<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/rss-style.xsl" type="text/xsl"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	    xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	     xmlns:dc="http://purl.org/dc/elements/1.1/"
	   xmlns:atom="http://www.w3.org/2005/Atom"
	     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	  xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>
<channel>
	<title>abuse &#8211; Terence Eden’s Blog</title>
	<atom:link href="https://shkspr.mobi/blog/tag/abuse/feed/" rel="self" type="application/rss+xml" />
	<link>https://shkspr.mobi/blog</link>
	<description>Regular nonsense about tech and its effects 🙃</description>
	<lastBuildDate>Fri, 05 Feb 2021 11:59:31 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://shkspr.mobi/blog/wp-content/uploads/2023/07/cropped-avatar-32x32.jpeg</url>
	<title>abuse &#8211; Terence Eden’s Blog</title>
	<link>https://shkspr.mobi/blog</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title><![CDATA[That's not my name! Practical problems in real name policies.]]></title>
		<link>https://shkspr.mobi/blog/2021/02/whats-my-name-again/</link>
					<comments>https://shkspr.mobi/blog/2021/02/whats-my-name-again/#comments</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Fri, 05 Feb 2021 12:18:04 +0000</pubDate>
				<category><![CDATA[/etc/]]></category>
		<category><![CDATA[abuse]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://shkspr.mobi/blog/?p=38015</guid>

					<description><![CDATA[Once in a while, big companies suggest that the answer to abuse is to ban anonymity and institute a Real Names policy. This time, it is Google&#039;s turn. They think that critical software should only be authored by people with &#34;real names&#34;.  I don&#039;t want to go into whether this is a good idea or not. Nor philosophical discussions of what a &#34;real name&#34; is. I want to discuss how this would work…]]></description>
										<content:encoded><![CDATA[<p>Once in a while, big companies suggest that the answer to abuse is to ban anonymity and institute a Real Names policy. This time, <a href="https://security.googleblog.com/2021/02/know-prevent-fix-framework-for-shifting.html">it is Google's turn</a>. They think that critical software should only be authored by people with "real names".</p>

<p>I don't want to go into whether this is a good idea or not. Nor philosophical discussions of what a "real name" is. I want to discuss how this would work practically.</p>

<p>Let's assume that a central website - like GitHub - decided to gather real names for contributors to critical software.</p>

<p>Let's also assume that every user has a passport, driving licence, or other suitable identification document.</p>

<p>How does a website:</p>

<ol>
<li>Determine the authenticity of the document?</li>
<li>Match the user to the person represented on the document?</li>
</ol>

<p>There are more questions - but those two will do to start with.</p>

<h2 id="document-authenticity"><a href="https://shkspr.mobi/blog/2021/02/whats-my-name-again/#document-authenticity">Document Authenticity</a></h2>

<p>Let's take passports as an example. A website might be able to see the expiry date on a passport - but how can they spot whether a passport is a forgery?</p>

<p>The UK has a (pilot) service to <a href="https://www.gov.uk/guidance/apply-for-the-document-checking-service-pilot-scheme">allow businesses to check the validity of a passport</a>. It's an API-based service which takes data from the presented passport and returns a simple yes/no to the passport's validity.</p>

<p>There are a <a href="https://en.wikipedia.org/wiki/List_of_passports">couple of hundred different passports</a> issued by a variety of countries and organisations. Does every passport have a simple way of checking validity?</p>

<p>The same is true of driving licences. The UK lets drivers <a href="https://www.gov.uk/view-driving-licence">share their licence information</a> - but there are hundreds of different issuing organisations around the world. How do you integrate with all of them?</p>

<p>Even if we assume that there's a meta-service which connects to <em>every single</em> passport and licence database and can <em>reliably</em> give a website a reasonable assurance that the document is valid - that only solves half the problem.</p>

<h2 id="person-authenticity"><a href="https://shkspr.mobi/blog/2021/02/whats-my-name-again/#person-authenticity">Person Authenticity</a></h2>

<p>How does a website know whether the person applying for an account is the same as the person on the document?</p>

<p>They can't accept a photo of the document. I've handed my ID over in a hundred dodgy bars and clubs around the world - I'm pretty sure plenty of people have a high-res scan of it.</p>

<p>Kids "borrow" their parents credit cards all the time for illicit Fortnite purchases. How can a website tell if the document has been briefly stolen from its owner?</p>

<p>Here are some things I've seen various services do:</p>

<ul>
<li>Ask for a photo of the user holding the document and a copy of today's paper.</li>
<li>Take a selfie and compare it to the photo on the document.</li>
<li>Get the user to record a short video of themselves reading the details off the document.</li>
</ul>

