5 Techniques for Maintaining Web Confidentialityhttp://news.yahoo.com/5-techniques-maintaining-confidentiality-103000964.html (http://news.yahoo.com/5-techniques-maintaining-confidentiality-103000964.html)
Scientific American
Larry Greenemeier 14 hours ago
So many of the Web’s most popular services—e-mail and search as well as photo and video sharing—may be free, but that doesn’t mean they come without a cost. That price is information about the people using those services as well as their online behavior—intelligence that Facebook, Google, Microsoft and other Internet companies exchange for advertising revenue. The trade-off of privacy for free services is generally acceptable to most Web users, who are used to incessant advertising—and at times even benefit from personalized attempts to sell them products and services.
The darker side of bartering in personal data, however, is that Web users lose control over who has access to their information, which is often shared well beyond the scope of their original understanding. Google uses automated scanning to filter spam and deliver targeted advertising to its Gmail users, claiming they have “no expectation of privacy” when using its free e-mail service. Facebook, meanwhile, recently settled a $20-million class action settlement following a lawsuit over the social network’s lucrative "Sponsored Stories" program that shares users' "likes" of certain advertisers with friends without paying them or allowing them to opt out.
In addition to nuisance ads, unsolicited e-mails and unintended endorsements, this oversharing creates other, more serious threats to privacy, says Seth Schoen, senior staff technologist with the Electronic Frontier Foundation (EFF). Personalized ads could reveal to others a Web user’s sensitive or embarrassing medical condition, particularly if that user shares a computer with others or surfs the Web in a public place. “The better the ad personalization gets, the more significant those consequences could be,” Schoen adds.
Information collected via the Web could also be problematic for a person during legal proceedings. A lot of people don’t realize that subpoena power in civil cases is broader than it is in criminal cases, Schoen says. Internet service providers (ISPs) and other companies doing business on the Web can be forced to turn over most information they have about their users or customers as part of a lawsuit such as an employment dispute or divorce.
Another threat to privacy involves how well Web companies entrusted with their customers’ personal information secure that data from being lost or stolen and used to steal a person’s identity. The Privacy Rights Clearinghouse, a nonprofit that tracks data breaches, reports that nearly 1.8 million data records have been lost or stolen this year from businesses, government agencies and health care facilities. “The risk comes simply from the companies collecting and storing personal information, and it’s not a very unlikely or hypothetical concern,” Schoen says.
Despite this bleak outlook for privacy, there are tools available to Web users designed to protect personal information from prying eyes. None of these tools alone ensures complete privacy or protection from cyber snooping, but they do offer a way to trim the data trails that curtail one’s privacy.
Masking
E-mail, social networks and other online services often request contact and payment information when users sign up. There are no rules, however, that prevent users from disguising their actual e-mail addresses, phone numbers and credit card numbers as a privacy precaution. Abine, Inc., offers a Web browser plug-in for Firefox and Google Chrome called MaskMe that gives people the ability to create aliases for this type of personal information.
The free version of MaskMe creates an alternate e-mail address whenever a Web site asks for a user’s e-mail. E-mails from that site can be accessed via a MaskMe in-box or forwarded to a user’s regular e-mail account. The “premium” version of MaskMe—$5 per month—enables masked phone numbers, credit cards and access to the MaskMe iOS and Android apps, which let users view info about their Abine accounts from their mobile devices.
Abine’s other services include DoNotTrackMe and DeleteMe. The former is a plug-in that prevents Firefox, Internet Explorer, Chrome and Safari browsers from sharing user information with data-collection companies. DeleteMe is a subscription service that removes personal information from the largest people search databases—also known as “information brokers”—on the Web, including Spokeo.com, Intelius.com and WhitePages.com, says Andy Sudbury, Abine co-founder and chief technology officer.
Private browsing
Web browsers store the information about browsing sessions—including pages visited as well as documents and images downloaded—in temporary cache memory to speed up the Web browsing experience. These pieces of info, however, remain available for anyone else subsequently using that same computer. Most popular browsers—including Safari, Chrome, Internet Explorer, Firefox and Opera—now feature some type of “private” mode that prevents the browser from storing information about browsing sessions.
