Tuesday, July 16, 2019

More Facebook creepiness

Older Daughter, who as most readers know works as a nanny in New Jersey, has a Facebook account. She seldom posts; it's more a chance for her to keep up with distant friends.

She just posted the photo below:

"I just got an ad for this here on Facebook," she noted. "It's so monstrous that I almost feel obligated to order it."

"It just shows how creepily dialed in their marketing is..." replied her aunt, my sister-in-law.


UPDATE: Reader Jeff in Idaho sent the following from the Terms of Service (click to enlarge and READ EVERY WORD):

Holy stinkin' cow......

ANOTHER UPDATE: Reader Jeff pointed out how the above Terms of Service is from FaceApp, whatever the heck that is. But apparently Facebook is far worse. See this link: Think FaceApp Is Scary? Wait Till You Hear About Facebook:
Facebook has nearly 2.5 billion monthly active users to FaceApp’s 80 million. It, too, applies facial recognition to photos that those users upload to its servers. It also actively pushed a VPN that allowed it to track the activity of anyone who installed it not just within the Facebook app but anywhere on their phone. When Apple finally banned that app, Facebook snuck it in again through the backdoor. And that’s before you get to the privacy violations that have led to a reported $5 billion fine from the FTC, a record by orders of magnitude.
Apparently Facebook's Terms of Service includes the following:

"[W]hen you share, post, or upload content that is covered by intellectual property rights (like photos or videos) on or in connection with our Products, you grant us a non-exclusive, transferable, sub-licensable, royalty-free, and worldwide license to host, use, distribute, modify, run, copy, publicly perform or display, translate, and create derivative works of your content (consistent with your privacy and application settings)."

And Facebook and FaceApp aren't alone. Creepy creepy creepy....


  1. They probably even know our blood types.

  2. EWWW! Reminds me of stalkers.

  3. Just like Rob wrote here on July 13, "If the service is free, YOU are thee product..."
    Montana Guy

  4. It's not just FB ... it's the entire internet, smart phones, etc. Get rid of them all. ASAP.

  5. Unfortunately it's not just FB. I was emailing (comcast)my niece regarding her up coming wedding and I started getting adds for wedding rings. Are they reading our emails too? I think so. Deep Creep!

  6. I have an unusual last name. It's simple but uncommon. I got a mailer from a shirt company with "OBLOTZ Rifle Club" (not my real last name) on it. It was a slick, heavy card stock mailer. I know from buying mailers that that is not a cheap piece to buy and mail. It must be some organization selling my name and address to this company, otherwise I really don't search rifles on the net.

  7. One company showed the Upper Peninsula of Michigan as being part of Wisconsin.

  8. Forever and ever. From the Terms of Service.


  9. It's not just Facebook. I have been looking on industry websites or Amazon and find advertisements in my e-mail for what I was looking at.

  10. I have completely gotten off facebook. They are just too intrusive.

  11. These are FaceApp's Terms of Agreement, not to be confused with Facebook. FaceApp is owned by Wireless Labs, a Russian company.
    Montana Guy

  12. Regarding those Terms of Service I sent you, they are for a FaceApp application, a face-editing photo app developed in Russia and not Facebook. As soon as I get decent internet again I'll download and look over its TOS.

    Sorry it took so long to get this to you but I'm having major internet problems since yesterday.


  13. Something else to check into: Facial Recognition software companies are the hottest trends right now and they are buying info and then reselling the software worldwide complete with millions of "faces". I'm not up on this stuff, just something I heard.

  14. So does that mean that they can use, any way they want, pictures of my grandkids that my daughter posts? That sounds pretty dangerous.

  15. What do these companies want/do with the facial recognition stuff?

  16. here's an alternative:

  17. I just read about something maybe even worse that Facebook is doing..

    Facebook Accused of Injecting ‘Hidden Tracking Codes’ In Your Photos

    I found it through Survivalblog. Here's the source article: https://prepforthat.com/facebook-image-tracking-hidden-codes/

  18. Post Alley CrackpotJuly 23, 2019 at 3:26 PM

    A lot of people think they're pseudo-anonymous, sitting at the end of a big fat data pipe with just a pair of IPv4 and IPv6 addresses, because those are just numbers, right?

    Except those same people are using their ISP's domain name service (DNS) servers, and those servers are often hooked into stuff that allow the ISP to inject advertising content into non-encrypted HTTP sessions.

    This is an example for Comcast, but you could literally substitute nearly any major American ISP in its place:

    Comcast continues to inject its own code into websites you visit

    Here at Club Crackpot, we ignore the ISP's DNS and unencrypted network access and dump 100% of our traffic into a bare metal colo server running multiple VPN connections from every router and gateway on our network. From there we have multiple Tor proxies running so we can mix our traffic in with several thousand other people's, hiding within the mass of other Web users using our system as an exit node.

    But recently I let one of our IT people hook up to the regular network so he could do a little bit of work ...

    Now when I go look at what a user sees on the regular network, it's full of adverts about commercial software development tools.

    It used to be full of adverts about the latest luxury SUVs, private schools, holidays in France, and that sort of thing.

    However, that's not really the worst that can happen.

    Interesting covert channel and covert timing attacks can reveal where your traffic's really coming from if your adversary has the ability to snaffle realtime data from a significant number of routing points for your traffic.

    Deliberately introducing this data into HTTPS sessions in order to get them to belch on some of the data also tends to produce interesting echoes all the way back to the end user.

    So if it's the government you're hiding from, you're not really completely hidden via Tor either.