Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Sex, Lies, or Kittens? Investigating the Use of Snapchat’s Self-Destructing Messages

  • Conference paper
  • First Online:
Financial Cryptography and Data Security (FC 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8437))

Included in the following conference series:

Abstract

The privacy-related Snapchat smartphone application allows users to share time-limited photos or videos, which “disappear” after a specified number of seconds once opened. This paper describes the results of a user survey designed to help us understand how and why people use the Snapchat application. We surveyed 127 adult Snapchat users, finding that security is not a major concern for the majority of these respondents. We learn that most do not use Snapchat to send sensitive content (although up to 25 % may do so experimentally), that taking screenshots is not generally a violation of the sender’s trust but instead common and expected, that most respondents understand that messages can be recovered, and that security and privacy concerns are overshadowed by other influences on how and why respondents choose to use or not use Snapchat. Nevertheless, we find that a non-negligible fraction (though not a majority) of respondents have adapted or would adapt their behavior in response to understanding Snapchat’s (lack of) security properties, suggesting that there remains an opportunity for a more secure messaging application. We reflect on the implications of our findings for Snapchat and on the design of secure messaging applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    http://www.snapchat.com

  2. 2.

    Respondents could select multiple answers: I set shorter timeouts for embarrassing photos; I set shorter timeouts for content containing secret information; I set longer timeouts for people I trust more. I set shorter timeouts for people I trust less; Other.

  3. 3.

    For each type of content in Fig. 2 that a respondent would not be willing to send via Snapchat, he/she could select multiple reasons for why not: I’m afraid someone will take a screenshot or photo; I don’t trust the Snapchat application; I never take pictures of that kind of thing; I don’t want to bother people; I don’t want it to disappear; I want to share it more publicly; I’d rather send it another way (such as using email, text message, Facebook, Twitter).

References

  1. Snapchat Leaked. http://snapchatleaked.com/

  2. Aguilar, M.: Poke: Facebook just cloned Snapchat, Dec 2012. http://gizmodo.com/5970590/

  3. Allsopp, C.: BlinkLink Post-Mortem, Aug 2013. http://clayallsopp.com/posts/blinklink/

  4. Borisov, N., Goldberg, I., Brewer, E.: Off-the-record communication, or, why not to use PGP. In: ACM Workshop on Privacy in the Electronic Society (2004)

    Google Scholar 

  5. Boyd, D., Marwick, A.E.: Social privacy in networked publics: teens attitudes, practices, and strategies. In: Oxford Internet Institute Decade in Internet Time Symposium (2011)

    Google Scholar 

  6. Colao, J.: Is Snapchat Raising Another Round At A \({\$}\)3.5 Billion Valuation?, Oct 2013. http://www.forbes.com/sites/jjcolao/2013/10/25/is-snapchat-raising-another-round-at-a-3-5-billion-valuation/

  7. Constine, J.: Your Facebook pokes are stored for two days, then their encryption keys are deleted, Dec 2012. http://techcrunch.com/2012/12/22/your-facebook-pokes-are-stored-for-two-days

  8. Ducklin, P.: Snapchat images that have “disappeared forever” stay right on your phone..., May 2013. http://nakedsecurity.sophos.com/2013/05/10/snapchat

  9. Dunn, G.: Yet another way to retrieve deleted Snapchat photos, Jun 2013. http://www.salon.com/2013/06/04/yet_another_way_to_retrieve_deleted_snapchat_photos_partner/

  10. Empson, R.: Not-So-Ephemeral Messaging: New SnapChat “Hack” Lets Users Save Photos Forever, Jan 2013. http://techcrunch.com/2013/01/22/not-so-eph

  11. Geambasu, R., Kohno, T., Krishnamurthy, A., Levy, A., Levy, H.M., Gardner, P., Moscaritolo, V.: New directions for self-destructing data. Technical report UW-CSE-11-08-01, University of Washington (2011)

    Google Scholar 

  12. Geambasu, R., Kohno, T., Levy, A., Levy, H.M.: Vanish: increasing data privacy with self-destructing data. In: 18th USENIX Security Symposium (2009)

