Abstract
The anonymity provided by the so-called anonymous social networks is studied in this paper. In particular, five popular anonymous social networks - namely, Social Number, Anomo, Whisper, Candid and the Yik Yak - are being analysed, in terms of investigating the data that are being processed by the corresponding mobile applications on Android systems. The results show that there is personal data processing in place which in some cases may result in tracking or even identification of the users and, thus, anonymity is not ensured.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abrosimova, K.: Developing an Anonymous Social Networking App. https://yalantis.com/blog/anonymous-social-network-development/
Anomo. http://www.anomo.com
Article 29 Working Party: Opinion 5/2014 on Anonymization Techniques (2014). http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp216_en.pdf
Article 29 Working Party: Opinion 9/2014 on the application of Directive 2002/58/EC to device fingerprinting (2014). http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp224_en.pdf
Burp Suite. https://portswingger.net/burp
Candid. http://www.getcandid.com
Correa, D., Silva, R.A., Mondal, M., Benevenuto, F., Gummadi, K.P.: The many shades of anonymity: characterizing anonymous social media content. In: 9th International Conference on Web and Social Media (ICWSM), pp. 71–80. AAAI Press (2015)
Díaz, I., Ralescu, A.: Privacy issues in social networks: a brief survey. In: Greco, S., Bouchon-Meunier, B., Coletti, G., Fedrizzi, M., Matarazzo, B., Yager, R.R. (eds.) IPMU 2012. CCIS, vol. 300, pp. 509–518. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31724-8_53
Eckersley, P.: How unique is your web browser? In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 1–18. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14527-8_1
European Commission: Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Off. J. L. 281(31–50) (1995)
European Union: Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation). Off. J. L. 119(1) (2016)
European Union Agency For Network And Information Security: Privacy by design in big data - An overview of privacy enhancing technologies in the era of big data analytics, December 2015. https://www.enisa.europa.eu/publications/big-data-protection
Hafiz, M., Fang, M.: Game of detections: how are security vulnerabilities discovered in the wild? Empir. Softw. Eng. 21, 1920–1959 (2016)
Junco, R.: Yik Yak and Online Anonymity are Good for College Students. Wired (2015). https://www.wired.com/2015/03/yik-yak-online-anonymity-good-college-students/
Mobile Security Wiki. https://mobilesecuritywiki.com/
Moonsamy, V., Batten, L.: Mitigating man-in-the-middle attacks on smartphones - a discussion of SSL pinning and DNSSec. In: Proceedings of the 12th Australian Information Security Management Conference (AISM), pp. 5–13 (2014)
Pew Research Center: Anonymity, Privacy, and Security Online, September 2013. http://pewinternet.org/Reports/2013/Anonymity-online.aspx
Rovo89: Xposed module repository. http://repo.xposed.info
Social Number. https://socialnumber.com
Son, S., Kim, D., Shmatikov, V.: What mobile ads know about mobile users. In: Network and Distributed System Security Symposium (2016)
Tzortzaki, E., Kitsiou, A., Sideri, M., Gritzalis, S.: Self-disclosure, privacy concerns and social capital benefits interaction in FB: a case study. In: ACM International Conference Proceeding Series (ICPS), PCI 2016, p. 32 (2016)
Wang, G., Wang, B., Wang, T., Nika, A., Zheng, H., Zhao, B.Y.: Whispers in the dark: analysis of an anonymous social network. In: IMC 2014, pp. 137–150. ACM (2014)
Whisper. http://whisper.sh
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Chatzistefanou, V., Limniotis, K. (2017). On the (Non-)anonymity of Anonymous Social Networks. In: Katsikas, S., Zorkadis, V. (eds) E-Democracy – Privacy-Preserving, Secure, Intelligent E-Government Services. e-Democracy 2017. Communications in Computer and Information Science, vol 792. Springer, Cham. https://doi.org/10.1007/978-3-319-71117-1_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-71117-1_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-71116-4
Online ISBN: 978-3-319-71117-1
eBook Packages: Computer ScienceComputer Science (R0)