SlideShare a Scribd company logo
1 of 2
Download to read offline
www.smartsignin.com
                                                        www.facebook.com/smartsignin
                                                          www.twitter.com/smartsignin


Does Facebook Federation Have Your Best Interests At Heart?
Facebook offers Facebook Connect. Open ID offers, well, OpenID. But, does
the latest craze with Facebook login integration considering the security of
those of us who have sensitive information to protect?




1.) The aggressive and steadfast rise of the Cloud and its many forms, in-
cluding SaaS, IDaaS, and Cloud storage.
2.) The rise of Single Sign-On (SSO), or identity management, services
hosted by Facebook – as Facebook Connect and OpenID.
3.) The equally aggressive rise in the amount of hackers eager to get their
hands on one of your juicy passwords.

When practiced properly, the third element should not affect you in your de-
cision to use the second. However, we’ve observed many cases in which a
hacker would create an innocent-looking site under the guise of a Facebook
log-in page and ask you for your credentials. Surely enough, you can just
look at the address bar before typing any information to check whether the
login page really belongs to Facebook. But, can you risk it?

The problem we see now is that many websites are adopting Facebook’s
“Connect” and OpenID to allow for one-click logins to access a website. You
sometimes don’t even have the choice of making a separate account on that
site, meaning you can’t “opt out” of these SSOs. Sure, your information
stays safe with that site, but it’s also stored within a central database under
Facebook’s control. While there’s nothing wrong with this, there’s just too
much risk involved in putting all your sensitive data from all over the web
into one massive identity bubble.
www.smartsignin.com
                                                        www.facebook.com/smartsignin
                                                          www.twitter.com/smartsignin


The other problem is that you’re putting your information into a social net-
work with more users than the entire population of India. Here’s our take on
this:

· Facebook is not at all a discreet network. Literally anyone can see your ac-
count with the proper know-how.

· Even with a tight password, someone will find a way to access your ac-
count. You stick your head out of the water even further by interacting on
the network. Just look at what happened to Facebook’s own creator early in
2011. It’s an embarrassing situation! Later that year, something even more
embarrassing happened.

· You expose yourself to too much of an information give-away, as Facebook
has been known to give information about its users to others from time to
time.

Now you’re probably thinking about…

What to Do

We’re not trying to tell you to stop relying on websites that integrate Face-
book Connect or other types of SSO login solutions. It’s understandable that
you don’t want to splash different copies of your identity everywhere on the
web. But try using these features on casual websites as much as you can.

If you want an SSO solution, opt for something better that will protect multi-
ple identities, not one single giant blob waiting to burst. Secure SSO should
be used with important identities, such as your own website’s authentication
and payment gateways. SmartSignin comes to mind, giving you the ability to
store multiple different user names and passwords into one database. Since
it’s not a social network, it won’t be out in the open. The interface allows you
to perform one-click sign-ins from a single point without having to worry
about security or a vindictive person trying to batter your account into sub-
mission.

Think about it. You invest a lot of your identity into the Internet. Don’t allow
someone to sweep in and use your identity in malicious ways. Choose a solu-
tion that will allow you to have several layers of fortification in front of you.

More Related Content

What's hot

Online safety 101
Online safety 101Online safety 101
Online safety 101Greg Bold
 
RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013EMC
 
Mobile wallets 5 nov14
Mobile wallets 5 nov14Mobile wallets 5 nov14
Mobile wallets 5 nov14Naval OPSEC
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Ronak Jain
 
5 ways criminals use facebook
5 ways criminals use facebook5 ways criminals use facebook
5 ways criminals use facebookWilliam Grieve
 
Online registration 25 aug14
Online registration 25 aug14Online registration 25 aug14
Online registration 25 aug14Naval OPSEC
 
Child safety 16 jun14
Child safety 16 jun14Child safety 16 jun14
Child safety 16 jun14Naval OPSEC
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet- Mark - Fullbright
 
Designing for Privacy in Mobile and Web Apps - Interaction '14, Amsterdam
Designing for Privacy in Mobile and Web Apps - Interaction '14, AmsterdamDesigning for Privacy in Mobile and Web Apps - Interaction '14, Amsterdam
Designing for Privacy in Mobile and Web Apps - Interaction '14, AmsterdamAmber Case
 
Linked in 10mar15
Linked in 10mar15Linked in 10mar15
Linked in 10mar15Naval OPSEC
 
UMAR YAHAYA
UMAR YAHAYAUMAR YAHAYA
UMAR YAHAYAUmar Zai
 

What's hot (20)