<p>Those are all fairly intensive and rely on a service being able to accurately match a photo of a user to a photo on a document.</p>

<p>Even if we assume that we can correctly authenticate the majority of identity documents and match them to the user, that still doesn't solve the problem of verification.</p>

<h2 id="account-authenticity"><a href="https://shkspr.mobi/blog/2021/02/whats-my-name-again/#account-authenticity">Account Authenticity</a></h2>

<p>What stops users from selling their accounts? Would a nefarious actor offer people a couple of quid to sign in to a website they've never heard of?  High profile accounts get sold or stolen all the time.</p>

<p>Google suggests that Multi-Factor Authentication would also provide an enhanced level of trust. But that doesn't prevent someone acting maliciously, whether out of choice or if they're being coerced.</p>

<p>Users move county, ID documents get revoked, data leaks, and mistakes get made.</p>

<p>Sure, a policy like this would probably place a higher barrier to entry to a service - but that would only prevent <em>casual</em> misbehaviour. It would do nothing to stop determined actors. It also comes with some insurmountable implementation difficulties.</p>

<p>Even if you think that a real name policy would solve some of the problems Google identifies - and that <em>everyone</em> has ID which shows their name - how would it work in practice?</p>

<hr>

<p>Bonus track:</p>

<iframe title="Dizzee Rascal - That's Not My Name (Live Lounge 3)" width="620" height="465" src="https://www.youtube.com/embed/5lveasISwCg?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen=""></iframe>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=38015&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2021/02/whats-my-name-again/feed/</wfw:commentRss>
			<slash:comments>10</slash:comments>
		
		
			</item>
		<item>
		<title><![CDATA[How To Add Twitter's "Report Abuse" Button To Your App]]></title>
		<link>https://shkspr.mobi/blog/2013/08/how-to-add-twitters-report-abuse-button-to-your-app/</link>
					<comments>https://shkspr.mobi/blog/2013/08/how-to-add-twitters-report-abuse-button-to-your-app/#respond</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Sun, 11 Aug 2013 08:11:26 +0000</pubDate>
				<category><![CDATA[mobile]]></category>
		<category><![CDATA[abuse]]></category>
		<category><![CDATA[api]]></category>
		<category><![CDATA[blocking]]></category>
		<category><![CDATA[twitter]]></category>
		<guid isPermaLink="false">http://shkspr.mobi/blog/?p=8591</guid>

					<description><![CDATA[You can&#039;t.  I mean, not officially.  There&#039;s nothing in the API documentation, and all my attempts to contact Twitter on this matter have been ignored.  If you&#039;re getting abuse on Twitter you have to use the official Twitter clients to report people.  No matter that 3rd party clients may be better at protecting your privacy, offering you a sanitised view of the people tweeting you, or enable you…]]></description>
										<content:encoded><![CDATA[<p>You can't.</p>

<p>I mean, not officially.  There's nothing in the API documentation, and all my attempts to contact Twitter on this matter have been ignored.  If you're getting abuse on Twitter you have to use the official Twitter clients to report people.  No matter that 3rd party clients may be better at protecting your privacy, offering you a sanitised view of the people tweeting you, or enable you to block offensive words or phrases.</p>

<p>In Twitter's increasing war on the developers who helped build it, they simply won't allow unofficial clients to implement this basic functionality.</p>

<p>The nearest you can get to providing this service to users is to throw them out to the official mobile website, directly to the report page.</p>

<pre>https://mobile.twitter.com/USER/STATUSID/report</pre>

<p>e.g.</p>

<pre>https://mobile.twitter.com/edent/status/363605088734298112/report</pre>

<img src="https://shkspr.mobi/blog/wp-content/uploads/2013/08/Abusive-Tweet.png" alt="Abusive Tweet" width="400" height="769" class="aligncenter size-full wp-image-8592">

<p>This, of course, ignores the fact that Twitter's mobile site may not work on the user's phone and may be blocked or monitored.</p>

<p>The problem of online abuse isn't unique to Twitter.  They realise that the majority of their visitors come to watch - and only rarely interact.  The big draws for these passive observers isn't their friends; it's "celebs".  If those celebs get driven off by abuse, will the userbase migrate elsewhere?</p>

<p>Twitter could have harnessed the power of its 3rd party developers, it could have set up crowd sourced monitoring, it could have behaved like a good Internet citizen and worked with their community.</p>

<p>Instead they've done the bare minimum to appease the baying masses without trying to understand or fix their underlying problems.  They've lost the trust of their 3rd party developers, lost the trust of those being abused, and will soon - I imagine - lose the trust of their star attractions.</p>

<p>Oh well. Fun while it lasted.</p>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=8591&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2013/08/how-to-add-twitters-report-abuse-button-to-your-app/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
