Skip to main content
Top

2014 | OriginalPaper | Chapter

Sex, Lies, or Kittens? Investigating the Use of Snapchat’s Self-Destructing Messages

Authors : Franziska Roesner, Brian T. Gill, Tadayoshi Kohno

Published in: Financial Cryptography and Data Security

Publisher: Springer Berlin Heidelberg

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The privacy-related Snapchat smartphone application allows users to share time-limited photos or videos, which “disappear” after a specified number of seconds once opened. This paper describes the results of a user survey designed to help us understand how and why people use the Snapchat application. We surveyed 127 adult Snapchat users, finding that security is not a major concern for the majority of these respondents. We learn that most do not use Snapchat to send sensitive content (although up to 25 % may do so experimentally), that taking screenshots is not generally a violation of the sender’s trust but instead common and expected, that most respondents understand that messages can be recovered, and that security and privacy concerns are overshadowed by other influences on how and why respondents choose to use or not use Snapchat. Nevertheless, we find that a non-negligible fraction (though not a majority) of respondents have adapted or would adapt their behavior in response to understanding Snapchat’s (lack of) security properties, suggesting that there remains an opportunity for a more secure messaging application. We reflect on the implications of our findings for Snapchat and on the design of secure messaging applications.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
2
Respondents could select multiple answers: I set shorter timeouts for embarrassing photos; I set shorter timeouts for content containing secret information; I set longer timeouts for people I trust more. I set shorter timeouts for people I trust less; Other.
 
3
For each type of content in Fig. 2 that a respondent would not be willing to send via Snapchat, he/she could select multiple reasons for why not: I’m afraid someone will take a screenshot or photo; I don’t trust the Snapchat application; I never take pictures of that kind of thing; I don’t want to bother people; I don’t want it to disappear; I want to share it more publicly; I’d rather send it another way (such as using email, text message, Facebook, Twitter).
 
Literature
4.
go back to reference Borisov, N., Goldberg, I., Brewer, E.: Off-the-record communication, or, why not to use PGP. In: ACM Workshop on Privacy in the Electronic Society (2004) Borisov, N., Goldberg, I., Brewer, E.: Off-the-record communication, or, why not to use PGP. In: ACM Workshop on Privacy in the Electronic Society (2004)
5.
go back to reference Boyd, D., Marwick, A.E.: Social privacy in networked publics: teens attitudes, practices, and strategies. In: Oxford Internet Institute Decade in Internet Time Symposium (2011) Boyd, D., Marwick, A.E.: Social privacy in networked publics: teens attitudes, practices, and strategies. In: Oxford Internet Institute Decade in Internet Time Symposium (2011)
11.
go back to reference Geambasu, R., Kohno, T., Krishnamurthy, A., Levy, A., Levy, H.M., Gardner, P., Moscaritolo, V.: New directions for self-destructing data. Technical report UW-CSE-11-08-01, University of Washington (2011) Geambasu, R., Kohno, T., Krishnamurthy, A., Levy, A., Levy, H.M., Gardner, P., Moscaritolo, V.: New directions for self-destructing data. Technical report UW-CSE-11-08-01, University of Washington (2011)
12.
go back to reference Geambasu, R., Kohno, T., Levy, A., Levy, H.M.: Vanish: increasing data privacy with self-destructing data. In: 18th USENIX Security Symposium (2009) Geambasu, R., Kohno, T., Levy, A., Levy, H.M.: Vanish: increasing data privacy with self-destructing data. In: 18th USENIX Security Symposium (2009)
15.
go back to reference Johnson, M., Egelman, S., Bellovin, S.M.: Facebook and privacy: it’s complicated. In: 8th Symposium on Usable Privacy and Security (2012) Johnson, M., Egelman, S., Bellovin, S.M.: Facebook and privacy: it’s complicated. In: 8th Symposium on Usable Privacy and Security (2012)
18.
go back to reference Kumaraguru, P., Cranor, L.F.: Privacy indexes: A survey of Westin’s studies. Technical report CMU-ISRI-5-138, Institute for Software Research International, School of Computer Science, Carnegie Mellon University (2005) Kumaraguru, P., Cranor, L.F.: Privacy indexes: A survey of Westin’s studies. Technical report CMU-ISRI-5-138, Institute for Software Research International, School of Computer Science, Carnegie Mellon University (2005)
19.
go back to reference Liu, Y., Gummadi, K.P., Krishnamurthy, B., Mislove, A.: Analyzing Facebook privacy settings: user expectations vs. reality. In: Internet Measurement Conference (2011) Liu, Y., Gummadi, K.P., Krishnamurthy, B., Mislove, A.: Analyzing Facebook privacy settings: user expectations vs. reality. In: Internet Measurement Conference (2011)
20.
go back to reference Meeder, B., Tam, J., Kelley, P.G., Cranor, L.F.: RT @IWantPrivacy: widespread violation of privacy settings in the twitter social network. In: IEEE Workshop on Web 2.0 Security and Privacy (2010) Meeder, B., Tam, J., Kelley, P.G., Cranor, L.F.: RT @IWantPrivacy: widespread violation of privacy settings in the twitter social network. In: IEEE Workshop on Web 2.0 Security and Privacy (2010)
22.
go back to reference Perlman, R.: The ephemerizer: making data disappear. J. Inf. Syst. Secur. 1, 51–68 (2005) Perlman, R.: The ephemerizer: making data disappear. J. Inf. Syst. Secur. 1, 51–68 (2005)
23.
go back to reference Reardon, J., Basin, D., Capkun, S.: SoK: secure data deletion. In: IEEE Symposium on Security and Privacy (2013) Reardon, J., Basin, D., Capkun, S.: SoK: secure data deletion. In: IEEE Symposium on Security and Privacy (2013)
33.
go back to reference Wolchok, S., Hofmann, O.S., Heninger, N., Felten, E.W., Halderman, J.A., Rossbach, C.J., Waters, B., Witchel, E.: Defeating vanish with low-cost sybil attacks against large DHTs. In: Network & Distributed System Security Symposium (2010) Wolchok, S., Hofmann, O.S., Heninger, N., Felten, E.W., Halderman, J.A., Rossbach, C.J., Waters, B., Witchel, E.: Defeating vanish with low-cost sybil attacks against large DHTs. In: Network & Distributed System Security Symposium (2010)
Metadata
Title
Sex, Lies, or Kittens? Investigating the Use of Snapchat’s Self-Destructing Messages
Authors
Franziska Roesner
Brian T. Gill
Tadayoshi Kohno
Copyright Year
2014
Publisher
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-45472-5_5

Premium Partner