Skip to main content

Facebook logs texts and calls, users find as they delete accounts

Leaving the social network after Cambridge Analytica scandal, users discover extent of data held
 Facebook said: ‘People are expressly asked if they want to give permission to upload their contacts from their phone.
As users continue to delete their Facebook accounts in the wake of the Cambridge Analytica scandal, a number are discovering that the social network holds far more data about them than they expected, including complete logs of incoming and outgoing calls and SMS messages.
The #deletefacebook movement took off after the revelations that Facebook had shared with a Cambridge psychologist the personal information of 50 million users, without their explicit consent, which later ended up in the hands of the election consultancy Cambridge Analytica.
Facebook makes it hard for users to delete their accounts, instead pushing them towards “deactivation”, which leaves all personal data on the company’s servers. When users ask to permanently delete their accounts, the company suggests: “You may want to download a copy of your info from Facebook.” It is this data dump that reveals the extent of Facebook’s data harvesting – surprising even for a company known to gather huge quantities of personal information.
One user, Dylan McKay, reported that for the period October 2016 to July 2017 his logs contained “the metadata of every cellular call I’ve ever made, including time and duration” and “metadata about every text message I’ve ever received or sent”.
Many other users reported unease at the data they had discovered being logged, including the contacts in their address books, their calendars, and their friends’ birthdays.
In a statement, a Facebook spokesperson explained why contacts were uploaded. “The most important part of apps and services that help you make connections is to make it easy to find the people you want to connect with. So, the first time you sign in on your phone to a messaging or social app, it’s a widely used practice to begin by uploading your phone contacts,” it said
You May Also Like :
8 Best Facebook Alternatives With Focus On Privacy For 2018
“Contact uploading is optional. People are expressly asked if they want to give permission to upload their contacts from their phone – it’s explained right there in the apps when you get started. People can delete previously uploaded information at any time and can find all the information available to them in their account and activity log from our Download Your Information tool.”
Facebook asks users for permission to upload this sort of personal data for a number of reasons: address books, for instance, are uploaded with the understanding that it will help users find friends on the social network and help the app’s algorithms work out how to prioritise different content. Messenger for Android asks for permissions to read call and SMS logs for a similar purpose.
The company notes that users can stop continuously uploading contacts and delete all their previously uploaded contacts by turning off the continuous uploading setting in the Messenger app.
Permanently deleting a Facebook account will also result in contacts no longer being uploaded and all previously uploaded contacts being deleted.

What are the Cambridge Analytica Files?

Working with two whistleblowers who helped set up Cambridge Analytica, the Observer and Guardian have spent a year analysing documents, gathering eyewitness reports and working with whistleblowers to untangle a highly complex story of elections in the digital age. In this series we expose:
  1. 1How data analytics firm Cambridge Analytica used people’s Facebook data for political campaigning.
    Read more from this series
  2. 2How Cambridge Analytica is connected to AggregateIQ — the digital agency used by the Vote Leave official campaign for Brexit.
    Read more
  3. 3Questions arising around how the Vote Leave campaign operated in the run up to the referendum.
    Read more from this series
Cambridge Analytica is currently being investigated on both sides of the Atlantic. It is a key subject in two inquiries in the UK — by the Electoral Commission, into the firm's possible role in the EU referendum and the Information Commissioner's Office, into data analytics for political purposes — and one in the US, as part of special counsel Robert Mueller's probe into Trump-Russia collusion.

Since you’re here …

… now is the time to support investigative reporting. The Guardian and Observer have spent a year analysing documents, working with whistleblowers and gathering eyewitness reports to untangle a complex story around data in the digital age. This took months of painstaking research by a small team of reporters and editors – and has led to investigations on both sides of the Atlantic. We have received legal threats, including from Facebook, but we are determined to continue publishing stories that raise important questions about the use of people’s data in political campaigns – from the US election to Brexit.
We increasingly need our readers to fund our fearless, independent, investigative reporting. Thank you to the many people who have already supported us financially – your contribution is what makes stories like this possible. Unlike many news organisations, we have not put up a paywall – we want to keep our journalism as open as we can.
You May Also Like :
WhatsApp Co-founder Tells Everyone To Delete Facebook: “It Is Time”
How To Turn Off Facebook Face Recognition System On App And PC?

Comments

Popular posts from this blog

[Guide] How to Protect Your Devices Against Meltdown and Spectre Attacks

Recently uncovered two huge processor vulnerabilities called Meltdown and Spectre have taken the whole world by storm, while vendors are rushing out to patch the vulnerabilities in its products. The issues apply to all modern processors and affect nearly all operating systems (Windows, Linux, Android, iOS, macOS, FreeBSD, and more), smartphones and other computing devices made in the past 20 years. What are Spectre and Meltdown? We have explained both, Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5753, CVE-2017-5715), exploitation techniques in our previous article. In short, Spectre and Meltdown are the names of security vulnerabilities found in many processors from Intel, ARM and AMD that could allow attackers to steal your passwords, encryption keys and other private information. Both attacks abuse 'speculative execution' to access privileged memory—including those allocated for the kernel—from a low privileged user process like a malicious app running...

Check your Gmail Account Email is Secured or Not After 50 Lacs Gmail account Hacking

World Biggest Hacking 50Lacs Gmail Account Hacked by Russian Hackers. Hack Gmail List Post in Bitsec security forum. This hacking is done in 10 September 2014. Anyone can download  5 Million hacking gmail  list . Your password is compromised publicaly.  So how do you know your account is hacked is or not. This is one of the biggest hack in Gmail account.  So hackers use your gmail account password in illegal purposes. So I recommend you to check your gmail account password. Here we provide a website to check your email in the hacking list. If your name in the hacking list ,so change your password of gmail. Check your name in Gmail Hacking list  Follow the given steps. 1 Go to this website  ISLEAKED.COM  or  haveibeenpwned.com/ 2. Type of email and click on check it. 3. Now you know your account is hacked or not. YOU MAY ALSO LIKE : Make Fake FB Account in 1 Min Without Mobile and email Facebook Moves To Decide What ...

Unlocked phones vs. locked phones: Why you should care

Should you get an unlocked phone? The US wireless market is more competitive than ever, which is great news for consumers who have lots of choices when it comes choosing a service provider. But one barrier still exists when trying to switch carriers: the locked smartphone. The end of wireless contracts marked a watershed trend for consumers because it finally opened the door for them to more easily shop around for alternative wireless carriers. But the software locks that carriers put on phones restricting its use on other networks still prevent many consumers from having total freedom when it comes to choosing a provider. Now Verizon, the only wireless carrier that sold its phones unlocked out of the box, is reversing course. The company  said earlier this week  it would begin locking the phones it sells to consumers for an undetermined period of time, which will prevent them from using a SIM card from another carrier. But Verizon promised it would eventually ...