Skip to main content

On the (Non-)anonymity of Anonymous Social Networks

  • Conference paper
  • First Online:
E-Democracy – Privacy-Preserving, Secure, Intelligent E-Government Services (e-Democracy 2017)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 792))

Included in the following conference series:

Abstract

The anonymity provided by the so-called anonymous social networks is studied in this paper. In particular, five popular anonymous social networks - namely, Social Number, Anomo, Whisper, Candid and the Yik Yak - are being analysed, in terms of investigating the data that are being processed by the corresponding mobile applications on Android systems. The results show that there is personal data processing in place which in some cases may result in tracking or even identification of the users and, thus, anonymity is not ensured.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abrosimova, K.: Developing an Anonymous Social Networking App. https://yalantis.com/blog/anonymous-social-network-development/

  2. Anomo. http://www.anomo.com

  3. Article 29 Working Party: Opinion 5/2014 on Anonymization Techniques (2014). http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp216_en.pdf

  4. Article 29 Working Party: Opinion 9/2014 on the application of Directive 2002/58/EC to device fingerprinting (2014). http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp224_en.pdf

  5. Burp Suite. https://portswingger.net/burp

  6. Candid. http://www.getcandid.com

  7. Correa, D., Silva, R.A., Mondal, M., Benevenuto, F., Gummadi, K.P.: The many shades of anonymity: characterizing anonymous social media content. In: 9th International Conference on Web and Social Media (ICWSM), pp. 71–80. AAAI Press (2015)

    Google Scholar 

  8. Díaz, I., Ralescu, A.: Privacy issues in social networks: a brief survey. In: Greco, S., Bouchon-Meunier, B., Coletti, G., Fedrizzi, M., Matarazzo, B., Yager, R.R. (eds.) IPMU 2012. CCIS, vol. 300, pp. 509–518. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31724-8_53

    Chapter  Google Scholar 

  9. Eckersley, P.: How unique is your web browser? In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 1–18. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14527-8_1

    Chapter  Google Scholar 

  10. European Commission: Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Off. J. L. 281(31–50) (1995)

    Google Scholar 

  11. European Union: Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation). Off. J. L. 119(1) (2016)

    Google Scholar 

  12. European Union Agency For Network And Information Security: Privacy by design in big data - An overview of privacy enhancing technologies in the era of big data analytics, December 2015. https://www.enisa.europa.eu/publications/big-data-protection

  13. Hafiz, M., Fang, M.: Game of detections: how are security vulnerabilities discovered in the wild? Empir. Softw. Eng. 21, 1920–1959 (2016)

    Article  Google Scholar 

  14. Junco, R.: Yik Yak and Online Anonymity are Good for College Students. Wired (2015). https://www.wired.com/2015/03/yik-yak-online-anonymity-good-college-students/

  15. Mobile Security Wiki. https://mobilesecuritywiki.com/

  16. Moonsamy, V., Batten, L.: Mitigating man-in-the-middle attacks on smartphones - a discussion of SSL pinning and DNSSec. In: Proceedings of the 12th Australian Information Security Management Conference (AISM), pp. 5–13 (2014)

    Google Scholar 

  17. Pew Research Center: Anonymity, Privacy, and Security Online, September 2013. http://pewinternet.org/Reports/2013/Anonymity-online.aspx

  18. Rovo89: Xposed module repository. http://repo.xposed.info

  19. Social Number. https://socialnumber.com

  20. Son, S., Kim, D., Shmatikov, V.: What mobile ads know about mobile users. In: Network and Distributed System Security Symposium (2016)

    Google Scholar 

  21. Tzortzaki, E., Kitsiou, A., Sideri, M., Gritzalis, S.: Self-disclosure, privacy concerns and social capital benefits interaction in FB: a case study. In: ACM International Conference Proceeding Series (ICPS), PCI 2016, p. 32 (2016)

    Google Scholar 

  22. Wang, G., Wang, B., Wang, T., Nika, A., Zheng, H., Zhao, B.Y.: Whispers in the dark: analysis of an anonymous social network. In: IMC 2014, pp. 137–150. ACM (2014)

    Google Scholar 

  23. Whisper. http://whisper.sh

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Konstantinos Limniotis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chatzistefanou, V., Limniotis, K. (2017). On the (Non-)anonymity of Anonymous Social Networks. In: Katsikas, S., Zorkadis, V. (eds) E-Democracy – Privacy-Preserving, Secure, Intelligent E-Government Services. e-Democracy 2017. Communications in Computer and Information Science, vol 792. Springer, Cham. https://doi.org/10.1007/978-3-319-71117-1_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-71117-1_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-71116-4

  • Online ISBN: 978-3-319-71117-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics