A place to cache linked articles (think custom and personal wayback machine)
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

index.html 23KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170
  1. <!doctype html><!-- This is a valid HTML5 document. -->
  2. <!-- Screen readers, SEO, extensions and so on. -->
  3. <html lang="fr">
  4. <!-- Has to be within the first 1024 bytes, hence before the <title>
  5. See: https://www.w3.org/TR/2012/CR-html5-20121217/document-metadata.html#charset -->
  6. <meta charset="utf-8">
  7. <!-- Why no `X-UA-Compatible` meta: https://stackoverflow.com/a/6771584 -->
  8. <!-- The viewport meta is quite crowded and we are responsible for that.
  9. See: https://codepen.io/tigt/post/meta-viewport-for-2015 -->
  10. <meta name="viewport" content="width=device-width,initial-scale=1">
  11. <!-- Required to make a valid HTML5 document. -->
  12. <title>Teens have figured out how to mess with Instagram's tracking algorithm (archive) — David Larlet</title>
  13. <!-- Generated from https://realfavicongenerator.net/ such a mess. -->
  14. <link rel="apple-touch-icon" sizes="180x180" href="/static/david/icons2/apple-touch-icon.png">
  15. <link rel="icon" type="image/png" sizes="32x32" href="/static/david/icons2/favicon-32x32.png">
  16. <link rel="icon" type="image/png" sizes="16x16" href="/static/david/icons2/favicon-16x16.png">
  17. <link rel="manifest" href="/static/david/icons2/site.webmanifest">
  18. <link rel="mask-icon" href="/static/david/icons2/safari-pinned-tab.svg" color="#07486c">
  19. <link rel="shortcut icon" href="/static/david/icons2/favicon.ico">
  20. <meta name="msapplication-TileColor" content="#f0f0ea">
  21. <meta name="msapplication-config" content="/static/david/icons2/browserconfig.xml">
  22. <meta name="theme-color" content="#f0f0ea">
  23. <!-- Thank you Florens! -->
  24. <link rel="stylesheet" href="/static/david/css/style_2020-02-24.css">
  25. <!-- See https://www.zachleat.com/web/comprehensive-webfonts/ for the trade-off. -->
  26. <link rel="preload" href="/static/david/css/fonts/triplicate_t4_poly_regular.woff2" as="font" type="font/woff2" crossorigin>
  27. <link rel="preload" href="/static/david/css/fonts/triplicate_t4_poly_bold.woff2" as="font" type="font/woff2" crossorigin>
  28. <link rel="preload" href="/static/david/css/fonts/triplicate_t4_poly_italic.woff2" as="font" type="font/woff2" crossorigin>
  29. <meta name="robots" content="noindex, nofollow">
  30. <meta content="origin-when-cross-origin" name="referrer">
  31. <!-- Canonical URL for SEO purposes -->
  32. <link rel="canonical" href="https://www.cnet.com/news/teens-have-figured-out-how-to-mess-with-instagrams-tracking-algorithm/">
  33. <body class="remarkdown h1-underline h2-underline h3-underline hr-center ul-star pre-tick">
  34. <article>
  35. <h1>Teens have figured out how to mess with Instagram's tracking algorithm</h1>
  36. <h2><a href="https://www.cnet.com/news/teens-have-figured-out-how-to-mess-with-instagrams-tracking-algorithm/">Source originale du contenu</a></h2>
  37. <figure class="image image-large pull-none hasCaption shortcode" section="shortcodeImage"><span class="imageContainer"><span><img src="https://cnet1.cbsistatic.com/img/qB6JKfEh5iyID0DBcjPoZEadZ9c=/1092x0/2020/02/03/e35fcf81-ddef-49e7-9f5a-b7e413981d75/ig-groups.jpg" class="" alt="ig-groups"/></span></span><figcaption><span class="caption"><p>Teens have been using group accounts on Instagram to feed randomized data to the social network and protect their privacy. </p></span><span class="credit">
  38. Alfred Ng / CNET
  39. </span></figcaption></figure>
  40. <p class="speakableTextP1">Like about a billion other people, 17-year-old Samantha Mosley spent her Saturday afternoon perusing <a href="https://www.cnet.com/tags/instagram/" data-annotation="true" data-component="linkTracker" data-link-tracker-options="{&quot;action&quot;:&quot;inline-annotation|Instagram|CNET_TAG|525&quot;}" section="annotation">Instagram</a>. </p>
  41. <p class="speakableTextP2">She was taking a glance at the Explore tab, a feature on Instagram that shows you posts tailored for your interests based on algorithms that track your online activities and target posts to your feed. </p>
  42. <p>But unlike many of Instagram's users, Mosley and her high school friends in Maryland had figured out a way to fool tracking by the Facebook-owned social network. On the first visit, her Explore tab showed images of Kobe Bryant. Then on a refresh, cooking guides, and after another refresh, animals. </p>
  43. <p>"I've never looked at animals on this account," Mosley mentioned in Washington, DC. At the hacker conference Shmoocon, along with her father, Russell Mosley, she'd just given a presentation on how teens were keeping their accounts private from Instagram.</p>
  44. <aside class="pullQuote">
  45. "I like knowing that if someone were to find my account, they're not going to be able to track my movement."
  46. <p>Samantha Mosley, high school student</p>
  47. </aside>
  48. <p>Each time she refreshed the Explore tab, it was a completely different topic, none of which she was interested in. That's because Mosley wasn't the only person using this account -- it belonged to a group of her friends, at least five of whom could be on at any given time. Maybe they couldn't hide their data footprints, but they could at least leave hundreds behind to confuse trackers.</p>
  49. <p>These teenagers are relying on a sophisticated network of trusted Instagram users to post content from multiple different devices, from multiple different locations. </p>
  50. <p>If you wanted to confuse Instagram, here's how.</p>
  51. <p>First, make multiple accounts. You might have an Instagram account dedicated to you and friends, or another just for your hobby. Give access to one of these low-risk accounts to someone you trust.</p>
  52. <p>Then request a password reset, and send the link to that trusted friend who'll log on from a different device. Password resets don't end Instagram sessions, so both you and the second person will be able to access the same account at the same time.</p>
  53. <p>Finally, by having someone <em>else</em> post the photo, Instagram grabs metadata from a new, fresh device. Repeat this process with a network of, say, 20 users in 20 different locations with 20 different devices? Now you're giving Instagram quite the confusing cocktail of data. </p>
  54. <p>"They might be like, 'Hey, you posted from this hamburger place in Germany, maybe you like Germany, or hamburgers, or traveling, we'll just throw everything at you,'" Mosley said. "We fluctuate who's sending to what account. One week I might be sending to 17 accounts, and then the next week I only have four."</p>
  55. <p>Facebook said that this method was not against its policies, but didn't recommend it to people because of security concerns. </p>
  56. <h2>Keeping track</h2>
  57. <p>Nearly everything you do online is tracked. Tech giants like <a href="https://www.cnet.com/tags/facebook/" data-annotation="true" data-component="linkTracker" data-link-tracker-options="{&quot;action&quot;:&quot;inline-annotation|Facebook|CNET_TAG|258&quot;}" section="annotation">Facebook</a> and <a href="https://www.cnet.com/google/" data-annotation="true" data-component="linkTracker" data-link-tracker-options="{&quot;action&quot;:&quot;inline-annotation|Google|CNET_TAG|210&quot;}" section="annotation">Google</a> follow what you do on their services, as well as off. It's why you might start seeing more posts related to puppies on Instagram after purchasing dog food on Amazon, for example. </p>
  58. <p><a href="https://www.cnet.com/apple/" data-annotation="true" data-component="linkTracker" data-link-tracker-options="{&quot;action&quot;:&quot;inline-annotation|Apple|CNET_TAG|225&quot;}" section="annotation">Apple</a> and Google have <a href="https://support.apple.com/en-us/HT205223" rel="noopener noreferrer nofollow" target="_blank">advertising IDs for iOS</a> and <a href="https://support.google.com/authorizedbuyers/answer/3221407?hl=en" rel="noopener noreferrer" target="_blank">Android devices</a>, respectively, which allow for targeting in <a href="https://www.cnet.com/topics/mobile-apps/" data-annotation="true" data-component="linkTracker" data-link-tracker-options="{&quot;action&quot;:&quot;inline-annotation|Mobile Apps|CNET_CAT_TOPIC|450&quot;}" section="annotation">mobile apps</a> based on where you're posting from and what you've been looking at. Similarly, Facebook has its tracking pixels across websites so it knows <a href="https://www.cnet.com/news/heres-how-facebook-collects-your-data-when-youre-logged-out/">where you've visited online and can measure data</a> such as if you purchased an item or how long you've been on the page.  </p>
  59. <p>Beyond that, <a href="https://www.cnet.com/news/hackers-infiltrated-a-big-facebook-data-partner-to-launch-scams/">companies like LiveRamp</a> partner with hundreds of marketers to help connect offline activities with online identities. Students have found themselves increasingly tracked, sometimes by concerned parents and other times by school administrators using technology like <a href="https://www.npr.org/2018/05/21/613117571/how-schools-across-the-country-are-working-to-detect-threats-made-on-social-medi" rel="noopener noreferrer nofollow" target="_blank">Social Sentinel to mine students' data on social networks</a>.</p>
  60. <p><svg class="svg-symbol playerControls"><symbol id="play" viewbox="0 0 26.6 32"><path d="M0,2.6c0-2.4,1.6-3.3,3.7-2L25,13.7c2,1.3,2,3.2,0,4.5L3.7,31.4c-2,1.3-3.7,0.3-3.7-2C0,29.4,0,2.6,0,2.6z"/></symbol><symbol id="pause" viewbox="0 0 26.6 32"><g><polygon points="16,32 26.5,32 26.5,8.8 26.5,0 16,0"/><rect x="0.1" y="0"/></g></symbol><symbol id="playlist" viewbox="0 0 32 22.9"><g><circle class="st11" cx="2.3" cy="20.6" r="2.3"/><circle class="st11" cx="2.3" cy="11.4" r="2.3"/><circle class="st11" cx="2.3" cy="2.3" r="2.3"/><path class="st11" d="M32,1.1C32,0.5,31.5,0,30.9,0H10.3C9.7,0,9.1,0.5,9.1,1.1v2.3c0,0.6,0.5,1.1,1.1,1.1h20.6c0.6,0,1.1-0.5,1.1-1.1V1.1z"/><path class="st11" d="M32,10.3c0-0.6-0.5-1.1-1.1-1.1H10.3c-0.6,0-1.1,0.5-1.1,1.1v2.3c0,0.6,0.5,1.1,1.1,1.1h20.6c0.6,0,1.1-0.5,1.1-1.1V10.3z"/><path class="st11" d="M32,19.4c0-0.6-0.5-1.1-1.1-1.1H10.3c-0.6,0-1.1,0.5-1.1,1.1v2.3c0,0.6,0.5,1.1,1.1,1.1h20.6c0.6,0,1.1-0.5,1.1-1.1V19.4z"/></g></symbol><symbol id="speaker-on" viewbox="0 0 32 28.1"><g><g><path d="M12.6,5L6.3,8.7H0.6C0.3,8.7,0,9,0,9.3V19c0,0.4,0.3,0.7,0.6,0.7h5.9l6.1,3.4c1.3,0.8,1.5,0.2,1.5-1.5V6.5C14.2,4.8,13.9,4.2,12.6,5z"/></g><path d="M18,23.1v-2.8c2.6,0,4.7-2.8,4.7-6.2S20.6,7.8,18,7.8V5c4.2,0,7.5,4,7.5,9S22.1,23.1,18,23.1z"/><path d="M21.3,28.1v-2.8c4.4,0,7.9-5,7.9-11.2S25.6,2.8,21.3,2.8V0C27.2,0,32,6.3,32,14C32,21.8,27.2,28.1,21.3,28.1z"/></g></symbol><symbol id="speaker-off" viewbox="0 0 32 18.8"><g><g><path d="M12.6,0.4L6.3,4H0.6C0.3,4,0,4.3,0,4.7v9.7c0,0.4,0.3,0.7,0.6,0.7h5.9l6.1,3.4c1.3,0.8,1.5,0.2,1.5-1.5V1.8C14.2,0.2,13.9-0.5,12.6,0.4z"/></g><polygon points="32,4.5 30.2,2.7 25.3,7.6 20.4,2.7 18.6,4.5 23.5,9.4 18.6,14.3 20.4,16.1 25.3,11.2 30.2,16.1 32,14.3 27.1,9.4 "/></g></symbol><symbol id="captions" viewbox="0 0 32 16.2"><g><path d="M8.6,16.2c-1.2,0-2.4-0.2-3.4-0.6c-1.1-0.4-2-0.9-2.7-1.6c-0.8-0.7-1.4-1.6-1.8-2.6C0.2,10.4,0,9.3,0,8.1c0-1.2,0.2-2.3,0.7-3.3s1-1.8,1.8-2.6C3.2,1.5,4.1,1,5.2,0.6S7.4,0,8.6,0c1,0,1.9,0.1,2.7,0.4c0.8,0.3,1.4,0.6,2,1.1c0.6,0.4,1.1,0.9,1.4,1.5c0.4,0.5,0.7,1.1,0.9,1.6l-4.1,1.9c-0.1-0.3-0.2-0.6-0.4-0.9C11,5.3,10.8,5,10.5,4.8c-0.3-0.2-0.6-0.4-0.9-0.5c-0.3-0.1-0.7-0.2-1-0.2C8,4.2,7.5,4.3,7,4.5C6.6,4.7,6.2,5,5.8,5.3C5.5,5.7,5.2,6.1,5.1,6.5C4.9,7,4.8,7.5,4.8,8.1c0,0.5,0.1,1.1,0.3,1.5c0.2,0.5,0.4,0.9,0.8,1.2c0.3,0.4,0.7,0.6,1.2,0.8C7.5,11.9,8,12,8.6,12c0.3,0,0.7-0.1,1-0.2c0.3-0.1,0.6-0.3,0.9-0.5c0.3-0.2,0.5-0.4,0.7-0.7c0.2-0.3,0.3-0.6,0.4-0.9l4.1,1.9c-0.2,0.5-0.5,1-0.9,1.6c-0.4,0.5-0.9,1-1.4,1.5c-0.6,0.4-1.2,0.8-2,1.1C10.5,16,9.6,16.2,8.6,16.2z"/><path d="M24.9,16.2c-1.2,0-2.4-0.2-3.4-0.6c-1.1-0.4-2-0.9-2.7-1.6c-0.8-0.7-1.4-1.6-1.8-2.6c-0.4-1-0.7-2.1-0.7-3.3c0-1.2,0.2-2.3,0.7-3.3c0.4-1,1-1.8,1.8-2.6c0.8-0.7,1.7-1.3,2.7-1.7C22.6,0.2,23.7,0,24.9,0c1,0,1.9,0.1,2.7,0.4c0.8,0.3,1.4,0.6,2,1.1c0.6,0.4,1.1,0.9,1.4,1.5C31.5,3.5,31.8,4,32,4.5l-4.1,1.9c-0.1-0.3-0.2-0.6-0.4-0.9c-0.2-0.3-0.4-0.5-0.7-0.7c-0.3-0.2-0.6-0.4-0.9-0.5c-0.3-0.1-0.7-0.2-1-0.2c-0.6,0-1.1,0.1-1.5,0.3c-0.5,0.2-0.9,0.5-1.2,0.8c-0.3,0.4-0.6,0.8-0.8,1.2c-0.2,0.5-0.3,1-0.3,1.5c0,0.5,0.1,1.1,0.3,1.5c0.2,0.5,0.4,0.9,0.8,1.2c0.3,0.4,0.7,0.6,1.2,0.8c0.5,0.2,1,0.3,1.5,0.3c0.3,0,0.7-0.1,1-0.2c0.3-0.1,0.6-0.3,0.9-0.5c0.3-0.2,0.5-0.4,0.7-0.7c0.2-0.3,0.3-0.6,0.4-0.9l4.1,1.9c-0.2,0.5-0.5,1-0.9,1.6c-0.4,0.5-0.9,1-1.4,1.5c-0.6,0.4-1.2,0.8-2,1.1C26.8,16,25.9,16.2,24.9,16.2z"/></g></symbol><symbol id="share" viewbox="0 0 32 20"><path d="M20,6c0,0-7.9-0.1-13.2,3.3C1.6,12.7,0,20,0,20s5.1-5.4,9.8-7.2C14.9,10.9,20,12,20,12v6l12-8L20,0V6z"/></symbol><symbol id="fullscreen" viewbox="0 0 32 32"><g><g><polygon class="st11" points="11.4,0 0,0 0,11.4 3.4,8 9.1,13.7 13.7,9.1 8,3.4 &#9;&#9;&#9;"/></g><g><polygon class="st11" points="20.6,32 32,32 32,20.6 28.6,24 22.9,18.3 18.3,22.9 24,28.6 &#9;&#9;&#9;"/></g><g><polygon class="st11" points="32,11.4 32,0 20.6,0 24,3.4 18.3,9.1 22.9,13.7 28.6,8 &#9;&#9;&#9;"/></g><g><polygon class="st11" points="0,20.6 0,32 11.4,32 8,28.6 13.7,22.9 9.1,18.3 3.4,24 &#9;&#9;&#9;"/></g></g></symbol><symbol id="video" viewbox="0 0 32 22"><g><path d="M29,2.2c-0.7,0.2-4.6,3-7.9,5.3V2.1C21.1,1,20.1,0,19,0H2.1C1,0,0,1,0,2.1v17.7C0,21,1,22,2.1,22H19c1.2,0,2.1-1,2.1-2.1v-5.9c3.3,2.4,7.4,5.4,8.2,5.6c1.4,0.4,2.7-0.1,2.7-0.1V2.2C32,2.2,30.1,1.8,29,2.2z"/></g></symbol></svg></p>
  61. <p>Though social networks' public code applies strictly to public posts, data partners use it to obtain a plethora of metadata about people. And tech giants and school administrators aren't the only <a href="https://www.cnet.com/tags/privacy/" data-annotation="true" data-component="linkTracker" data-link-tracker-options="{&quot;action&quot;:&quot;inline-annotation|Privacy|CNET_TAG|277&quot;}" section="annotation">privacy</a> concerns for students, Mosley said. It's college recruiters and potential employers, too. </p>
  62. <p>"We find out that colleges and jobs are looking for our social media," Mosley said. "We're trying to live our best life and not have to worry about people watching us and watching every moment we make and have that be associated to our real life."</p>
  63. <p>College admissions and employers only know students from their social media posts, says Mosley. But an online identity is different from real life.  </p>
  64. <p>"It's an identity people can follow, but we didn't want it to be our true identity that people can find in real life," she said. </p>
  65. <h2>Group effort</h2>
  66. <p>Maintaining privacy by hiding in a group isn't a new concept, even as teens start to apply it to Instagram. </p>
  67. <p>Loyalty rewards cards from stores, for example, collect a lot of data about people like their shopping habits and preferences. In return, customers get points or discounts to apply to their purchases. But privacy-savvy shoppers figured out a workaround: They could <a href="https://firstmonday.org/article/view/3493/2955" rel="noopener noreferrer nofollow" target="_blank">share the cards</a> through pooling groups online, essentially flooding data brokers with a ton of irrelevant data.</p>
  68. <p>Software developers have also started providing tools to obscure your data on social networks. In 2018, a developer shared a <a href="https://www.shift8web.ca/2018/03/delete-facebook-how-to-poison-obfuscate-and-purge-your-facebook-data-before-deleting-your-account/" rel="noopener noreferrer nofollow" target="_blank">script for a tool that would "poison" your Facebook data</a> by replacing old posts with random lines of code, making it difficult for the social network to build a profile for advertisers. </p>
  69. <aside class="pullQuote">
  70. "I love that the younger generation is thinking along these lines, but it bothers me when we have to come up with these strategies to avoid being tracked."
  71. <p>Liz O'Sullivan, technology director, Surveillance Technology Oversight Project </p>
  72. </aside>
  73. <p>Jennifer Grygiel, an assistant professor at Syracuse University who studies social media, said the teens' privacy measures were innovative, albeit a little extreme. Still, they saw it as an effective method to counter censorship for students.</p>
  74. <p>"Teens have grown up with knowledge that their privacy is being collected by some of these apps," Grygiel said. "Maybe one of these accounts is critical of their school, or they're engaging in activism and they're worried about repercussion with their local authorities." </p>
  75. <p>They also warned that if any one person posted malicious content on the group, every person involved could be held accountable. <br/><br/>It takes work to keep your data private on Instagram. Not only do you have to coordinate with multiple people on who has access to what account and who's posting for which account at any given time, it requires complete trust that someone won't abuse the access. </p>
  76. <p>Teens shouldn't have to go to those lengths to socialize privately on Instagram, said Liz O'Sullivan, technology director at the Surveillance Technology Oversight Project. </p>
  77. <p>"I love that the younger generation is thinking along these lines, but it bothers me when we have to come up with these strategies to avoid being tracked," O'Sullivan said. "She shouldn't have to have these psyop [psychological operations] networks with multiple people working to hide her identity from Instagram. The platform should just have an account that works and lets people feel safe about being on social media."</p>
  78. <h2>Do it for the gram</h2>
  79. <figure class="image image-large pull-none hasCaption shortcode" section="shortcodeImage"><span class="imageContainer"><span><img src="" class="lazy " alt="mosely-02597" data-original="https://cnet4.cbsistatic.com/img/GsaYSatYxXp9el214aPp-aTwcG4=/1092x0/2020/02/04/36effb85-7cba-4003-a9ab-034349de79fb/mosely-02597.jpg"/></span><noscript><span><img src="https://cnet4.cbsistatic.com/img/GsaYSatYxXp9el214aPp-aTwcG4=/1092x0/2020/02/04/36effb85-7cba-4003-a9ab-034349de79fb/mosely-02597.jpg" class="" alt="mosely-02597"/></span></noscript></span><figcaption><span class="caption"><p>Russell Mosley (left) and his daughter Samantha Mosley presenting at Shmoocon on Feb. 1. </p></span><span class="credit">
  80. Justin Brand / Courtesy of Russell Mosley
  81. </span></figcaption></figure>
  82. <p>Mosley discovered the potential of her tactic after making an Instagram account for her First Lego League team in junior high school. The account was shared among members of the team, and they noticed it was serving up different content each time they used it. As an experiment, Mosley shared the account with her cousin, who lived out of state.</p>
  83. <p>That's when she and her friends realized the shared account could be used to obscure their data from Instagram's tracking. </p>
  84. <p>It's different than having a "finsta," a <a href="https://mashable.com/article/should-i-make-a-finsta-instagram/" rel="noopener noreferrer nofollow" target="_blank">fake Instagram account</a> for posting content you don't want shared to the world, Mosley explained. A finsta account gives you privacy from other people on Instagram, but not from Instagram itself, she said. </p>
  85. <p>"With a finsta, all the traffic is still coming from your device," Mosley said. "If you have it across a group, you can have real data from other people, and the data isn't coming from a <a href="https://www.cnet.com/best-vpn-services-directory/" data-annotation="true" data-component="linkTracker" data-link-tracker-options="{&quot;action&quot;:&quot;inline-annotation|VPN|CNET_EVERGREEN|150&quot;}" section="annotation">VPN</a>, it's coming from someone else's device." </p>
  86. <p>Mosley's father, Russell, delivered the presentation with her at Shmoocon, and later discussed how the group has security measures in place to make sure their other accounts are not compromised if one group member decides to go rogue. Russell Mosley is a chief information security officer at TISTA Science and Technology Corporation, and said he's spent a fair amount of time teaching Mosley about proper security hygiene. </p>
  87. <p>"Samantha has learned from me and her participation at security conferences why password sharing is bad, so when she does it, it's a unique password she doesn't use anywhere else that's generally garbage," he said.</p>
  88. <h2>A melting pot of data</h2>
  89. <p>The more people there are on one account, the more obscured the data is from Instagram, Samantha Mosley found. On average, one person could have about five people on their account, she said. </p>
  90. <p>In some cases, Mosley knows accounts with about 20 different people each. </p>
  91. <figure class="image image-large pull-none hasCaption shortcode" section="shortcodeImage"><span class="imageContainer"><span><img src="" class="lazy " alt="ig-chart" data-original="https://cnet4.cbsistatic.com/img/g9E8DWN1qEvjtBRS1nUuVnSbbLI=/1092x0/2020/02/03/bf0b6020-99b2-474b-a89f-8787fa80d0dc/ig-chart.jpg"/></span><noscript><span><img src="https://cnet4.cbsistatic.com/img/g9E8DWN1qEvjtBRS1nUuVnSbbLI=/1092x0/2020/02/03/bf0b6020-99b2-474b-a89f-8787fa80d0dc/ig-chart.jpg" class="" alt="ig-chart"/></span></noscript></span><figcaption><span class="caption"><p>This graph represents how the account sharing would work -- with important accounts exclusive, while other accounts are shared between friends to help obscure the data. </p></span><span class="credit">
  92. Alfred Ng / CNET -- modified from original chart by Samantha Mosley, images from ThisPersonDoesNotExist.com
  93. </span></figcaption></figure>
  94. <p>So while you would be the only one who could access a public account for potential college admissions officers to see, your account for a school group could be managed by four other people. At the same time you could be in group accounts for another set of people, Mosley explained. </p>
  95. <p>That network would be accessing the accounts and posting on the original owner's behalf, muddying the data that Instagram gets.</p>
  96. <p>The obfuscation network has grown so large there are friends in about nine other countries that are a part of it, with about five people in each country, she said. </p>
  97. <p>To gain trust and access to manage more accounts, Mosley said you have to follow basic ground rules. You can only post content that the original account owner asks for you to post, including the caption, and you aren't allowed to follow anyone or accept any follower requests if the account is private. </p>
  98. <p>"Likes" are a grey area, since you need other people to like various kinds of posts to alter Instagram's targeting. But the original account owner can always request to avoid liking certain types of content. </p>
  99. <p>Mosley noted that people who violate these rules will have their account access revoked. For the most part, this complicated network works for her group of friends. It's also started catching on with other kids at her school, who are making their own group account networks, she said. </p>
  100. <p>"I like knowing that if someone were to find my account, they're not going to be able to track my movement and know, 'she goes to this high school, these hours, she works here, and she's into these different things,'" Mosley said.</p>
  101. </article>
  102. <hr>
  103. <footer>
  104. <p>
  105. <a href="/david/" title="Aller à l’accueil">🏠</a> •
  106. <a href="/david/log/" title="Accès au flux RSS">🤖</a> •
  107. <a href="http://larlet.com" title="Go to my English profile" data-instant>🇨🇦</a> •
  108. <a href="mailto:david%40larlet.fr" title="Envoyer un courriel">📮</a> •
  109. <abbr title="Hébergeur : Alwaysdata, 62 rue Tiquetonne 75002 Paris, +33184162340">🧚</abbr>
  110. </p>
  111. </footer>
  112. <script src="/static/david/js/instantpage-3.0.0.min.js" type="module" defer></script>
  113. </body>
  114. </html>