1
804

Meta tried to gain a competitive advantage over its competitors, including Snapchat and later Amazon and YouTube, by analyzing the network traffic of how its users were interacting with Meta’s competitors. Given these apps’ use of encryption, Facebook needed to develop special technology to get around it.

Facebook’s engineers solution was to use Onavo, a VPN-like service that Facebook acquired in 2013. In 2019, Facebook shut down Onavo after a TechCrunch investigation revealed that Facebook had been secretly paying teenagers to use Onavo so the company could access all of their web activity.

After Zuckerberg’s email, the Onavo team took on the project and a month later proposed a solution: so-called kits that can be installed on iOS and Android that intercept traffic for specific subdomains, “allowing us to read what would otherwise be encrypted traffic so we can measure in-app usage,” read an email from July 2016. “This is a ‘man-in-the-middle’ approach.”

A man-in-the-middle attack — nowadays also called adversary-in-the-middle — is an attack where hackers intercept internet traffic flowing from one device to another over a network. When the network traffic is unencrypted, this type of attack allows the hackers to read the data inside, such as usernames, passwords, and other in-app activity.

2
154
submitted 5 months ago by sabreW4K3@lazysoci.al to c/fediverse@lemmy.ml
3
316
view more: next ›

Lemmy.institute

47 readers
0 users here now

Looking for a new home for your community of nerds? You've come to the right place. Lemmy.institute was created as a home for all kind of science and technology-related communities.

Community Guidelines

Please be respectful toward fellow members of the fediverse. We encourage open discussion, but we do not tolerate spam, harassment, or disrespectful behaviour. Let’s keep it civil!

Pornographic (NSFW) contents are not allowed.

Do you want to create and moderate a new community? Post a request at c/communityrequest

Misc

founded 1 year ago
ADMINS