{"id":12243,"date":"2022-12-15T13:53:25","date_gmt":"2022-12-15T13:53:25","guid":{"rendered":"http:\/\/scannn.com\/designing-account-security-across-our-apps\/"},"modified":"2022-12-15T13:53:25","modified_gmt":"2022-12-15T13:53:25","slug":"designing-account-security-across-our-apps","status":"publish","type":"post","link":"https:\/\/scannn.com\/lv\/designing-account-security-across-our-apps\/","title":{"rendered":"Designing Account Security Across Our Apps"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><span style=\"font-weight: 400\">As we close out this year, we\u2019re sharing a number of <a href=\"https:\/\/about.fb.com\/news\/2022\/12\/protecting-people-from-online-threats-in-2022\/\">updates<\/a> on our work to protect people around the world against various threats.<\/span><\/p>\n<p><span style=\"font-weight: 400\">We know account security and recovery are top of mind for people, so today we are sharing a behind-the-scenes look at some of the tensions that companies like ours navigate in designing account security tools that help protect people while deterring bad actors. We\u2019re also detailing new security features we\u2019ve rolled out this year and highlighting why it\u2019s critical for people to keep their contact points \u2014 like their email or phone numbers \u2014 secure and up to date to prevent one of the leading drivers of account compromise.<\/span><\/p>\n<h2>Applying Adversarial Design to Account Security<\/h2>\n<p><span style=\"font-weight: 400\">Since sharing <\/span><a href=\"https:\/\/s21.q4cdn.com\/399680738\/files\/doc_financials\/2021\/Q1\/FB-Q1-2021-Earnings-Call-Transcript.pdf\"><span style=\"font-weight: 400\">our plans<\/span><\/a><span style=\"font-weight: 400\"> last year to expand our support efforts, we\u2019ve continued to stress-test our account security and support systems to understand how bad actors might try to game them. This space is highly adversarial, which means we\u2019re constantly thinking about how our products and our support channels may get abused; we have to keep evolving our defenses and processes in response to malicious actors trying to work around them.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This is always a tricky balance because if we tighten account security controls too much, innocent people will have a harder time using and recovering their accounts. If we are too loose with controls, bad actors will have an easier time abusing our systems to compromise people. In fact, w<\/span><span style=\"font-weight: 400\">e regularly see threat actors target the very systems we put in place to protect people, trying to get accounts taken down.<\/span><\/p>\n<p><span style=\"font-weight: 400\">As an example of these types of controls in our account recovery support, we use a variety of signals and verification challenges to help detect suspicious activity and validate legitimate access attempts. These challenges may range from requesting a copy of a person\u2019s ID or confirming a code sent to a device that has previously logged into the account.<\/span><\/p>\n<h2>Taking a Closer Look at Contact Points<\/h2>\n<p><span style=\"font-weight: 400\">Once an account recovery request is verified, platforms like ours rely on contact points \u2014 like an email address or phone number \u2014 listed in someone\u2019s account\u2019s settings as the primary channel to deliver support, like password reset links. Our research shows <\/span><span style=\"font-weight: 400\">that <\/span><span style=\"font-weight: 400\">people are two times more likely to recover their Facebook account if their contact points are up to date so we can reach them.<\/span><\/p>\n<p><span style=\"font-weight: 400\">However, people might lose access to an old email inbox or they may switch phone numbers \u2014 this is a challenge that is recognized across our industry. We\u2019ve also seen threat actors target those contact points to gain broad access to someone\u2019s online accounts by using <\/span><span style=\"font-weight: 400\">it to reset the passwords for other connected accounts \u2013 banking, social media, and others. In fact, when looking at compromised Facebook accounts, we find that one in four began with a person\u2019s contact point being taken over.<\/span><\/p>\n<h2>Product and Support Updates<\/h2>\n<p><span style=\"font-weight: 400\">Our work to help people stay safe and in control of their accounts is two-fold. First, to prevent account compromise, we build systems and help people learn how to identify potentially suspicious activity across the internet. Second, to help people who experience access issues, we continue to improve our support offerings.\u00a0<\/span><\/p>\n<h2>Contact Point Support<\/h2>\n<p>We\u2019ve built additional ways for people to get back into their accounts when they no longer have access to linked contact points. For instance, in certain cases, people can use recently removed contact points to recover access. As a result, this year we\u2019ve helped eight times more people a day on average get back into their Facebook account than last year when they don\u2019t have access to their listed contact points.\u00a0We\u2019re also running global in-app prompts across Facebook reminding people to confirm their contact points and exploring alternative ways to confirm people\u2019s identity during the account recovery process on Instagram, including\u00a0using their friend network.