Facebook
FacebookFacebook
Facebook
 
Online safety 101
Online safety 101Online safety 101
Online safety 101
 
Facebook
FacebookFacebook
Facebook
 
Social Network Crime on Rise
Social Network Crime on RiseSocial Network Crime on Rise
Social Network Crime on Rise
 
RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013
 
Protecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile PhishingProtecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile Phishing
 
Mobile wallets 5 nov14
Mobile wallets 5 nov14Mobile wallets 5 nov14
Mobile wallets 5 nov14
 
Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacksCompilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
 
5 ways criminals use facebook
5 ways criminals use facebook5 ways criminals use facebook
5 ways criminals use facebook
 
Online registration 25 aug14
Online registration 25 aug14Online registration 25 aug14
Online registration 25 aug14
 
Child safety 16 jun14
Child safety 16 jun14Child safety 16 jun14
Child safety 16 jun14
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
Social Media
Social MediaSocial Media
Social Media
 
Designing for Privacy in Mobile and Web Apps - Interaction '14, Amsterdam
Designing for Privacy in Mobile and Web Apps - Interaction '14, AmsterdamDesigning for Privacy in Mobile and Web Apps - Interaction '14, Amsterdam
Designing for Privacy in Mobile and Web Apps - Interaction '14, Amsterdam
 
Staying safe online
Staying safe onlineStaying safe online
Staying safe online
 
Linked in 10mar15
Linked in 10mar15Linked in 10mar15
Linked in 10mar15
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
So692 cyber security-document
So692 cyber security-documentSo692 cyber security-document
So692 cyber security-document
 
UMAR YAHAYA
UMAR YAHAYAUMAR YAHAYA
UMAR YAHAYA
 

Viewers also liked

Facebook Questionnaire Results
Facebook Questionnaire ResultsFacebook Questionnaire Results
Facebook Questionnaire ResultsXavier_Vale
 
Students' use of self-governed Facebook groups
Students' use of self-governed Facebook groupsStudents' use of self-governed Facebook groups
Students' use of self-governed Facebook groupsJanus Aaen
 
Making sense of facebook, ree14
Making sense of facebook, ree14Making sense of facebook, ree14
Making sense of facebook, ree14Janus Aaen
 
Knight Foundation
Knight FoundationKnight Foundation
Knight FoundationBeth Kanter
 
Mobile strategy for community news and engagement
Mobile strategy for community news and engagementMobile strategy for community news and engagement
Mobile strategy for community news and engagementAmy Gahran
 

Viewers also liked (7)

Facebook Questionnaire Results
Facebook Questionnaire ResultsFacebook Questionnaire Results
Facebook Questionnaire Results
 
Students' use of self-governed Facebook groups
Students' use of self-governed Facebook groupsStudents' use of self-governed Facebook groups
Students' use of self-governed Facebook groups
 
Question 5
Question 5Question 5
Question 5
 
Making sense of facebook, ree14
Making sense of facebook, ree14Making sense of facebook, ree14
Making sense of facebook, ree14
 
Knight Foundation
Knight FoundationKnight Foundation
Knight Foundation
 
Mobile strategy for community news and engagement
Mobile strategy for community news and engagementMobile strategy for community news and engagement
Mobile strategy for community news and engagement
 
Facebook Project
Facebook ProjectFacebook Project
Facebook Project
 

Similar to Does facebook federation have your best interests at heart

obtain additional security
obtain additional security 
obtain additional security
obtain additional security snobbishmishap958
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonPhil Cryer
 
obtain additional security
obtain additional security 
obtain additional security
obtain additional security offbeatnominee633
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook securityErnest Staats
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-securityrobert mota
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.STO STRATEGY
 
SOCIAL Networking Sites
SOCIAL Networking SitesSOCIAL Networking Sites
SOCIAL Networking SitesAshley Surabhi
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social webPhil Cryer
 
Group 2 privacy and me in a web 2.0 world final
Group 2   privacy and me in a web 2.0 world  finalGroup 2   privacy and me in a web 2.0 world  final
Group 2 privacy and me in a web 2.0 world finalshanikosh
 
Question 4 - 2k15 Exam Preparation Day
Question 4 - 2k15 Exam Preparation DayQuestion 4 - 2k15 Exam Preparation Day
Question 4 - 2k15 Exam Preparation DayLeon Marsden
 
Impact on social networks
Impact on social networksImpact on social networks
Impact on social networksBhargava Ganti
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacyRozell Sneede
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethetecnologico de tuxtepec
 
Part Security Threats A Facebook data breach revealed more.docx
Part Security Threats A Facebook data breach revealed more.docxPart Security Threats A Facebook data breach revealed more.docx
Part Security Threats A Facebook data breach revealed more.docxwrite4
 

Similar to Does facebook federation have your best interests at heart (20)

obtain additional security
obtain additional security 
obtain additional security
obtain additional security
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
security procedures
security procedures
security procedures
security procedures
 
obtain additional security
obtain additional security 
obtain additional security
obtain additional security
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-security
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
SOCIAL Networking Sites
SOCIAL Networking SitesSOCIAL Networking Sites
SOCIAL Networking Sites
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social web
 
IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?
 
Group 2 privacy and me in a web 2.0 world final
Group 2   privacy and me in a web 2.0 world  finalGroup 2   privacy and me in a web 2.0 world  final
Group 2 privacy and me in a web 2.0 world final
 
Question 4 - 2k15 Exam Preparation Day
Question 4 - 2k15 Exam Preparation DayQuestion 4 - 2k15 Exam Preparation Day
Question 4 - 2k15 Exam Preparation Day
 
Impact on social networks
Impact on social networksImpact on social networks
Impact on social networks
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacy
 
Social networking
Social networkingSocial networking
Social networking
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethe
 
Part Security Threats A Facebook data breach revealed more.docx
Part Security Threats A Facebook data breach revealed more.docxPart Security Threats A Facebook data breach revealed more.docx
Part Security Threats A Facebook data breach revealed more.docx
 

Recently uploaded

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Does facebook federation have your best interests at heart

  • 1. www.smartsignin.com www.facebook.com/smartsignin www.twitter.com/smartsignin Does Facebook Federation Have Your Best Interests At Heart? Facebook offers Facebook Connect. Open ID offers, well, OpenID. But, does the latest craze with Facebook login integration considering the security of those of us who have sensitive information to protect? 1.) The aggressive and steadfast rise of the Cloud and its many forms, in- cluding SaaS, IDaaS, and Cloud storage. 2.) The rise of Single Sign-On (SSO), or identity management, services hosted by Facebook – as Facebook Connect and OpenID. 3.) The equally aggressive rise in the amount of hackers eager to get their hands on one of your juicy passwords. When practiced properly, the third element should not affect you in your de- cision to use the second. However, we’ve observed many cases in which a hacker would create an innocent-looking site under the guise of a Facebook log-in page and ask you for your credentials. Surely enough, you can just look at the address bar before typing any information to check whether the login page really belongs to Facebook. But, can you risk it? The problem we see now is that many websites are adopting Facebook’s “Connect” and OpenID to allow for one-click logins to access a website. You sometimes don’t even have the choice of making a separate account on that site, meaning you can’t “opt out” of these SSOs. Sure, your information stays safe with that site, but it’s also stored within a central database under Facebook’s control. While there’s nothing wrong with this, there’s just too much risk involved in putting all your sensitive data from all over the web into one massive identity bubble.
  • 2. www.smartsignin.com www.facebook.com/smartsignin www.twitter.com/smartsignin The other problem is that you’re putting your information into a social net- work with more users than the entire population of India. Here’s our take on this: · Facebook is not at all a discreet network. Literally anyone can see your ac- count with the proper know-how. · Even with a tight password, someone will find a way to access your ac- count. You stick your head out of the water even further by interacting on the network. Just look at what happened to Facebook’s own creator early in 2011. It’s an embarrassing situation! Later that year, something even more embarrassing happened. · You expose yourself to too much of an information give-away, as Facebook has been known to give information about its users to others from time to time. Now you’re probably thinking about… What to Do We’re not trying to tell you to stop relying on websites that integrate Face- book Connect or other types of SSO login solutions. It’s understandable that you don’t want to splash different copies of your identity everywhere on the web. But try using these features on casual websites as much as you can. If you want an SSO solution, opt for something better that will protect multi- ple identities, not one single giant blob waiting to burst. Secure SSO should be used with important identities, such as your own website’s authentication and payment gateways. SmartSignin comes to mind, giving you the ability to store multiple different user names and passwords into one database. Since it’s not a social network, it won’t be out in the open. The interface allows you to perform one-click sign-ins from a single point without having to worry about security or a vindictive person trying to batter your account into sub- mission. Think about it. You invest a lot of your identity into the Internet. Don’t allow someone to sweep in and use your identity in malicious ways. Choose a solu- tion that will allow you to have several layers of fortification in front of you.