Schoen points to private browsing as a very useful tool but notes that it has very specific limitations. “The purpose of private browsing mode is to avoid leaving a history of one's browsing in the browser history on the computer you were using—to prevent other people who also use that computer from seeing what you were doing,” he says. Private browsing, however, has no effect on the data that's transmitted over the Internet. Even when a browser is in private mode, an ISP will still know when and where it customers went online as well as the sites they visited. Likewise, those sites will retain any information they obtained from users during those visits.
“Anonymizer”
More than a decade ago, the U.S. Naval Research Laboratory initiated The Onion Routing project—now referred to simply as Tor—to develop software for preserving one’s privacy while using the Web. “Onion routing” refers to the practice of encasing data and its routing instructions in multiple layers of encryption, making it more difficult to trace a user’s Internet activity.
Tor, which the EFF funded for a few years before privacy-promoting nonprofit The Tor Project took over stewardship of the work in 2006, includes a browser that routes users’ Web surfing activity through a network of relays run by volunteers worldwide, a process that makes it difficult to pinpoint a particular user’s location. Tor Browser, which is actually a modified version of Firefox, essentially anonymizes the origin of Web traffic by encrypting communications inside the Tor network.
The Tor Project counts former National Security Agency whistle-blower Edward Snowden and Wikileaks founder Julian Assange as two of its most high-profile supporters. Still, Tor Browser’s design limits its speed and certain conveniences offered by less secure browsers. The use of different nodes in the Tor Network to promote anonymity, for example, can slow data transmissions. In addition, data is decrypted once it exits the Tor Network, leaving it vulnerable to eavesdroppers at that point.
Encryption
In a move to make greater use of HTTPS (or Hypertext Transfer Protocol Secure) to protect communications over the Web, the EFF partnered with The Tor Project to create HTTPS Everywhere as a plug-in for Firefox and Chrome. HTTPS Everywhere automatically activates HTTPS encryption for all areas of a site that support this protocol. Some sites, including the New York Times, allow HTTPS for text but not images, which means someone might be able to determine which images a browser loads when visiting nytimes.com.
Pretty Good Privacy (PGP) e-mail encryption software, meanwhile, prevents even a web-mail provider from reading its customers’ messages, although it requires users manually create, manage and exchange cryptography keys. For instant messaging, Off-the-Record Messaging (OTR) encrypts conversations to keep them confidential between parties, although not all IM providers support OTR.
Encryption tools are generally effective for keeping prying eyes from reading e-mails, instant messages and other content sent to and fro. One caveat is these tools do not prevent law enforcement, ISPs and others from determining who is communicating, when and from what location—information that may be as sensitive as the messages themselves.
Host-proof hosting
Data storage services from Amazon, Apple, Dropbox and others can house gigabytes of data in “the cloud” that users can access from a variety of devices, including PCs, tablets and smartphones. Unfortunately, existing privacy laws—in particular the 1986 Electronic Communications Privacy Act—have not caught up with today’s electronic communications. That law considers information including e-mails “abandoned” and available to law enforcement if they are stored for more than 180 days on a service provider’s server.
So-called “host-proof” data storage services have emerged in recent years to provide an added layer of security to stored information. Apple iCloud and Dropbox, for example, encrypt customer data while it is uploaded and stored on the companies’ servers. Host-proof providers such as SpiderOak and Wuala encrypt customer data on the customers’ computers before—as well as during and after—the data are uploaded to the cloud. The idea is that the host cannot read the data it stores, making it less liable to turn over data to law enforcement when they come calling (although it remains to be seen how this will work in practice).
There's been an ongoing campaign at I Can Has Cheezburger? to get rid of the obnoxious "you'll have a much better chance of getting your lols on the front page if you share them on FB and get all your friends to vote for them there."This is one of the politer lols I saw at ICHC on the subject:
They took away the voting pages on ICHC itself, and there have been an insane number of lols on the front page that were made by people who aren't even registered on ICHC. So some of us have mounted a "members only" campaign.
I joined FB strictly because a few friends did, and I wanted to make sure there was some way to get in touch in case I lost their email addresses. Otherwise, I want that site to leave me alone.
Dear 12-Year-Olds: Skip Facebookhttp://news.yahoo.com/dear-12-olds-skip-facebook-195717792.html (http://news.yahoo.com/dear-12-olds-skip-facebook-195717792.html)
LiveScience.com
Marshall Honorof, Tom's Guide 21 hours ago
It's come to our attention at Tom's Guide that a number of people in the Internet-connected world are currently 12 years old, meaning that sometime between tomorrow and 12 months from now, you'll be turning 13. Here's our advice for when you do: Steer clear of Facebook.
And yes, before you ask, this is going to be one of those "do as I say, not as I do" articles that tweens (rightly) hate. But look at it this way: we 13-and-older fogeys who make up the entire population of Squaresville, USA made our mistake long ago. Most of us couldn't quit Facebook even if we wanted to. It's not too late for you.
Facebook with benefits
Let's assume (perhaps incorrectly) that you haven't already faked your age and signed up, and that you are dutifully awaiting your 13th birthday, the age when Facebook allows you to join up, with saint-like patience and near-religious ardor. You can't wait to join Facebook, and for good reason.
Facebook is a way to keep in touch with all of your friends at once. Finally, your camp friends and your school friends and your friends from your old neighborhood will all be in one place! You can join groups, make comprehensive lists of your favorite books and movies, play social games and set up all sorts of rad events. You kids still say "rad," right?
On the other hand, I’m assuming you've read "Harry Potter" or seen "Star Wars" at some point, and you know that power has its price. Yes, Facebook is the most convenient and widespread social networking site on the Web. It didn't get that way by playing nice.
First off, to fill out a standard profile, Facebook will ask you to give your email address, your full name, your street address, your school, your birthday, your gender, your sexual orientation, what languages you speak, your religious beliefs, your political affiliation, your phone number and more.
You can leave almost any of this stuff out (and very few people share every last detail), but the less info you list, the harder you are to find. The harder you are to find, the smaller and less vibrant your network becomes. Facebook encourages you to share as much as possible. Make no mistake: Watching discussions deepen as your network grows is both fun and satisfying for you, the user.
However, Facebook can use every single piece of this information to invade your privacy. Forget about cybercriminals for a minute; Facebook security (while not impervious) will keep you fairly safe from them.
But did you ever wonder why Facebook is free? It's supported by ads. That's not necessarily a bad thing; lots of the Web is supported by ads. These ads are putting you, specifically, in their crosshairs.
Here's an experiment: Ask two friends or family members to log into Facebook. If you look to the right, you'll see the ads they get. Are you curious why Mom's and Dad's ads are so different, or why your older sibling gets different ads than your uncle? It's because Facebook sells your information to advertisers and allows them to make "targeted ads."
A word on ads
Back in the days when cavemen roamed the earth and connected to the Internet by striking rocks together near a dial-up modem, online ads were pretty simple. A company that wanted to advertise a product would approach a site, pay them some money and blast users with ads for everything from video games to household cleaning supplies.
This didn't work that well for obvious reasons. No two people need exactly the same products. A little old lady is not going to be too interested in video games, and teenagers probably don't need to buy many cleaning products. After a while, advertisers wised up and began crafting ads specifically for certain audiences.
When you give Facebook your information, the company then sells much of that information to advertisers so that they can hawk relevant services in your general direction. It's not always accurate (as I write this, Facebook is advertising hair-regrowth products to me; my current hairdo could choke a walrus). But it's better than targeting everyone and hoping against hope that someone cares.
Let's say you fill out your current city as New York. You'll get ads for local concerts and restaurants. If you list your religion as Christian, you will get ads all about local ministries and missionary opportunities. Did you put "Lord of the Rings" as one of your favorite books? Get ready for a deluge of self-published fantasy eBooks clogging up your ad stream.
A lifetime of information
"So Facebook wants to show me targeted ads," you might think. "Big deal. Maybe I'll even find something useful." Maybe you will. But keep in mind, once advertisers have your information, they won't just use it for Facebook ads. Advertisers, hundreds of them, will keep your information close to the chest and use it every time your name comes up.
