
This research investigates the privacy issues that exist on social networking sites. It is reasonable to assume that many Twitter users are unaware of the dangers of uploading a tweet to their timeline which can be seen by anyone. Enabling geo-location tagging on tweets can result in personal information leakage, which the user did not intend to be public and which can seriously affect that use...
متن کاملPrivacy Implications of Privacy Settings and Tagging in Facebook
Social networks are becoming increasingly popular nowadays. Users share personal information about themselves and other users in order to build and maintain their social network. However, the large amount of personal information available on social networks poses risks of data misuse. Although social networks offer users the possibility to specify privacy settings to regulate access to their in...
متن کاملEffects of statistical distribution of joint trace length on the stability of tunnel excavated in jointed rock mass
The rock masses in a construction site of underground cavern are generally not continuous, due to the presence of discontinuities, such as bedding, joints, faults, and fractures. The performance of an underground cavern is principally ruled by the mechanical behaviors of the discontinuities in the vicinity of the cavern. During underground excavation, many surrounding rock failures have close r...
متن کامل