Self-censorship – Facebook monitors everything users type and not publish

Do users know that Facebook analyzes everything they type and not publish (self-censorship content)? Why Facebook does not consider it a privacy violation?

Recent revelations on the NSA surveillance programs have raised many questions in user’s mind on the real roles of companies such as Facebook and Google, how do they manage users’ data and which kind of analysis they perform and for which  purposes.

Does Facebook track everything its users type and then erase before hitting the ‘post’ button?

The answer is very concerning, Facebook is analyzing thoughts the writing that users have intentionally chosen not to share. Facebook implemented algorithms that analyzes what users have typed even if they decide not to publish it considering it’s not private stuff.

Facebook calls the unposted thoughts “self-censorship”, the researchers Sauvik Das and Adam Kramer published an article on their study of the self-censorship behaviour conducted on 5 million English-speaking Facebook users.

facebook self-censorship privacyfacebook self-censorship privacy

The study examined posts on other people’s timelines, aborted status updates  and comments on others’ posts, the methods isn’t complex, Facebook instructs the user’s browser to analyze what user type into any text box and send back metadata to the company.

The problem is that the almost every user ignores this sneaky feature of Facebook, it is not clear how the data collected is covered by Facebook’s privacy policy.

The  section “Information we receive and how it is used” in the Facebook’s Data Use Policy clearly inform that company collects information you choose to share or when you “view or otherwise interact with things”.

The problem is that the policy does not refer explicitly if Facebook manage self-censorship behavior, is the act of “Typing and deleting text” a form of interaction? Of course Facebook considers self-censorship behavior an explicit interaction from which it is useful extract data to profile users.

“We have arrived at a better understanding of how and where self-censorship manifests on social media; next, we will need to better understand what and why.” stated Das and Kramer

Facebook collects metadata on self-censorship behavior and probably the information could be used for intelligence purpose, the company analyzes it to better understand people thought and habits.

Facebook is analyzing thoughts that we have intentionally chosen not to share, Das and Kramer argue self-censorship analysis is an intrusion in users’ privacy.

If someone chooses not to post, they claim, “[Facebook] loses value from the lack of content generation.”

The information could be used for commercial purposes to propose the proper best ads to the users, even if they never published their thoughts or preferences, or to evaluate the sentiment of wide audience of users on a large scale.

The repercussions on security and privacy are evident, Facebook studies self-censorship behavior to improve its system and minimize self-censorship’s prevalence, but this data is a mine of information for intelligece agencies to spy on users.

Pierluigi Paganini

(Security Affairs –  Facebook, self-censorship)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Over 80,000 servers hit as Roundcube RCE bug gets rapidly exploited

A critical remote code execution (RCE) vulnerability in Roundcube was exploited days after patch, impacting…

6 hours ago

A flaw could allow recovery of the phone number associated with any Google account

A vulnerability could allow recovery of the phone number associated with a Google account by…

10 hours ago

Texas Department of Transportation (TxDOT) data breach exposes 300,000 crash reports

Hackers breached Texas DOT (TxDOT), stealing 300,000 crash reports with personal data from its Crash…

21 hours ago

SAP June 2025 Security Patch Day fixed critical NetWeaver bug

SAP fixed a critical NetWeaver flaw that let attackers bypass authorization and escalate privileges. Patch…

1 day ago

U.S. CISA adds RoundCube Webmail and Erlang Erlang/OTP SSH server flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds RoundCube Webmail and Erlang Erlang/OTP SSH server flaws…

1 day ago

Mirai botnets exploit Wazuh RCE, Akamai warned

Mirai botnets are exploiting CVE-2025-24016, a critical remote code execution flaw in Wazuh servers, Akamai…

1 day ago