No matter where you go online, you'll find ads directed toward you as long as you stay logged into Facebook account (most people never log out, and advertisers can track you to other sites). The more information you provide, the more specific they will be. People you've never met will know more than your closest friends about where you've lived, what you like to watch and how to get in touch with you.
Once you're on Facebook, there's no way to recall your information, either. Even if you delete your account, the advertisers still have access to all of your pertinent details, and you'll only pry those out of their cold, dead hands.
This isn't to say that you shouldn't get involved in social media — just the opposite, in fact. Speaking as someone who's been there since the early days of Facebook, it's actually kind of lame. Twitter is better for sharing your thoughts. Tumblr is better for posting pictures, videos and animated GIFs. Gchat is better for sending private messages (so is Snapchat, which is also fun to use).
Look, guys and gals, I've been there. Peer pressure is really, really tough when you're 12, and it's only going to get worse once you hit high school. Stay strong and avoid Facebook, though, and you'll reap a lifetime of rewards.
Besides, your parents are on Facebook. That should tell you about how cool it is.
How to Keep Border Guards From Reading Your Laptop
LiveScience.com
By Jillian Scharr, Tom's Guide 19 hours ago
Did you know that U.S. immigration agents can seize your laptop, cellphone, digital camera and any other electronic devices at the U.S. border, no justification required?
The U.S. government's ability to search citizens at the border without a warrant is nothing new -- it dates back to the 1977 Supreme Court ruling in United States v. Ramsey. But as digital technologies become more prevalent, this so-called "exception to the Fourth Amendment" has come under renewed scrutiny.
"The problem is, now people bring with them a lot more stuff — not physically, but digitally," said Hanni Fakhoury, a staff attorney at the Electronic Frontier Foundation, a nonprofit digital rights group based in San Francisco.
"Computers, cellphones, tablets have lots of information," Fakhoury said. "The issue becomes: Do the prior justifications of a broad searching authority still extend to [the contents of] digital devices?"
MORE: 7 Computer-Security Fixes to Make Right Now
The answer to that question remains unclear. For now, there's no way you can prevent the feds from getting the gadgets if they want them — but you can make sure none of your sensitive data can be read.
Of course, the No. 1 way to safeguard your digital privacy is to not bring any digital devices with you to the border. But for many people, going without laptops and mobile phones is just not an option.
Here are some suggestions for what you can do to keep your sensitive data close to hand, but safe from prying eyes.
Bring a clean computer to the border
If you have the cash to burn, you can buy a cheap laptop or tablet to bring with you across the border. Then, before you leave on your trip, put all the documents and accounts you'll need in a secure cloud storage system.
Google Docs works, but you can also consider more secure cloud storage options such as SpiderOak, as well as the cloud-encryption software BoxCryptor.
So long as you're careful not to store any documents from the cloud onto your computer, you're not technically bringing any data to the border.
MORE: 13 Security and Privacy Tips for the Truly Paranoid
There's another way to bring a clean computer to the border: Wipe your own. But before you do, purchase an external hard drive and use it to create an image backup of your computer.
After that, you'll need to securely wipe everything on your laptop. You can do this by going into your computer's control panel and doing a factory reset, or you can install a whole new operating system on your computer, which will overwrite all of your computer's contents.
Leave the external hard drive at home, and take your newly blank laptop with you to the border. Once you get home, you can copy your hard drive's contents back onto your laptop and get back to work.
These methods are expensive, as they require spending at least a hundred dollars for a good external hard drive, or even more for a laptop that you'll rarely use.
The advantage is that if a border agent requests to view your device, you can comply without worrying about your privacy. This might also be the way to go if you're particularly eager to avoid a confrontation at the border.
The Fifth Amendment right against self-incrimination does protect you from having to hand over your password, even at the border. Yet many people feel uncomfortable saying "no" to a federal official. If the only devices you bring to the border are clean, even handing over your password won't compromise your data.
Encrypt your data
Another option is to encrypt the data on your devices. This will take more time than purchasing a whole new device, especially if you're new to encryption. But it's not too difficult once you've gotten the hang of it, and you can encrypt your data with the same secure algorithms used by the military without spending a dollar.
On your computer, programs such as the free open-source program TrueCrypt can encrypt a few of your documents, or even your entire hard drive. The only way to see your data is to enter a password.
MORE: 13 Free Software That Encrypt Your Data
TrueCrypt also has a feature that lets you create a decoy password, so that you cannot only lock your data up, but also hide it away in what's called a "hidden volume."
Think of it as a box within a box — the only difference is that anyone looking in the outer box won't be able to tell that the inner box is there.
If someone demands access to your encrypted files, you can give them the password to the outer box, or volume, and they'll be able to see any documents you chose to store in that area.
However, they won't even know that your truly sensitive data is stored in a second layer of encryption.
For your part, you can access the hidden volume by entering the hidden volume's password instead of the outer volume's. In this way, the outer volume, and the outer volume password, are merely dummies you can surrender to others so that it seems like you're complying.
Just remember to choose a secure password, preferably more than 10 random characters in length. You can also use a passphrase, such as a sentence or verse, so long as it's more than 50 characters in length.
You may be wondering: Does encryption make you look more suspicious to border agents and other security personnel?
The official answer is no. According to the Supreme Court case United States v. Cotterman, which ruled that border inspectors need to prove "reasonable suspicion" before conducting a forensic test on a seized device, encryption alone is not to be considered suspicious.
Unofficially, however, Fakhoury says that "the government takes the position that [encryption] is a sign of someone trying to hide something."
Some of the documents leaked by former National Security Agency contractor Edward Snowden, for example, suggest that intelligence agencies pay extra attention to encrypted communications, and that a legal loophole allows the agencies to store these encrypted communications for a longer period of time.
So if you take a computer with encrypted documents across the border, you should prepare to spend some extra time in customs, as you might find yourself being detained.
You don't have to give up your password or passphrase, but if you'd like to avoid the stress and hassle entirely, extensive encryption might not be your best option.
Computers aren't the only data storage devices you have to worry about at the border. Nowadays, it's possible to go without your laptop for a few days. But your mobile phone? Not so much.
Most phones contain contacts, emails, banking and credit card info from shopping apps, location-based data and tracking information, photos and more.
Despite this wealth of sensitive data, there are some challenges to secure storage on a mobile phone, challenges that don't exist with computers. For one, it's more difficult to truly delete files on a mobile phone.
If you're a customer of T-Mobile or AT&T, or any other carrier that uses the international Global System for Mobile Communications (GSM) standard, you can buy a cheap phone and move your SIM card into it.
That way, you can leave your data-rich phone at home and people will still be able to contact you using your existing number.
If you put a passcode on an iPhone, the device will also encrypt its data using that passcode as the key, thus adding another layer of security.
If you have an Android smartphone you can use the "Encrypt Phone" feature to secure your data. There are also several apps that provide strong additional encryption, such as "SSE-Universal Encryption App" and "WhisperCore."
You can also use encrypted messaging services like Wickr and Silent Text that can securely delete messages soon after they're sent.
For an excellent comprehensive guide to the legal and practical considerations of crossing the U.S. border, check out the Electronic Frontier Foundation's PDF "Defending Privacy at the U.S. Border: A Guide for Travelers Carrying Digital Devices. (https://www.eff.org/sites/default/files/filenode/EFF-border-search_0.pdf)"
Snowden at SXSW: The NSA is 'setting fire to the future of the Internet'http://news.yahoo.com/snowden-sxsw-interview-141843045.html (http://news.yahoo.com/snowden-sxsw-interview-141843045.html)
By Dylan Stableford, Yahoo News 1 hour ago
(http://l3.yimg.com/bt/api/res/1.2/9XDow82Fm3lLpSdFwPap9w--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTQxOTtweW9mZj0wO3E9NzU7dz02MzA-/http://l.yimg.com/os/publish-images/news/2014-03-10/2b88f4d0-a876-11e3-85f2-0fe94b5c2eaa_snowden-sxsw-2014.jpg)
Edward Snowden appears via teleconference at South By Southwest, March 10, 2014. (Yahoo News)
National Security Agency contractor-turned-leaker Edward Snowden told attendees at the South by Southwest Interactive Festival in Austin, Texas, on Monday that they are "firefighters" against mass surveillance.
"The NSA ... they're setting fire to the future of the Internet," Snowden said. "The result has been an adversarial Internet."
Snowden spoke via teleconference from Russia — where he was granted asylum from U.S. espionage charges — through seven proxies, organizers said. A green screen behind Snowden projected an image of the U.S. Constitution.
"It's nothing we asked for," Snowden said of the NSA's mass surveillance. "It's not something we wanted."
Snowden dismissed U.S. lawmakers who say his leaks have threatened national security.
"These things are improving national security," Snowden said. "We rely on the ability to trust our communications."
(http://l1.yimg.com/bt/api/res/1.2/1bTNxGpkZJXrAntkVaWQjA--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTUzMztweW9mZj0wO3E9NzU7dz04MDA-/http://media.zenfs.com/en_US/News/The%20Verge/snowden__1_of_1_.0_standard_800.0.jpg)
Live at 12PM ET: Edward Snowden speaks at SXSW
People should be able to open emails without fear of spying, "whether they be journalists or activists," Snowden said.
"We've actually had tremendous intelligence failures because we've been monitoring everybody's communications rather than suspects," Snowden said.
He said tips that could have alerted authorities to accused Boston Marathon bomber Tamerlan Tsarnaev and Umar Farouk Abdulmutallab, the so-called underwear bomber, were missed as a result.
"What did we get from bulk collections?" Snowden said. "We got nothing."
Snowden also criticized U.S. intelligence officials like James Clapper, the director of national intelligence, for "cheering" the NSA rather than holding it accountable.
(http://l.yimg.com/bt/api/res/1.2/uok0395cwJmV9pdlZqYxsQ--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTQxNDtweG9mZj01MDtweW9mZj0wO3E9NzU7dz03MzY-/http://media.zenfs.com/en-US/video/video.cbstv.com/PFeqxbvKjHLKQcvoif7LiI3N1eNdfiwL_CTM_0130_ORR_1_640x360.jpg)
"We have an oversight that could work," Snowden said. "The overseers aren't interested in oversight."
The session — billed as “A Virtual Conversation with Edward Snowden” — was moderated by Ben Wizner, the director of the American Civil Liberties Union's Speech, Privacy & Technology Project and Snowden’s legal advisor.
"If he were here in the United States he would be in a solitary cell," Wizner said.
Snowden's appearance at SXSW comes two days after WikiLeaks founder Julian Assange gave a similar speech to the conference from the Ecuadorian Embassy in London, where he has been living in asylum.
Last week, U.S. Rep. Mike Pompeo, R-Kan., wrote a letter calling on SXSW conference organizers to cancel Snowden's appearance.
"I am deeply troubled to learn that you have invited Edward Snowden to address SXSW on privacy, surveillance, and online monitoring in the United States," Pompeo wrote. "Certainly an organization of your caliber can attract experts on these topics with knowledge superior to a man who was hired as a systems administrator and whose only apparent qualification is his willingness to steal from his own government and then flee to that beacon of First Amendment freedoms, the Russia of Vladimir Putin."
Snowden, though, said he did what he did to protect the First Amendment.
"Would I do this again? The answer is yes," Snowden said. "I took an oath to support the Constitution and I saw that the Constitution was violated on a massive scale."
Matthew 10:16
“Behold, I send you forth as sheep in the midst of wolves: be ye therefore wise as serpents, and harmless as doves.”This comes to mind when I think of this subject.
So speaking of Big Brother Facebook - last night I had a friend request from a name I didn't recognize - and what the heck, I said yes.
It turned out to be Rusty Edge, and he didn't initiate it.
;grrr
I like Rusty a lot - I just hate Facebook for exactly crap like that, which makes me deeply upset and nervous and freakin' paranoid.
I desperately wish more of my Facebook 'friends' had that attitude of never discussing politics on there.
Fun fact that only I in the whole world knew until last week when I told my mommy - I burn too much time every day playing Wack-A-Mole with the stuoopid 'suggested' EVERYthing on the right sidebar in my timeline. Facebook, which has such sophisticated software that it knows an obnoxious and scarey amount about me from riffling through the junk email I gave to establish this sock account full of misinformation about me out of a concern for privacy on Big Brother Facebook, unmistakably does not give one single damn about user preferences while giving its all to pry into my personal info - the several-times-a-day Wack-A-Mole features suggested page suggestions I've been closing for years, literally YEARS, some of them, and lately has been suggesting GUN groups, JEsus Christ, and the buy and sell group suggestions for months have been featuring a fun feedback popup that doesn't close when you hit send, which a few days ago got more buttons and a random arrangement added as, no doubt, an anti-bot measure that happens to also burn extra of my finite human time finding "Not relevant" "Spam" -and "Offensive" for the guns- each and every suggestion I close. And the' close' buttons are small so I sometimes accidentally VIEW stupid suggested pages instead, with the extra page-load time not spared, and it's even caused me to somehow accidentally hit 'Join' buttons, too, before I could back out.-Only Uno, Rusty, Green and Lori, among you, will have a chance to see this directly from me. -So I'm asking everyone else on Facebook to do up a copy/paste - and take credit or say where you got it, add any thoughts you like - whatever. Time to stir excrement up and see if we can't get a protest started that Big Brother can't ignore.
That right there's Big Brother Facebook all over for you - they change how crap works here profoundly every few months w/o notice nor any avenue whatsoever of appeal. The times I've found how posting links to stuff on on my forum on my forum's page works profoundly changed are too high to count. I've been missing the page-top 'browse and post as' pull-down available if you manage another page, which was VERY handy sometimes, for years - and I just realized that though there's a select for which of the two pages I administer and my personal sock I like and comment as on each of those pages, there's NO way to like a friend's art posts on my timeline or his home page as my ART page - and he has the same problem with his HOBBY page.
What's never changed is constantly putting my timeline setting back to Top Stories from Most Recent where I left it because Big Brother is definitely WATCHING me, but of damns given about what I, a user whose views and content they make money off of, wants, there is. not. a. single. one.
I implore every human being who sees this and doesn't resemble a character created by George Orwell to 'like' or whatever, and/or share the post - I seriously am not interested in comments about my mild OCD tendencies, or really, the actual subject at issue - the point is to get this considered complaint about the fundamentally crappy and unacceptable attitude of Facebook that it reads my email but not my user preferences in front of as many eyes as possible, and add your own thoughts to any post shares, and we need to speak up and MAKE SOME NOISE. Right THERE'S your avenue of appeal.
Mr. Hu wishes to formally note his disappointment that all three of you gentlemen are on FB, yet this morning, there have been no reactions or shares of the post in question thus far. The revolution begins with one man with a vision - and it stays stuck at one, nothing, until some other people board the bus to make it a movement.
I submit, sir, that I intend to continue to use Facebook for the same reasons as always - but what does any of what you say have to do with Facebook being a bad user-hostile interface, while wonderful at gouging and spying, because it ignores moby dick issues of user service, and we ought to kick up a fuss about that in hopes they'll learn to leave my timeline settings alone (and bother to fix all the other crapulence I mentioned)?
Mr. Hu wishes to formally note his disappointment that all three of you gentlemen are on FB, yet this morning, there have been no reactions or shares of the post in question thus far. The revolution begins with one man with a vision - and it stays stuck at one, nothing, until some other people board the bus to make it a movement.
Uno - is tagging talking about what I think you're talking about? No trouble just now posting "JKStudio would like to commend An Unorthodox Halloween (https://www.facebook.com/AnUnorthodoxHalloween/?fref=mentions) to your kind attention. The man is an extremely gifted artist..." on the page, auto-link thingy putting up no fight.... Yeah it’s dependent on the targets setting. I was about 60% successful when talia was mailing that flat talia thing around, tried to tag everyone/haunt it stopped at.
The thing I fail to understand about Facebook, is why do most people think they need it for anything? "I want to talk to friends and relatives." What's wrong with email? There must be something the mass public finds very uncomfortable about email, to spend so much time avoiding it as a medium and choosing something else. Is it that most people need "purdy pictures" to do anything? Yet, people can send purdy pictures in email just fine, and indeed an iPhone can do that fairly quickly, as you take them. I don't even own an iPhone or any kind of dumbphone, and I know about this capability. Sometimes I've borrowed my Mom's phone and sent a picture to myself, because it's simply a better camera than anything I currently own.