• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

Facebook Apps Leaking Personal Data To Third Parties

October 19, 2010

Views: 7,822

Less than a week after our story about Facebook Introducing OTP (One-time Password) Functionality to make the site more secure, their dubious privacy standards have hit the news again.

Facebook privacy has been in the news numerous times and it’s a subject we’ve also covered many times, with the sheer mass of users on the site the amount of data (especially personal data) is phenomenal.

The latest buzz is that many of the most popular 3rd party apps (mostly games like Farmville and Texas HoldEm Poker) are leaking the unique Facebook ID that enables tracking of an individual Facebook user.

A number of Facebook apps have been providing advertisers with information that make social networking users easily identifiable, according to an investigation by the Wall Street Journal.

All 10 of Facebook’s most popular apps, including Farmville and Texas HoldEm Poker, are among those leaking the unique ‘Facebook ID’ number to outside firms. Every Facebook number is individual and assigned to every profile. Searching for the number will provide access to the Facebook user’s profile and anyone can view the information a user has chosen to share with ‘everyone’. This can include their name, date of birth and even photos.

Farmville, which has 59 million users, also passes this information about a user’s friends. The WSJ said at least 25 firms were being sent the Facebook IDs, which they were using to build profiles of web users, and in some cases, even track their web browsing. It’s not known if the developers knew their apps were leaking data.

It’s become a big issue because WSJ reported on it – Facebook in Privacy Breach, it seems that with the data that the apps leak + some good old data mining advertising and marketing companies can build fairly comprehensive databases about individuals on the Internet.

Not that this is a new problem for anyone who has followed the issues Facebook has been dealing with and in part making worse themselves with lax default privacy settings. It’s a contradiction really because for a service like Facebook the more data they can collect the more valuable they are and on the flip-side everyone and his dog is so worried about privacy…but they still use Facebook.

Millions of Facebook users have been affected, even those that use the social network’s strongest privacy settings. It also breaks Facebook’s rules concerning privacy, which state app developers can not pass on users’ data to outside firms, even if the user has given permission.

Facebook admitted a user’s ID “may be inadvertently shared by a user’s internet browser or by an application” but it “does not permit access to anyone’s private information on Facebook”.

Third-party developers are usually responsible for developing the apps. Facebook stopped users accessing several apps thought to have been leaking personal data.

“We have taken immediate action to disable all applications that violate our terms,” Facebook said. The WSJ named RapLeaf as one of the developers using the Facebook IDs in its own database as well as passing them onto to several other firms.

Facebook claims that somehow they are going to address these issues (by introducing new technology), perhaps another use for a OTP or some kind of token access for the application which allows you to use the application without revealing ANY personal info – including the Facebook ID.

But then I’m not sure how games like Farmville would track your progress and link to your account if they can’t use your Facebook ID.

Source: Network World

Related Posts:

  • Systemic Ransomware Events in 2025 - How Jaguar Land…
  • Privacy Implications of Web 3.0 and Darknets
  • Initial Access Brokers (IAB) in 2025 - From Dark Web…
  • An Introduction To Web Application Security Systems
  • Post-Quantum Cryptography in 2025 - Migration Paths,…
  • Cambridge Analytica Facebook Data Scandal
Share
Tweet
Share
Buffer
WhatsApp
Email

Filed Under: Legal Issues, Privacy Tagged With: data-leak, facebook, facebook-privacy



Reader Interactions

Comments

  1. William Brownyard says

    October 20, 2010 at 7:22 pm

    Facebook is guilty of a whole lot more than that, all of those accounts are setup for email fraud, non profits agencies are used for email scams, One higher up well established email scammer works out of their offices, not to mention a bank service setup that is behind your counterfeit cashier checks nice international setup they have…

  2. Bogwitch says

    October 22, 2010 at 7:16 pm

    @William Brownyard

    As regular readers of this blog will know, I’m no fan of Farcebook and it is my belief that users oftheir services deserve pretty much everything they get. BUT they’re some pretty heavy accusations you’ve made; do you have any evidence to back them up?

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Systemic Ransomware Events in 2025 - How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Views: 2,365

Jaguar Land Rover’s prolonged cyber outage in 2025 turned what would once have been a “single … ...More about Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

SmbCrawler - SMB Share Discovery and Secret-Hunting

SmbCrawler – SMB Share Discovery and Secret-Hunting

Views: 2,181

SmbCrawler is a credentialed SMB spider that takes domain credentials and a list of hosts, then … ...More about SmbCrawler – SMB Share Discovery and Secret-Hunting

Heisenberg Dependency Health Check - GitHub Action for Supply Chain Risk

Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Views: 1,441

Heisenberg Dependency Health Check is a GitHub Action that inspects only the new or modified … ...More about Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Dark Web Search Engines in 2025 - Enterprise Monitoring, APIs and IOC Hunting

Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

Views: 3,382

Dark web search engines have become essential for enterprise security teams that need early … ...More about Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

mcp-scan - Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Views: 1,261

mcp-scan is a security tool from Invariant Labs that can run as a static scanner or as a dynamic … ...More about mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Initial Access Brokers (IAB) in 2025 - From Dark Web Listings to Supply Chain Ransomware Events

Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Views: 1,158

Initial Access Brokers (IABs) have moved from niche forum actors to central wholesalers in the … ...More about Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (232)
  • Cryptography (85)
  • Dark Web (6)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (13)
  • Hacker Culture (10)
  • Hacking News (237)
  • Hacking Tools (709)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,435,796)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,174,108)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,573)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,369)
  • Password List Download Best Word List – Most Common Passwords (934,688)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,416)
  • Hack Tools/Exploits (674,330)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,462)

Search

Recent Posts

  • Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like November 26, 2025
  • SmbCrawler – SMB Share Discovery and Secret-Hunting November 24, 2025
  • Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk November 21, 2025
  • Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting November 19, 2025
  • mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers November 17, 2025
  • Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events November 12, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2026 Darknet All Rights Reserved · Privacy Policy