Some File-Sharers Leave Trails To Their Front Door

Following the publication of a paper which investigates how using the same username across multiple web sites may expose Internet users to scammers, TorrentFreak decided to apply the same research idea to a random sampling of file-sharers, with some eye-opening results.

A team of researchers from the French National Institute of Computer Science (INRIA) has just published their study of over 10 million usernames collected from Google profiles, eBay accounts and other sources. They discovered that around half of the usernames could be linked to another matching online profile, which could enable scammers to build up a more detailed profile of individuals they wish to target.

“A scammer could use this information to build a profile of a person and then target them with convincing phishing messages—perhaps referring to specific purchases on another website,” writes TechnologyReview in response to the study.

But while this research is certainly relevant to Internet users in general, it is also of great interest to those who may be sharing files online without the copyright holder’s permission. Continue reading…

Related Posts

E-Book Buyer’s Guide to E-Book Privacy With the 2010 holidays upon us, it's time to update EFF's E-Book Buyer's Guide to E-Book Privacy, which summarizes and comments on the privacy-relat...
ST-Ericsson and Linaro, working towards the first release By ST-Ericcson: Open source has become an important driving force in the smartphone industry and a particularly key area of focus for ST-Ericsson. We...
Anti SOPA/PIPA Protest: How it happened and what you can do The protest against Stop Online Piracy Act (SOPA) and Protect Intellectual Property Act (PIPA) has come and gone, but the fight is just getting starte...
Search leakage is not FUD Lately I've been accused by some of spreading fear, uncertainty and doubt (FUD) by trying to let people know their search terms are being leaked to th...
Android Vulnerability: Use Precaution on Public WiFi Yesterday, researchers from Germany’s University of Ulm reported that some Android applications transmit sensitive authentication data without properl...
Copyright Is Like QWERTY: Locked-In and Retrospective The term ‘path dependence’ is generally used to describe the development of technological standards and how they ‘lock in’ a given technical solution....

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*