{"id":5117,"date":"2012-07-17T17:09:56","date_gmt":"2012-07-17T17:09:56","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=5117"},"modified":"2012-12-12T13:55:38","modified_gmt":"2012-12-12T21:55:38","slug":"has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/","title":{"rendered":"Has Social Networking Pushed the Boundaries of Internet Privacy Too Far?"},"content":{"rendered":"<p>We all kinda love Facebook, even though many of us hate to admit it. The social networking behemoth is integrating with everything else on the web, bit by bit, whether we like it or not. And they\u2019re not the only site doing this\u2014what a lot of Internet users still fail to realize is that for social networking sites, the users are their product. Everything we like, everything we enter on partnered websites, we need to consider it public information because it is of value to those sites and their advertisers.<\/p>\n<p>There have been two particularly galling examples of the lack of privacy on Facebook recently:<\/p>\n<h3>1. Exploiting Our \u201cLikes\u201d<\/h3>\n<p>With no particular rhyme or reason as to which page is chosen, Facebook has been <a href=\"http:\/\/www.zdnet.com\/is-facebook-damaging-your-reputation-with-sneaky-political-posts-7000000828\/\">putting posts in people\u2019s newsfeed from pages that a user Likes<\/a>. It could be a page that you Liked months ago that you may not even remember is in your list. Most of us at one point or another have probably Liked pages that might displease a coworker, friend or relative. For some of us, this might not actually be a problem. But for others it could cause embarrassment or even worse. Oh, you didn\u2019t mean to out your political affiliation, your sexual orientation or maybe your questionable musical taste? Too bad, that\u2019s just not in the advertisers\u2019 best interest.<\/p>\n<p>This is a more prominent extension of the sidebar item that tells us which of our friends have Liked pages we too might like. The main difference with this new action is that to those people not looking closely, it might appear that the friend in question has actually shared the article Facebook is posting on the friends\u2019 behalf.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/likesm\/\" rel=\"attachment wp-att-5118\"><img loading=\"lazy\" class=\"size-full wp-image-5118   \" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/LikeSM.png\" alt=\"\" width=\"244\" height=\"324\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/LikeSM.png 244w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/LikeSM-112x150.png 112w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/LikeSM-225x300.png 225w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/LikeSM-100x132.png 100w\" sizes=\"(max-width: 244px) 100vw, 244px\" \/><\/a><br \/>\n<em> On Facebook, we can see your Likes in the sidebar&#8230;<\/em><\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/facebook\/\" rel=\"attachment wp-att-5119\"><img loading=\"lazy\" class=\"size-full wp-image-5119   aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/Facebook.png\" alt=\"\" width=\"488\" height=\"378\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/Facebook.png 488w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/Facebook-150x116.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/Facebook-300x232.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/Facebook-100x77.png 100w\" sizes=\"(max-width: 488px) 100vw, 488px\" \/> <\/a><br \/>\n<em>&#8230;and now we see shared posts from your Likes in the newsfeed.<\/em><\/p>\n<p>The newsfeed is supposed to be just about things that we intentionally post. This latest action changes that. We can no longer trust that what shows up in our newsfeed is content that has been knowingly generated by a person. It could be posted by an advertising-bot that has no concern for what might be considered private information.<\/p>\n<h3>2. Trumpeting Our Personal Information<\/h3>\n<p>The <a href=\"http:\/\/www.forbes.com\/sites\/kashmirhill\/2012\/07\/12\/did-glassdoors-integration-with-facebook-make-your-coworkers-anonymous-salaries-less-anonymous\/\">second instance has to do with Glassdoor<\/a>, a site that is integrated with Facebook. Ostensibly Glassdoor relies on anonymous salary and company-related information from its users, but when its data is correlated with Facebook friend lists, it could be revealing more information than anyone intended. What is not \u201cPersonally Identifiable Information\u201d by itself becomes far more so when it\u2019s paired with the right bit of context.<\/p>\n<p>Most of us consider salary talk taboo. I could count on one hand the number of people who I have told how much money I make, and I\u2019d still have several fingers left over. And yet, people are posting this information \u201canonymously\u201d online. I understand, from a certain perspective, why this is useful and for a greater good. But would people be doing it if they realized how easily this information could be tracked back to them when a friend list is associated with their data? It behooves a company, if they want people to keep sharing anonymously, to better protect their users\u2019 privacy.