Skip to main content

Fixbook

INTRODUCTION
These days social media has become an integral part of our lives and consists of all our real-world experiences. It has become a norm to share everything we do to everywhere we go with the whole world using social media. But unknowingly many people sometimes share things which might reveal their personal information like phone numbers and locations. They don’t realize that what they are sharing might come back and bite them in the future. The only thing on their mind while posting a status is the idea of sharing their activities, because of which they don’t make an informed decision about the content. Our solution to this problem is to nudge the user when they are about to post something which might reveal their personal information like location or phone number or email address.  
Another problem that users face is finding posts and comments with undesirable content in their feed. Our solution to this is to hide such posts and comments.

METHODOLOGY
Nudge
We created a chrome extension to solve this problem which works for Facebook.
When the user starts typing a Facebook post the chrome extension issues a REST API server call with the status as the input, then the server processes it and a reply is sent stating whether the post contains any private information like location, phone number or email address. If it does, then the extension shows a nudge to the user telling them what kind of information they are sharing. After this, it's the user’s choice whether to ignore the nudge or edit the post.




Working of REST server
The server gets a string as input and then it uses a regex to check for phone numbers and email addresses in the string. It uses NLTK to check for a location in the string. While checking for the location it checks for the context as well for example ‘Delhi is an awesome place’ won’t fire the nudge but ‘moving to Delhi’ will.
A REST server was used because NLTK does not support Javascript and also so that all the computation is handled by the server and not the host. This would also make the whole process real-time.
 



Hiding Content
It takes a comma-separated list of words from the user that they deem undesirable. Whenever a new comment or post is loaded, using these keywords the extension checks if it contains one of the words if it does then that post or comment is hidden from that user’s timeline.



CONCLUSION
We successfully built a chrome extension with the desired functionalities. On posting a status with personal information, the extension nudged every time. However, we faced a few limitations. Due to the shortcomings of the NLTK library, the extension could not always accurately detect when the user is referring to a location.


THE TEAM



Group 3: [L-R] - Pahal Krishnia, Ishbir Walia, Aayushi Malik, Gargi Gupta, Varnit Jain


REFERENCES
1. http://www.django-rest-framework.org/
2. http://www.nltk.org/
3. https://developer.chrome.com/extensions/getstarted
4. https://docs.python.org/2/library/re.html
5. https://firebase.google.com

Comments

Popular posts from this blog

Identifying Tinder Profiles on Facebook

Identifying Tinder Profiles on Facebook In the online world, everything that you ever put is linked and connected. You might think that you’ve put some information on one platform and that’s it, you’re good to go. But you, my friend, are sadly mistaken. With this thought in mind and the privacy concerns linked with Online Social Media, we would like to introduce you to our problem statement: Identifying Facebook Profiles from Tinder Profiles. Given a tinder profile, our aim is to identify the corresponding Facebook profile of that person. We are addressing the linkability issue here and trying to highlight how more information than what you’ve mentioned on Tinder can be picked up from your Facebook profile. For those who don’t know, Tinder is a Dating Platform available for a Mobile Application and a Web App. It shows the geographically close profiles around you and you have an option to right swipe(Like) or left swipe(Dislike) them. When two people right swipe each other then it’

iFROOSN: Incentivised Fake Reviews On OSNs with Yelp as the reference

Yelp is an OSN primarily used to popularise the businesses and give reviews about those business. Yelp can be used as an efficient business expander for many upcoming restaurants/spas/saloons who always look for new customers. Problem Statement Our main objective of this course project was to target fake/incentivised reviews on yelp and give a credibility score using which a new user of Yelp can get an overall estimate about the restaurant he/she will visit .We developed an application which required an business ID of yelp as an input and it gave the credibility score as the output along with some inferred results in form of graphs Dataset The primary requirement before starting the project was collecting dataset for Yelp business and corresponding reviews and details about the user which post these reviews .The dataset was obtained through Yelp dataset challenge which was available for academic usage and result collections .The database had predefined schema and

Inference Attacks On OSN's

INTRODUCTION TWITTER is a popular online social network and microbloging service for exchanging messages (also known as tweets) among people, supported by a huge ecosystem. Twitter announces that it has over 140 million active users creating more than 340 million messages every day [26] and over one million registered applications built by more than 750,000 developers [25]. The third party applications include client applications for various platforms, such as Windows, Mac, iOS, and Android, and web-based applications such as URL shortening services, image-sharing services, and news feeds. Among the third party services, URL shortening services which provide a short alias of a long URL is an essential service for Twitter users who want to share long URLs via tweets having length restriction. Twitter allows users to post up to 140-character tweets containing only texts. Therefore, when users want to share complicated information (e.g., news and multimedia), they should include a UR