• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

Facebook Apps Leaking Personal Data To Third Parties

October 19, 2010

Views: 7,812

Less than a week after our story about Facebook Introducing OTP (One-time Password) Functionality to make the site more secure, their dubious privacy standards have hit the news again.

Facebook privacy has been in the news numerous times and it’s a subject we’ve also covered many times, with the sheer mass of users on the site the amount of data (especially personal data) is phenomenal.

The latest buzz is that many of the most popular 3rd party apps (mostly games like Farmville and Texas HoldEm Poker) are leaking the unique Facebook ID that enables tracking of an individual Facebook user.

A number of Facebook apps have been providing advertisers with information that make social networking users easily identifiable, according to an investigation by the Wall Street Journal.

All 10 of Facebook’s most popular apps, including Farmville and Texas HoldEm Poker, are among those leaking the unique ‘Facebook ID’ number to outside firms. Every Facebook number is individual and assigned to every profile. Searching for the number will provide access to the Facebook user’s profile and anyone can view the information a user has chosen to share with ‘everyone’. This can include their name, date of birth and even photos.

Farmville, which has 59 million users, also passes this information about a user’s friends. The WSJ said at least 25 firms were being sent the Facebook IDs, which they were using to build profiles of web users, and in some cases, even track their web browsing. It’s not known if the developers knew their apps were leaking data.

It’s become a big issue because WSJ reported on it – Facebook in Privacy Breach, it seems that with the data that the apps leak + some good old data mining advertising and marketing companies can build fairly comprehensive databases about individuals on the Internet.

Not that this is a new problem for anyone who has followed the issues Facebook has been dealing with and in part making worse themselves with lax default privacy settings. It’s a contradiction really because for a service like Facebook the more data they can collect the more valuable they are and on the flip-side everyone and his dog is so worried about privacy…but they still use Facebook.

Millions of Facebook users have been affected, even those that use the social network’s strongest privacy settings. It also breaks Facebook’s rules concerning privacy, which state app developers can not pass on users’ data to outside firms, even if the user has given permission.

Facebook admitted a user’s ID “may be inadvertently shared by a user’s internet browser or by an application” but it “does not permit access to anyone’s private information on Facebook”.

Third-party developers are usually responsible for developing the apps. Facebook stopped users accessing several apps thought to have been leaking personal data.

“We have taken immediate action to disable all applications that violate our terms,” Facebook said. The WSJ named RapLeaf as one of the developers using the Facebook IDs in its own database as well as passing them onto to several other firms.

Facebook claims that somehow they are going to address these issues (by introducing new technology), perhaps another use for a OTP or some kind of token access for the application which allows you to use the application without revealing ANY personal info – including the Facebook ID.

But then I’m not sure how games like Farmville would track your progress and link to your account if they can’t use your Facebook ID.

Source: Network World

Related Posts:

  • Privacy Implications of Web 3.0 and Darknets
  • An Introduction To Web Application Security Systems
  • Cambridge Analytica Facebook Data Scandal
  • LastPass Hacked - Leaking Passwords Via Chrome Extension
  • Post-Quantum Cryptography in 2025 - Migration Paths,…
  • What You Need To Know About KRACK WPA2 Wi-Fi Attack
Share
Tweet
Share
Buffer
WhatsApp
Email

Filed Under: Legal Issues, Privacy Tagged With: data-leak, facebook, facebook-privacy



Reader Interactions

Comments

  1. William Brownyard says

    October 20, 2010 at 7:22 pm

    Facebook is guilty of a whole lot more than that, all of those accounts are setup for email fraud, non profits agencies are used for email scams, One higher up well established email scammer works out of their offices, not to mention a bank service setup that is behind your counterfeit cashier checks nice international setup they have…

  2. Bogwitch says

    October 22, 2010 at 7:16 pm

    @William Brownyard

    As regular readers of this blog will know, I’m no fan of Farcebook and it is my belief that users oftheir services deserve pretty much everything they get. BUT they’re some pretty heavy accusations you’ve made; do you have any evidence to back them up?

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Reconnoitre - Open-Source Reconnaissance and Service Enumeration Tool

Reconnoitre – Open-Source Reconnaissance and Service Enumeration Tool

Views: 306

Reconnoitre is an open-source reconnaissance tool that automates multithreaded information gathering … ...More about Reconnoitre – Open-Source Reconnaissance and Service Enumeration Tool

Scanners-Box - Open-Source Reconnaissance and Scanning Toolkit

Scanners-Box – Open-Source Reconnaissance and Scanning Toolkit

Views: 480

Scanners-Box is an open-source, community-curated collection of scanners and reconnaissance … ...More about Scanners-Box – Open-Source Reconnaissance and Scanning Toolkit

Red Teaming LLMs 2025 - Offensive Security Meets Generative AI

Red Teaming LLMs 2025 – Offensive Security Meets Generative AI

Views: 516

As enterprises deploy large language models (LLMs) at scale, the offensive security discipline of … ...More about Red Teaming LLMs 2025 – Offensive Security Meets Generative AI

gitlab-runner-research - PoC for abusing self-hosted GitLab runners

gitlab-runner-research – PoC for abusing self-hosted GitLab runners

Views: 335

gitlab-runner-research is a proof-of-concept repository and write-up that demonstrates how attackers … ...More about gitlab-runner-research – PoC for abusing self-hosted GitLab runners

mcp-scanner - Python MCP Scanner for Prompt-Injection and Insecure Agents

mcp-scanner – Python MCP Scanner for Prompt-Injection and Insecure Agents

Views: 582

mcp-scanner is an open-source Python tool that scans Model Context Protocol (MCP) servers and agent … ...More about mcp-scanner – Python MCP Scanner for Prompt-Injection and Insecure Agents

Deepfake-as-a-Service 2025 - How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses

Deepfake-as-a-Service 2025 – How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses

Views: 670

Deepfake operations have matured into a commercial model that attackers package as … ...More about Deepfake-as-a-Service 2025 – How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (231)
  • Cryptography (85)
  • Dark Web (4)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (12)
  • Hacker Culture (10)
  • Hacking News (236)
  • Hacking Tools (708)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,394,919)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,813)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,292)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,141)
  • Password List Download Best Word List – Most Common Passwords (934,345)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,066)
  • Hack Tools/Exploits (673,983)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,050)

Search

Recent Posts

  • Reconnoitre – Open-Source Reconnaissance and Service Enumeration Tool November 10, 2025
  • Scanners-Box – Open-Source Reconnaissance and Scanning Toolkit November 7, 2025
  • Red Teaming LLMs 2025 – Offensive Security Meets Generative AI November 5, 2025
  • gitlab-runner-research – PoC for abusing self-hosted GitLab runners November 3, 2025
  • mcp-scanner – Python MCP Scanner for Prompt-Injection and Insecure Agents October 31, 2025
  • Deepfake-as-a-Service 2025 – How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses October 29, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy