What is a “Click Farm” – #Fraud #Politics #Activism #Privacy #Security — #ClickFarm – @alayanimajneb

click farm is a form of click fraud, where a large group of low-paid workers are hired to click on paid advertising links for the click fraudster (click farm master or click farmer). The workers click the links, surf the target website for a period of time, and possibly sign up for newsletters prior to clicking another link. For many of these workers, clicking on enough ads per day may increase their revenue substantially and may also be an alternative to other types of work. It is extremely difficult for an automated filter to detect this simulated traffic as fake because the visitor behavior appears exactly the same as that of an actual legitimate visitor.

Fake likes generating from click farms are essentially different from those arising from bots where computer programs are written by software experts. To deal with such issues, companies such as Facebook are trying to create algorithms that seek to wipe out accounts with unusual activity (e.g. liking too many pages in a short period of time).

…..

Facebook issued a statement stating: “A like that doesn’t come from someone truly interested in connecting with the brand benefits no one. If you run a Facebook page and someone offers you a boost in your fan count in return for money, our advice is to walk away – not least because it is against our rules and there is a good chance those likes will be deleted by our automatic systems. We investigate and monitor “like-vendors” and if we find that they are selling fake likes, or generating conversations from fake profiles, we will quickly block them from our platform.”[6] Andrea Faville reported that Alphabet Inc. companies, Google and YouTube, “take action against bad actors that seek to game our systems.”[10] LinkedIn spokesman Doug Madey said buying connections “dilutes the member experience violates their user agreement and can also prompt account closures.”[10] Chief executive and founder of Instagram, Kevin Systrom reports “We’ve been deactivating spammy accounts from Instagram on an ongoing basis to improve your experience.”[14]

Facebook’s purging of fake likes and accounts occurred from August to September 2012.[15] According to Facebook’s 2014 financial report to the Securities and Exchange Commission, an estimated 83 million false accounts were deleted, accounting for approximately 6.4% of the 1.3 billion total accounts on Facebook.[16] Likester reported pages affected include Lady Gaga, who lost 65,505 fans and Facebook, who lost 124,919 fake likes.[17] Technology giant Dell lost 107,889 likes (2.87% of its total likes) in 24 hours.[15]Billions of YouTube video fake views were deleted after being exposed by auditors.[18] In December 2014, Instagram carried out a purge deemed the “Instagram Rapture” wherein many accounts were affected—including Instagram’s own account, which lost 18,880,211 followers.[14]

SOURCE: https://en.wikipedia.org/wiki/Click_farm

Anuncios

Things You Need to Know About #Facebook and Mass #Manipulation – #Privacy #Security @alayanimajneb

As the number of websites increased on the internet, the registration process became redundant. You had to remember multiple usernames and passwords. This became a serious problem for users and websites. If the onboarding process is not convenient, user drop off rates would be higher.

Facebook and other social networks came up with the idea of sharing their login system. If you have a website, you can easily integrate “Login with Facebook”.

This was a win-win situation for everyone.

  1. For the user because they don’t have to go through the hassle of registration and remembering passwords.
  2. For websites because they can easily onboard customers.
  3. For facebook because it’s free marketing, a growth hack that will enable them to reach more users.

The problem is when they did more than just sharing their login system. Facebook collected a lot of information about the user. The biggest trick facebook ever pulled was users didn’t feel they were giving away so much information. They made a system that allowed users to share their information with applications outside of Facebook. This was done with the consent of the user.

There was a loophole, it not only allowed a user to share his information but it also allowed him to share his friend’s information. This would happen without the consent of their friends.

If Mary was using an app that uses Facebook’s login, she can permit that app to allow access to her friend’s information. They won’t even know about it.

Moving fast and breaking things came at the cost of user’s privacy. Something they should have put thought into. Facebook later fixed the loophole of allowing people to share information about his/her friends. It was too late though.

The shared login system gained massive adoption, there came a new category of apps called Social Apps. These apps simply used user’s or their friend’s information to accomplish tasks.

Social apps got data effortlessly, things you spoke to your networks since you joined Facebook were given away with a click of a button.

Cambridge Analytica used personality quiz apps to collect information about Facebook’s users. Cambridge Analytica was not the only app which collected such data. There are thousands of such apps and they still hold a lot of data.

These datasets were used to make predictive models.

Amazon uses predictive models to derive insights out of your past purchases and predict the probability of you buying a given product. They later email you with product recommendations.

Predictive models are no rocket science, it is simply based on patterns. Patterns are everywhere, there is a pattern in the way you write, talk, buy etc.

Target Figured Out A Teen Girl Was Pregnant Before Her Father Did. Here target had a massive dataset of purchases made by several people. People who were pregnant had a common pattern in the purchases they made. Simply put they bought the same kind of products. These models are not 100% accurate, but around 85%–95%, that’s good enough.

Here, the personality quiz contained information about the fears of the users. These fears were mapped to the kind of brands and products they like. Once a predictive model is built out of these massive datasets. This process can work two ways.

The brands and product you like can predict your fears. So even though a lot of people didn’t take a personality quiz, their fears could be predicted using their Facebook ‘likes’.

Using people’s fears to manipulate them is one of the tactics of persuasion. This is exploited by politicians and it is evident in their messaging. Read the book Win Bigly by Scott Adams, it is about the weapon-grade persuasive tactics used by Donald Trump.

So combining data science with the psychology of influence, tailored content were created that would make a mass influence for the United States Election, 2017. Facebook allows pinpoint targeting, they not only allow targeting based on age, gender location. But, also to a given set of user IDs.

This is extensively used in India by the political parties. Even trusted media, don’t verify the authenticity of such posts before publishing them.

<

Facebook built a system to manipulate us. They apologised and are claiming to improve things. There is something even worse, you need to know.

When you browse through newsfeed, spend time on each post, make comments, send private messages to your friends, etc. You are likely to be tracked and your data is sent to algorithms. Later, tailor contented is pushed to hijack your time and money.

Along with the fight against Racism, Gender Inequality, etc. we need to fight such tech companies who have built evil systems to hijack people.

Don’t consume every content from media, remember its only someone’s opinion, sometimes a lie.

Pop OS Linux – Nueva Distribucion | #Linux #CodigoLibre #DiNOaWindows | @Ubuntu @Microsoft

Liberado Pop!_OS 19.04 con Gnome 3.32, Kernel 5.0 y mas !

Los desarrolladores de System76 anunciaron hace pocos días el lanzamiento de la nueva versión de su sistema operativo Pop! _OS 19.04, la cual llega justo pocos días después del lanzamiento oficial de Ubuntu 19.04 Disco Dingo.

Para aquellos que desconozcan de esta distribución, deben saber que Pop!_OS es una distribución de Linux basada en Ubuntu, esta es desarrollada por System76 el cual es un famoso fabricante de equipos con Linux preinstalado.

Cuenta con el entorno de escritorio Gnome el cual tiene su propio tema GTK e iconos.

En este punto, tal vez algunos de ustedes se pregunten ¿Qué difiere de Ubuntu, si es igual a este en cuanto a la base, aplicaciones y apariencia?

System76 creo esta distribución tomando lo mejor de Ubuntu y también de Elementary OS, con el fin de ofrecer un sistema que este diseñado acorde a sus productos.

Ya que va especialmente enfocado para la creación de modelos de 3D, inteligencia artificial, diseño y otras cosas.

El fin de ofrecer Pop!_OS es que sus clientes tengan no solo un buen equipo de cómputo, si no que vaya también acompañado de un sistema que aproveche y exprima el máximo de los componentes de este.

En esta distribución podrás encontrar dos imágenes del sistema para poder escoger de las cuales son, una disponible para sistemas Intel/AMD y otra para NVIDIA. También cabe destacar que el sistema solo esta dieñado para la arquitectura de 64 bits (esto por las características de los equipos que ofrece).

¿Qué hay de nuevo en Pop! _OS 19.04?

Dentro de las novedades que se encuentran dentro de Pop! _OS 19.04, al igual que Ubuntu 19.04 Disco Dingo, esteviene con Gnome 3.32 y Kernel de Linux 5.0.

Mientras que System76 agrega su propio sabor visual a GNOME 3.32 seguramente trae mejoras de rendimiento que hacen que las animaciones sean más rápidas y un sistema en general más rápido.

En lo que respecta a Kernel de Linux 5.0 además de llegar con las novedades que se anunciaron en el lanzamiento de esta versión (puedes consultar el artículo en este enlace) los desarrolladores de System 76 añaden otras tantas mejoras regulares de soporte de pantalla y hardware.

pop os

Otros de los cambios que se destacan en este nuevo lanzamiento de Pop! _OS 19.04 son los cambios en el diseño de sus iconos.

Los iconos para Pop! _OS, aplicaciones, archivos y las carpetas se han rediseñado para complementar los iconos de Gnome bajo sus nuevas pautas de diseño.

Nuevas características

Pop! _OS  19.04 añade nuevas funciones al sistema de las cuales podemos destacar la opción “Modo delgado”que maximiza el espacio de la pantalla al reducir la altura del título en la ventana de la aplicación.

Otro de los cambios destacados en esta nueva versión es “el modo oscuro” que le da a las aplicaciones el ambiente de visión nocturna.

Además, se ha añadido una nueva opción de “Actualizar instalación” que le permite al usuario reinstalar el sistema operativo sin perder su cuenta de usuario y los datos almacenados en Inicio.

Esta sin duda es una excelente opción, ya que permitirá a los usuarios de esta nueva versión de Pop!_OS poder actualizar a versiones posteriores sin perder sus datos.

¿Cómo actualizar de Pop! _OS 18.10 a 19.04?

Si son usuarios de la versión anterior de Pop! _OS 18.10 y quieren actualizar a esta nueva versión sin tener que realizar una instalación en limpio.

Pueden ejecutar los comandos de actualización desde una terminal en su sistema, con los cuales podrán conservar sus datos, usuario y aplicaciones.

También deberán deshabilitar todos aquellos repositorios de terceros añadidos a su sistema, esto con el fin de evitar posibles conflictos con la actualización.

Pueden consultar la publicación realizada por un compañero de como actualizar a Ubuntu 19.04, donde los procesos descritos aplican sin problemas para Pop!_OS. El enlace es este.

Los comandos a ejecutar para actualizar son:

1
2
3
4
5
6
7
sudo apt update
sudo apt install pop-desktop
sudo apt full-upgrade
do-release-upgrade

En caso de que esté interesado en una instalación nueva, puede encontrar los archivos ISO y torrent para los sistemas Nvidia y AMD en la página de descarga del blog oficial del sistema

7th. of 7 Signs to Diagnost If You are a Social Media Stalker | #Internet #SocialMedia #Privacidad #Seguridad #Cyberbullying

To begin, here some key questions:

  • Do you find yourself obsessed with everyone else’s lives?
  • Do you get the majority of your information from social media?
  • Would you be able to permanently disconnect yourself from social media outlets?

In General, Social media is a forum that opens a lot of doors but can also be rather obsessive – especially if find yourself pretending to be Inspector Gadget. Do you think you have a social media problem?

Here are seven signs you’re a social media stalker.

Number 7

 

Are your NEWS sources reliable ?

Your News “Main” Source is Social Media

Whether it be finding out someone is pregnant, getting married or moving – your news source is social media.

You’re so disconnected from your friends, that you find out what’s going on with everyone via social media.

You often find yourself commenting immediately when one of your friends posts a status update or photograph.

FOLLOW THIS TIPS !

10 Most Reliable News Sources
(From # 10 to # 1)
  • Wall Street Journal. 
  • New York Times. 
  • BBC. …
  • NPR. …
  • Snopes. …
  • Reuters. …
  • The Economist. …
  • PBS…
  • C-Span…
  • The Associated Press …

 

 

6th. of 7 Signs to Diagnost If You are a Social Media Stalker | #Internet #SocialMedia #Privacidad #Seguridad #Cyberbullying

To begin, here some key questions:

  • Do you find yourself obsessed with everyone else’s lives?
  • Do you get the majority of your information from social media?
  • Would you be able to permanently disconnect yourself from social media outlets?

In General, Social media is a forum that opens a lot of doors but can also be rather obsessive – especially if find yourself pretending to be Inspector Gadget. Do you think you have a social media problem?

Here are seven signs you’re a social media stalker.

Number 6

Have you a social media problem? Or are you IT ? !

Social Media References

You find yourself making constant social media references.

When having conversations you’ll consistently refer to the “conversations” that you saw on Facebook or Twitter, – these could be conversations you actually interacted in or ones that you just scoped out.

While social media has proved to be an effective medium of communication, there are some concerns.

Because of the vast amount, the door for social networking abuse is left wide open.

About Social Networking

Social networking actually existed before Facebook. Online communities began building in the late 1990s with sites such as Classmates and SixDegrees. It wasn’t until around 2005 when social networking exploded with MySpace, Facebook and Xanga.

Although these online social communities have many positive attributes, there is one major negative attribute that all these sites have in common: Social networking abuse.

How Social Networking Abuse Occurs

There is nothing too technical about how people go about abusing others on social networks. It’s actually very simple: People lie. There are, of course, more complicated technical ways such as hacking into user accounts, accessing e-mail address books and finding and posting fake pictures so the abuser appears as someone he or she is actually not. Regardless, abuse happens when people lie and unfortunately, it is becoming more common as social networking sites begin to grow.

An Open Door for Predators

Here is the most common scenario for social network predators:

  • The predator opens an account using a fake name and birth date.
  • The predator will post a picture of someone else, usually a picture of someone around the same age of the predators “target group.”
  • The predator then is open to troll around the social networking websites as, for example, a 16-year-old girl when really the predator is a 42-year-old pedophile.

The Statistics

  • A study conducted by the Crimes Against Children Research Center, one in seven children aged 10 to 17 were victims of an online sexual solicitation.
  • In that same study, one-third of the children in this age group received what is called “aggressive sexual solicitation”. This means the predator asked to physically meet them, corresponded with them through regular mail (meaning the child gave the predator his or her home address) and/or received gifts.

Other Abusers

Unfortunately, sexual predators are not the only social network abusers; there are also cyber bullies.

About Cyber Bullying

Cyber bullying is a lot like real-life bullying and incidences are on the rise. Bullies often add users to their online network of friends, with the intention of being anything but. The bully then begins to harass the user in much the same way he or she would harass a victim in person through the use of teasing, derogatory remarks and put-downs (often referred to as “flaming”). Other ways cyber bullies harass their victims is through by listing the people they do not like and writing derogatory remarks about them on their pages. A final thought about cyber bullying is that one of the most common reasons reported as to why it is on the rise is due to the anonymity offered by the Internet. Bullies on the Internet are less likely to get in trouble than a bully on the playground because they do not have to use their real names or pictures online. Instead, they use screen names and avatars.

How to Help Prevent Abuse

The only way to completely protect young people from abuse on social networks is to banish Internet use all together. Since that is never going to happen, here are a few steps young adults, children and parents can take in order to help prevent abuse on social networks.

Children and Young Adults

  • Never engage – Don’t respond to unsolicited e-mail or friend requests. There is no way of knowing who is asking to be your friend. Yes, it could be someone you know, but it also could be a predator. Don’t take the risk, simply do not engage.
  • Make your account private – Only the people you choose will be on your friends list.
  • Block users – If cyber bullying is occurring through e-mail, block the user’s address.
  • Never give out personal information – This includes real name, home address, phone number and age.
  • Report unwanted sexual solicitations – Sexual solicitations must be reported to your local authorities. If you plan on doing so, be sure to keep a copy of whatever the predator has been sending you.
  • Report cyber bullying – you can report cyber bulling to school officials and law enforcement.

For Parents

  • Monitor computer usage – This becomes more difficult as children grow into teenagers. Having an open and honest dialogue with your teen-aged children will help them understand your concerns and worries.
  • Use parental locks – Each computer operating system is a little different, explore yours and get to know how to properly use locks and limits.
  • E-mail forwarding – Have your young child’s e-mail forwarded to your e-mail, while keeping a copy locally in his or her account.

A Final Word About Abuse

There is no sure fire way to stay 100 percent safe on the Internet. The only things a user and parent can do is stay aware and alert of predators and cyber bullies.

 

 

5th. of 7 Signs to Diagnost If You are a Social Media Stalker | #Internet #SocialMedia #Privacidad #Seguridad #Cyberbullying

To begin, here some key questions:

  • Do you find yourself obsessed with everyone else’s lives?
  • Do you get the majority of your information from social media?
  • Would you be able to permanently disconnect yourself from social media outlets?

In General, Social media is a forum that opens a lot of doors but can also be rather obsessive – especially if find yourself pretending to be Inspector Gadget. Do you think you have a social media problem?

Here are seven signs you’re a social media stalker.

Number 5

 

Are there any “know it all” ? Are you one of them ?

Stranger Danger

You can give a basic life run down of complete strangers – who are friends of friends and even possibly friends of friends of friends.

Or of people who are only mere acquaintances.

Gossip is idle talk or rumor, especially about the personal or private affairs of others; the act is also known as dishing or tattling.

 

How To Avoid Spreading Gossip in 5 Easy Steps
  • Step 1: Don’t be that person who listens to smack about others. Simple as that. …
  • Step 2: Ask yourself why you are spreading rumors.
  • Step 3: Remember what it feels like. …
  • Step 4: Be indifferent to gossip about yourself. …
  • Step 5: Focus on the positive.

 

4th. of 7 Signs to Diagnost If You are a Social Media Stalker | #Internet #SocialMedia #Privacidad #Seguridad #Cyberbullying

To begin, here some key questions:

  • Do you find yourself obsessed with everyone else’s lives?
  • Do you get the majority of your information from social media?
  • Would you be able to permanently disconnect yourself from social media outlets?

In General, Social media is a forum that opens a lot of doors but can also be rather obsessive – especially if find yourself pretending to be Inspector Gadget. Do you think you have a social media problem?

Here are seven signs you’re a social media stalker.

Number 4

Judging a person does not define who they are, it defines who you are !

Fake Friending

You only friend people because you’re nosey. You would never actually say hello or high five these “friends” in public.

Your only reason for friending them is so you know what’s going on in their lives and you can judge them.

Don’t pass judgment. If you find yourself being judgmental, stop yourself. …
Understand. Instead of judging someone for what he’s done or how he looks, try instead to understand the person. …
Accept. Once you begin to understand, or at least think you kind of understand, try to accept. …
Love.

3rd. of 7 Signs to Diagnost If You are a Social Media Stalker | #Internet #SocialMedia #Privacidad #Seguridad #Cyberbullying

To begin, here some key questions:

  • Do you find yourself obsessed with everyone else’s lives?
  • Do you get the majority of your information from social media?
  • Would you be able to permanently disconnect yourself from social media outlets?

In General, Social media is a forum that opens a lot of doors but can also be rather obsessive – especially if find yourself pretending to be Inspector Gadget. Do you think you have a social media problem?

Here are seven signs you’re a social media stalker.

Number 3 

Message in a bubble !

Comment Conversations

You only have conversations via comment threads on your friend’s threads.

You don’t pick up the phone anymore, to see how your circle is doing – you’d rather just scroll down and type.

Calling ? Who calls anyways !

 

Another of 7 Signs to Diagnost If You are a Social Media Stalker | #Internet #SocialMedia #Privacidad #Seguridad #Cyberbullying

To begin, here some key questions:

  • Do you find yourself obsessed with everyone else’s lives?
  • Do you get the majority of your information from social media?
  • Would you be able to permanently disconnect yourself from social media outlets?

In General, Social media is a forum that opens a lot of doors but can also be rather obsessive – especially if find yourself pretending to be Inspector Gadget. Do you think you have a social media problem?

Here are seven signs you’re a social media stalker.

Number 2

Obsessed ?

Constant Updates

You can’t go an hour without checking a social media outlet for the latest update on what everyone is doing.

Yes, this still counts even if you check multiple social media outlets during different times a day.

Stalking everybody !

 

App que roba datos bancarios de los usuarios del sistema #Android / #Privacidad #Seguridad

BankBot, un peligroso troyano bancario para Android que se hace pasar por el juego Jewels Star Classic.

Un troyano, un software que se hace pasar como legitimo pero en realidad roba los datos bancarios de las personas, ha sido detectado por los investigadores de la compañía Eset.

Se trata de BankBot, un código malicioso que logró filtrarse en la tienda de aplicaciones de Android haciéndose pasar por un juego llamado Jewels Star Classic.  La firma de seguridad advirtió que más de 5.000 instalaron la aplicación.

Al descargar esta versión de Jewels Star Classic, se obtiene un juego de Android que funciona, pero que tiene algunas características maliciosas: ‘malware’ bancario y un servicio malicioso que espera ser ejecutado tras una ventana de tiempo preconfigurada.

Según informan los investigadores, el servicio malicioso se activa 20 minutos después de la primera ejecución del juego. El dispositivo infectado muestra una alerta impulsando al usuario a habilitar algo llamado ‘Google Service’. Esta alerta aparece independientemente de la actividad que esté llevando a cabo el usuario, sin conexión aparente con el juego.

Al momento que el usuario acepta la alerta, el ‘virus’ se instala como aplicación de SMS por defecto y obtiene permiso para sobreescribir otras aplicaciones. Una vez que se ejecutan estas tareas, el ‘malware’ intenta robar los datos de las tarjetas de crédito de las víctimas.

Haciéndose pasar por el videojuego Jewels Star Classic, ha logrado infectar miles de usuarios.

¿Cómo saber si mi equipo está infectado?

Si en su celular encuentra la presencia de una ‘app’ llamada ‘Google Update’, un administrador de dispositivo activo llamado ‘System update’ y la aparición repetida de alerta de ‘Google Service’, es probable que esté infectado.

Para limpiar manualmente un dispositivo, primero se necesita deshabilitar los derechos de administrador de ‘System Update’, luego proceder a desinstalar tanto ‘Google Update’ como la aplicación troyanizada asociada, en este caso Jewel Star Classic.

Evite ser estafado

Para no caer en manos de los cibercriminales, Eset recomienda darle prioridad a las tiendas de aplicaciones oficiales y no a las alternativas.

Tenga presente además que antes de descargar una aplicación, es importante verificar su popularidad mirando el número de instalaciones, las calificaciones y los comentarios de los usuarios anteriores.