Stories
Slash Boxes
Comments

SoylentNews is people

posted by cmn32480 on Tuesday May 24 2016, @10:29AM   Printer-friendly
from the no-big-shock dept.

Submitted via IRC for TheMightyBuzzard

A California man is suing Facebook for allegedly scanning the content of private messages sent between users of the site.

The suit alleges that Facebook scans the messages in search of hyperlinks sent between users. "If there is a link to a web page contained in that message, Facebook treats it as a 'like' of the page, and increases the page's 'like,' counter by one," the suit contends. The site tracks when users "like" pages in order to compile individual profiles that allow third parties to send targeted advertisements.

Source: http://www.washingtonexaminer.com/facebook-sued-for-scanning-private-user-messages/article/2591806


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 0) by Anonymous Coward on Tuesday May 24 2016, @08:36PM

    by Anonymous Coward on Tuesday May 24 2016, @08:36PM (#350471)

    It will beat tox, or telegraph or any of these other apps hands down.

    Additionally there are two routers available for it, traditional java i2p-router, and the c++ based i2pd. The downside to the latter is many 'plugin services' are java based and expect to be run via the i2p-router console directly. On the other hand both can allow IRC, XMPP, and web services as both a server and client, as well as SOCKS and HTTP(S) tunnels for web browsing inside the I2P network. Unlike Tor however it does have 'outproxy as default' built in, and only has one or two outproxy nodes available if you manually configure them (safer for keeping your anonymity, since web browsing will never hit the clear net by default, but more complicated for a casual user to set up if they are expecting tor or tbb style clearnet access.)

    As an added bonus over Tor however it DOES have DNS style second level hostnames under the .i2p TLD, with .onion style host(keyhash)names under .b32.i2p or (rarely/never ATM) under .b64.i2p

    The network has ~60k nodes at the moment, ~30k of those from Vuze users and 30k from traditional sources. It has a few thousand published .i2p hostnames/services, including wikis, a coin exchange and many websites covering a variety of topics, from personal blogs, to technical resources, and a few git repositories.

    While it still has some possible identification attacks, similiar to tor, it has a number of configurable traffic sharing settings to help obfuscate personal traffic within traffic shared over the network. Up to 4 hop per direction tunnels (each hop encrypted seperately, not including application encryption), offering up to 8 hop totals if both service and client are set up for maximum paranoia. It also supports multiple encryption standards for host keys with provisions for future changes and legacy compatibility.