Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Privacy, openness, trust and transparency on Wikipedia

Type
Slides
Tags
privacy, trust
Event
Chaos Communication Congress 26th (26C3) 2009
Indexed on
Mar 25, 2013
URL
http://events.ccc.de/congress/2009/Fahrplan/attachments/1504_Privacy,%20openness,%20trust%20and%20transparency%20on%20Wikipedia%20(sockpuppets).pdf
File name
1504_Privacy,%20openness,%20trust%20and%20transparency%20on%20Wikipedia%20(sockpuppets).pdf
File size
1.4 MB
MD5
8d29486e9236644713bb655a785edd1d
SHA1
9a75511adf86cf5e07329afe7806d6d410c29821

Wikipedia's enormous growth during this decade, which has made it a "poster child of Web 2.0", has been enabled by its "anyone can edit" philosophy – external credentials are not required, and one still doesn't even need to set up a user account to change the content of one of the planet's most visited websites. This radical openness created unsurprising vulnerabilites (to vandalism, libel, copyright violations, introduction of bias, organized PR activities, etc.), but it is balanced by an equally radical transparency, where even minuscule actions of editors are recorded indefinitely. This talk will describe some of the structures, methods, and tools that the Wikipedia community has developed over the years to defend the project from these vulnerabilities, and to establish its internal reputation system. The main focus will be on the investigation of "sockpuppets" (multiple accounts operated by the same person), or rather their abuse. For contributions made without logging into an account, the originating IP address is recorded publicly, so topics like open proxies, TOR or geolocation became important for Wikipedians, and many of them have come to recognize certain IP ranges of certain ISPs immediately... However, the IP addresses used by logged-in editors are hidden due to privacy concerns, and can only be requested (together with additional data from the HTTP headers – user agents and XFF) by a few trusted users via the "CheckUser" function of the MediaWiki software. And on the other hand, the edit history of an account contains a wealth of public information which is analyzed in many ways by Wikipedians. I will describe several of them and relate some of these home-grown methods to results from forensic linguistics and stylometry (research fields with a long history). I will also give a brief summary of statistical concepts – and known fallacies – related to sockpuppet investigations. At the same time, these tools and techniques can reveal a lot of sensitive information (I will give concrete examples), and highlight the privacy issues that Wikipedia's transparency creates for its contributors.

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !