Alexro wrote:
> not to ignore privacy issues but just to simplify the situation a bit ...
> What currently protects a user from a malicious (desktop) application
stealing all
> kinds of user data via submitting tweets through it's proxy? And even by
> submitting such information directly to it's website?

That is a very good point. It is an unsolved problem that affects nearly all
installable software, and that is a problem that needs to be solved at the
operating system level. iPhone OS and the upcoming Windows 7 Phone do have
measures to protect against that kind of data theft and inadvertent
information disclosure; in fact, basically all of the API limitations in
Windows 7 Phone (no background apps, no access to the user's personal
information, warnings about GPS usage) can be traced back to privacy
protection. Similarly, even in desktop Windows, access to PIM information
(email and contacts in particular) is severely restricted with the official
APIs.

Location is a different because Twitter has special privacy protections for
its geo feature, including technical limitations that control whether
applications may use it, and a way to remove the location information from
tweets after the fact. I don't think it makes sense to have a lock for the
built-in location feature and at the same time allow applications to use
annotations to disclose the same (or even more precise) location information
regardless of that lock. If you can trust applications not to disclose
location information via annotations without the user's consent, why can't
you trust those same applications to not use the built-in geo feature
without the user's consent? If an application isn't trusted enough to be
able to flip the geo switch, why should it be trusted to not disclose the
user's location in a different way without the user's consent? At least with
the built-in geo feature, there is a built-in mechanism for the user to
remove the geo annotations, unlike other annotations.

It is the same deal with Twitter XAuth and website-only functionality. A
malicious Twitter XAuth application has full access to everything in the
user's account because it has the user's password. Meanwhile, the API
doesn't expose useful actions (sign up, approve followers, change password,
read email address) in an effort to prevent malicious applications from
using that functionality. But, of course, malicious applications don't
*need* any official API at all to perform those actions.

My conclusion is that the API restrictions punish well-behaved applications
due to fear that they may be malicious, but they don't actually prevent any
unwanted behavior by applications that actually are malicious. This is
something that Raffi touched on when he blogged about how he thinks that
every OAuth approval should be going through the Twitter website (i.e. no
Twitter XAuth). The annotations feature would compound that problem in a way
that can't be solved by disabling Twitter XAuth access to applications.

(Note that "Twitter XAuth" is different from, xauth.org XAuth.)

Regards,
Brian



-- 
Subscription settings: 
http://groups.google.com/group/twitter-development-talk/subscribe?hl=en

Reply via email to