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/glasssm\/\" rel=\"attachment wp-att-5120\"><img loading=\"lazy\" class=\"size-full wp-image-5120\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/GlassSM.png\" alt=\"\" width=\"561\" height=\"230\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/GlassSM.png 561w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/GlassSM-150x61.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/GlassSM-300x122.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/GlassSM-100x40.png 100w\" sizes=\"(max-width: 561px) 100vw, 561px\" \/><\/a><br \/>\n<em>Sign into Glassdoor with Facebook&#8230;<\/em><\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/doorsm\/\" rel=\"attachment wp-att-5121\"><img loading=\"lazy\" class=\"size-full wp-image-5121  aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/DoorSM.png\" alt=\"\" width=\"305\" height=\"264\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/DoorSM.png 305w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/DoorSM-150x129.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/DoorSM-300x259.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/DoorSM-100x86.png 100w\" sizes=\"(max-width: 305px) 100vw, 305px\" \/><\/a><br \/>\n<em>&#8230;and see your Facebook connections.<\/em><\/p>\n<p>Regardless of how locked down and protected we keep our settings, social networking sites contain people who we know to varying degrees. For any number of reasons, most of us don\u2019t wish to share every detail of our lives with everyone we connect with on the Internet, even if that person is a very close friend. The Intertubes are leaky; this is a fact of life. It may be accidental because someone made a mistake, or it may be entirely intentional because a company\u2019s privacy practices are shady. Either way, we need to be aware that what we\u2019re sharing may not be as private as we think.<\/p>\n<p>It certainly decreases the value of being able to freely express ourselves on social networking sites if we have to be concerned with what one person can see versus another. But we need to weigh the <em>value<\/em> of sharing in light of this lack of privacy.<\/p>\n<p>If you do wish to reign in that privacy a little bit longer, here are a couple tips:<\/p>\n<ul>\n<li>Go through your Likes list and make sure it doesn\u2019t contain anything you wouldn\u2019t want all your friends to see<\/li>\n<li>Check sites where you have posted potentially damning data. Make sure what you have out there is something you would be okay with your grandma, your neighbor or your boss knowing about you.<\/li>\n<\/ul>\n<p>Does this increasing lack of privacy concern you? If so, are you fighting tooth and nail to retain what privacy remains? Or are you quietly adjusting to a new age of digital overexposure?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We all kinda love Facebook, even though many of us hate to admit it. The social networking behemoth is integrating with everything else on the web, bit by bit, whether we like it or not. And they\u2019re not the only site doing this\u2014what a lot of Internet users still fail to realize is that for social networking sites, the users are their product. Everything we like, everything we enter on partnered websites, we need to consider it public information because it is of value to those sites and their advertisers.<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13,5],"tags":[53,106],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"We all kinda love Facebook, even though many of us hate to admit it. The social networking behemoth is integrating with everything else on the web, bit by bit, whether we like it or not. And they\u2019re not the only site doing this\u2014what a lot of Internet users still fail to realize is that for social networking sites, the users are their product. Everything we like, everything we enter on partnered websites, we need to consider it public information because it is of value to those sites and their advertisers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Has Social Networking Pushed the Boundaries of Internet Privacy Too Far? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"We all kinda love Facebook, even though many of us hate to admit it. The social networking behemoth is integrating with everything else on the web, bit by bit, whether we like it or not. And they\u2019re not the only site doing this\u2014what a lot of Internet users still fail to realize is that for social networking sites, the users are their product. Everything we like, everything we enter on partnered websites, we need to consider it public information because it is of value to those sites and their advertisers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-07-17T17:09:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2012-12-12T21:55:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/LikeSM.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/LikeSM.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/LikeSM.png\",\"width\":\"244\",\"height\":\"324\",\"caption\":\"Facebook sidebar reveals your Likes\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/\",\"name\":\"Has Social Networking Pushed the Boundaries of Internet Privacy Too Far? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/#primaryimage\"},\"datePublished\":\"2012-07-17T17:09:56+00:00\",\"dateModified\":\"2012-12-12T21:55:38+00:00\",\"description\":\"We all kinda love Facebook, even though many of us hate to admit it. The social networking behemoth is integrating with everything else on the web, bit by bit, whether we like it or not. And they\\u2019re not the only site doing this\\u2014what a lot of Internet users still fail to realize is that for social networking sites, the users are their product. Everything we like, everything we enter on partnered websites, we need to consider it public information because it is of value to those sites and their advertisers.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Has Social Networking Pushed the Boundaries of Internet Privacy Too Far?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Has Social Networking Pushed the Boundaries of Internet Privacy Too Far?\",\"datePublished\":\"2012-07-17T17:09:56+00:00\",\"dateModified\":\"2012-12-12T21:55:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/#webpage\"},\"wordCount\":827,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/LikeSM.png\",\"keywords\":[\"Facebook\",\"Privacy\"],\"articleSection\":[\"Security &amp; Privacy\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"We all kinda love Facebook, even though many of us hate to admit it. The social networking behemoth is integrating with everything else on the web, bit by bit, whether we like it or not. And they\u2019re not the only site doing this\u2014what a lot of Internet users still fail to realize is that for social networking sites, the users are their product. Everything we like, everything we enter on partnered websites, we need to consider it public information because it is of value to those sites and their advertisers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/","og_locale":"en_US","og_type":"article","og_title":"Has Social Networking Pushed the Boundaries of Internet Privacy Too Far? - The Mac Security Blog","og_description":"We all kinda love Facebook, even though many of us hate to admit it. The social networking behemoth is integrating with everything else on the web, bit by bit, whether we like it or not. And they\u2019re not the only site doing this\u2014what a lot of Internet users still fail to realize is that for social networking sites, the users are their product. Everything we like, everything we enter on partnered websites, we need to consider it public information because it is of value to those sites and their advertisers.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/","og_site_name":"The Mac Security Blog","article_published_time":"2012-07-17T17:09:56+00:00","article_modified_time":"2012-12-12T21:55:38+00:00","og_image":[{"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/LikeSM.png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/LikeSM.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/LikeSM.png","width":"244","height":"324","caption":"Facebook sidebar reveals your Likes"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/","name":"Has Social Networking Pushed the Boundaries of Internet Privacy Too Far? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/#primaryimage"},"datePublished":"2012-07-17T17:09:56+00:00","dateModified":"2012-12-12T21:55:38+00:00","description":"We all kinda love Facebook, even though many of us hate to admit it. The social networking behemoth is integrating with everything else on the web, bit by bit, whether we like it or not. And they\u2019re not the only site doing this\u2014what a lot of Internet users still fail to realize is that for social networking sites, the users are their product. Everything we like, everything we enter on partnered websites, we need to consider it public information because it is of value to those sites and their advertisers.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Has Social Networking Pushed the Boundaries of Internet Privacy Too Far?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Has Social Networking Pushed the Boundaries of Internet Privacy Too Far?","datePublished":"2012-07-17T17:09:56+00:00","dateModified":"2012-12-12T21:55:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/#webpage"},"wordCount":827,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/LikeSM.png","keywords":["Facebook","Privacy"],"articleSection":["Security &amp; Privacy","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/has-social-networking-pushed-the-boundaries-of-internet-privacy-too-far\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-1kx","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/5117"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=5117"}],"version-history":[{"count":12,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/5117\/revisions"}],"predecessor-version":[{"id":5137,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/5117\/revisions\/5137"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=5117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=5117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=5117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}