2018
DOI: 10.33166/aetic.2018.04.005
|View full text |Cite
|
Sign up to set email alerts
|

Inherent Flaws in Login Systems of Facebook and Twitter with Mobile Numbers

Abstract: There are many social networking websites that provide online networking opportunities; all of these platforms require creating an account, then logging in and updating information to maintain a profile. Our research investigates mobile number based log in feature of both Facebook and Twitters - two exemplary social networking sites – for degree of seamlessness and other security features. Our research reveals that there are major dissimilarities as well as flaws in the deployment of mobile number based login … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 1 publication
0
3
0
Order By: Relevance
“…The generated voice used in our study was produced using the VITS model, as referenced in [39]. We employed a pretrained model from the LJ Speech dataset, which is a publicly available speech dataset comprising 13,100 short audio clips featuring a single speaker reading passages from 7 nonfiction books, as documented in the providers page 7 . Each audio clip is accompanied by a corresponding transcription, with clip durations www.aetic.theiaer.org ranging from 1 to 10 s, totalling approximately 24 hr of speech data.…”
Section: Datasetmentioning
confidence: 99%
See 1 more Smart Citation
“…The generated voice used in our study was produced using the VITS model, as referenced in [39]. We employed a pretrained model from the LJ Speech dataset, which is a publicly available speech dataset comprising 13,100 short audio clips featuring a single speaker reading passages from 7 nonfiction books, as documented in the providers page 7 . Each audio clip is accompanied by a corresponding transcription, with clip durations www.aetic.theiaer.org ranging from 1 to 10 s, totalling approximately 24 hr of speech data.…”
Section: Datasetmentioning
confidence: 99%
“…We can verify the information by checking the spreader's details. However, given the security issues of social media platforms [7], there is also concern that DeepFakes could be sent through account hacking. In general, with TTS, it is easier to obtain the voice than with VC because it does not require the attacker's voice as input.…”
Section: Introduction 1backgroundmentioning
confidence: 99%
“…3). Moreover, among SNSs, Facebook and Twitter are commonly used [6], and Twitter reportedly has the highest number of child victims (40%) (Fig. 4).…”
Section: Increase In the Number Of Crimes Involving Drug Trafficking And Enjo Kosaimentioning
confidence: 99%