Self-censorship – Facebook monitors everything users type and not publish

Do users know that Facebook analyzes everything they type and not publish (self-censorship content)? Why Facebook does not consider it a privacy violation?

Recent revelations on the NSA surveillance programs have raised many questions in user’s mind on the real roles of companies such as Facebook and Google, how do they manage users’ data and which kind of analysis they perform and for which  purposes.

Does Facebook track everything its users type and then erase before hitting the ‘post’ button?

The answer is very concerning, Facebook is analyzing thoughts the writing that users have intentionally chosen not to share. Facebook implemented algorithms that analyzes what users have typed even if they decide not to publish it considering it’s not private stuff.

Facebook calls the unposted thoughts “self-censorship”, the researchers Sauvik Das and Adam Kramer published an article on their study of the self-censorship behaviour conducted on 5 million English-speaking Facebook users.

The study examined posts on other people’s timelines, aborted status updates  and comments on others’ posts, the methods isn’t complex, Facebook instructs the user’s browser to analyze what user type into any text box and send back metadata to the company.

The problem is that the almost every user ignores this sneaky feature of Facebook, it is not clear how the data collected is covered by Facebook’s privacy policy.

The  section “Information we receive and how it is used” in the Facebook’s Data Use Policy clearly inform that company collects information you choose to share or when you “view or otherwise interact with things”.

The problem is that the policy does not refer explicitly if Facebook manage self-censorship behavior, is the act of “Typing and deleting text” a form of interaction? Of course Facebook considers self-censorship behavior an explicit interaction from which it is useful extract data to profile users.

“We have arrived at a better understanding of how and where self-censorship manifests on social media; next, we will need to better understand what and why.” stated Das and Kramer

Facebook collects metadata on self-censorship behavior and probably the information could be used for intelligence purpose, the company analyzes it to better understand people thought and habits.

Facebook is analyzing thoughts that we have intentionally chosen not to share, Das and Kramer argue self-censorship analysis is an intrusion in users’ privacy.

If someone chooses not to post, they claim, “[Facebook] loses value from the lack of content generation.”

The information could be used for commercial purposes to propose the proper best ads to the users, even if they never published their thoughts or preferences, or to evaluate the sentiment of wide audience of users on a large scale.

The repercussions on security and privacy are evident, Facebook studies self-censorship behavior to improve its system and minimize self-censorship’s prevalence, but this data is a mine of information for intelligece agencies to spy on users.

Pierluigi Paganini

(Security Affairs –  Facebook, self-censorship)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

CISA adds Cisco ASA and FTD and CrushFTP VFS flaws to its Known Exploited Vulnerabilities catalog

CISA adds Cisco ASA and FTD and CrushFTP VFS vulnerabilities to its Known Exploited Vulnerabilities…

7 hours ago

CISA adds Microsoft Windows Print Spooler flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA added the Windows Print Spooler flaw CVE-2022-38028 to its Known Exploited Vulnerabilities catalog.…

14 hours ago

DOJ arrested the founders of crypto mixer Samourai for facilitating $2 Billion in illegal transactions

The U.S. Department of Justice (DoJ) announced the arrest of two co-founders of a cryptocurrency mixer…

14 hours ago

Google fixed critical Chrome vulnerability CVE-2024-4058

Google addressed a critical Chrome vulnerability, tracked as CVE-2024-4058, that resides in the ANGLE graphics…

19 hours ago

Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks

Nation-state actor UAT4356 has been exploiting two zero-days in ASA and FTD firewalls since November…

1 day ago

Hackers hijacked the eScan Antivirus update mechanism in malware campaign

A malware campaign has been exploiting the updating mechanism of the eScan antivirus to distribute…

2 days ago

This website uses cookies.