<\/p>\n<h2>Phishing and Malware Protection<span style=\"font-weight: 400\">\u00a0<\/span><\/h2>\n<p><span style=\"font-weight: 400\">To help people stay safe across our apps, we\u2019re continuing to roll out protections and educational initiatives:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><b>Protections against malicious links:<\/b><span style=\"font-weight: 400\"> We know that threat actors often target groups like journalists, activists, political campaigns and businesses (among others) by sending them phishing links or malware. One measure we\u2019ve rolled out to protect against this on Messenger uses our automated systems to direct suspicious messages if they are sent by unconnected users. As with many of our security measures, we\u2019ll use our learnings to inform our broader strategy to protect people.<\/span><\/li>\n<li style=\"font-weight: 400\"><a href=\"https:\/\/about.instagram.com\/blog\/announcements\/continuing-to-keep-instagram-safe-and-secure\"><b>Instagram imposter alerts<\/b><\/a><span style=\"font-weight: 400\">: <\/span><span style=\"font-weight: 400\">We remove Instagram accounts that our automated systems find to be malicious, including ones that impersonate others. <\/span><span style=\"font-weight: 400\">But because bad actors may not immediately use accounts maliciously, we\u2019re now testing sending warnings if an account that we suspect may be impersonating someone requests to follow them. In the coming months, we\u2019ll also send warnings if an account that may be impersonating a business sends you a Direct Message.<\/span><\/li>\n<li style=\"font-weight: 400\"><b><a href=\"https:\/\/about.instagram.com\/blog\/announcements\/continuing-to-keep-instagram-safe-and-secure\">Increased Instagram verified badge visibility<\/a>: <\/b><span style=\"font-weight: 400\">We\u2019re also expanding where the verified badge shows up on Instagram to make it visible in more places, including Stories and Direct Messages, to help people confirm that the accounts they\u2019re interacting with are authentic and verified.<\/span><span style=\"font-weight: 400\">\u00a0<\/span><\/li>\n<\/ul>\n<h2>Live Chat Support Test<\/h2>\n<p><span style=\"font-weight: 400\">While our scaled account recovery tools aim at supporting the majority of account access issues, we know that there are groups of people that could benefit from additional, human-driven support. This year, we\u2019ve carefully grown a small test of a live chat support feature on Facebook, and we\u2019re beginning to see positive results. <\/span><span style=\"font-weight: 400\">For example, during the month of October we offered our live chat support option to over a million people in nine countries and we\u2019re now planning to expand this test to more than 30 countries around the world.<\/span><\/p>\n<h2>Instagram Account Access Support<\/h2>\n<p><span style=\"font-weight: 400\">We\u2019ve launched <\/span><a href=\"https:\/\/www.instagram.com\/hacked\/\"><span style=\"font-weight: 400\">instagram.com\/hacked<\/span><\/a><span style=\"font-weight: 400\"> to help people to report and resolve account access issues. We\u2019ve also rolled out a way for people to <\/span><a href=\"https:\/\/about.instagram.com\/blog\/announcements\/continuing-to-keep-instagram-safe-and-secure\"><span style=\"font-weight: 400\">ask their friends to confirm their identity<\/span><\/a><span style=\"font-weight: 400\"> in order to help regain access to their Instagram account.<\/span><\/p>\n<p><span style=\"font-weight: 400\">We welcome feedback from the research community and our industry peers as we all navigate balancing these various tensions in protecting people and deterring bad actors.<\/span><\/p>\n<\/p><\/div>\n<p><script async defer crossorigin=\"anonymous\" src=\"https:\/\/connect.facebook.net\/en_US\/sdk.js#xfbml=1&#038;version=v5.0\"><\/script><script async defer src=\"https:\/\/platform.instagram.com\/en_US\/embeds.js\"><\/script><br \/>\n<br \/><br \/>\n<br \/><a href=\"https:\/\/about.fb.com\/news\/2022\/12\/designing-account-security-across-our-apps\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As we close out this year, we\u2019re sharing a number of updates on our work to protect people around the world against various threats. We know account security and recovery are top of mind for people, so today we are sharing a behind-the-scenes look at some of the tensions that companies like ours navigate in [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":12244,"comment_status":"","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[123],"tags":[],"class_list":["post-12243","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-facebook"],"_links":{"self":[{"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/posts\/12243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/comments?post=12243"}],"version-history":[{"count":0,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/posts\/12243\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/media\/12244"}],"wp:attachment":[{"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/media?parent=12243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/categories?post=12243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/tags?post=12243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}