    Google Scholar 

  13. Goldberg, I.: Off-the-record messaging. https://otr.cypherpunks.ca/

  14. Hoover, R.: What’s the Deal with Snapchat? Dec 2012. http://ryanhoover.me/post/38569508918/whats-the-deal-with-snapchat

  15. Johnson, M., Egelman, S., Bellovin, S.M.: Facebook and privacy: it’s complicated. In: 8th Symposium on Usable Privacy and Security (2012)

    Google Scholar 

  16. Jurgenson, N.: Temporary Social Media, Jul 2013. http://blog.snapchat.com/post/55902851023/temporary-social-media

  17. Koh, Y.: Snapchat Sends 350 Million ‘Snaps’, Sep 2013. http://blogs.wsj.com/digits/2013/09/09/snapchat-sends-350-million-snaps/

  18. Kumaraguru, P., Cranor, L.F.: Privacy indexes: A survey of Westin’s studies. Technical report CMU-ISRI-5-138, Institute for Software Research International, School of Computer Science, Carnegie Mellon University (2005)

    Google Scholar 

  19. Liu, Y., Gummadi, K.P., Krishnamurthy, B., Mislove, A.: Analyzing Facebook privacy settings: user expectations vs. reality. In: Internet Measurement Conference (2011)

    Google Scholar 

  20. Meeder, B., Tam, J., Kelley, P.G., Cranor, L.F.: RT @IWantPrivacy: widespread violation of privacy settings in the twitter social network. In: IEEE Workshop on Web 2.0 Security and Privacy (2010)

    Google Scholar 

  21. Nye, J.: iPhone’s new app Snapchat which destroys photos after a few seconds is promoting sexting among teens, Nov 2012. http://www.dailymail.co.uk/news/article-2236586/

  22. Perlman, R.: The ephemerizer: making data disappear. J. Inf. Syst. Secur. 1, 51–68 (2005)

    Google Scholar 

  23. Reardon, J., Basin, D., Capkun, S.: SoK: secure data deletion. In: IEEE Symposium on Security and Privacy (2013)

    Google Scholar 

  24. Russell, K.: 10 Unusual ways people are using snapchat, Jul 2013. http://www.businessinsider.com/weird-ways-people-use-snapchat-2013-7?op=1

  25. Schaffer, M.: Who Can View My Snaps and Stories, Oct 2013. http://blog.snapchat.com/post/64036804085/who-can-view-my-snaps-and-stories

  26. Snapchat: How Snaps Are Stored And Deleted, May 2013. http://blog.snapchat.com/post/50060403002/how-snaps-are-stored-and-deleted

  27. Snapchat: Surprise! Introducing Snapchat Stories, Oct 2013. http://blog.snapchat.com/post/62975810329/surprise

  28. Survata: Is Snapchat only used for sexing?. http://survata.com/blog/is-snapchat-only-used-for-sexting-we-asked-5000-people-to-find-out/

  29. Tan, G.: Tenth grade tech trends (2013). http://blog.garrytan.com/tenth-grade-tech-trends-my-survey-data-says-s

  30. TigerText: Secure text messaging app for the enterprise. http://tigertext.com/

  31. Van Grove, J.: Snapchat snapshot: App counts 8M adult users in U.S., Jun 2013. http://news.cnet.com/8301-1023_3-57590968-93/

  32. Wickr: Wickr: Leave No Trace. https://www.mywickr.com/

  33. Wolchok, S., Hofmann, O.S., Heninger, N., Felten, E.W., Halderman, J.A., Rossbach, C.J., Waters, B., Witchel, E.: Defeating vanish with low-cost sybil attacks against large DHTs. In: Network & Distributed System Security Symposium (2010)

    Google Scholar 

Download references

Acknowledgements

We thank our shepherd, Serge Egelman, and the anonymous reviewers for their valuable feedback. We thank our survey respondents for their participation, Tamara Denning for feedback on the survey, and Greg Akselrod for feedback on an earlier draft. The cats Tony and Fidget posed for Fig. 1. This work is supported in part by the National Science Foundation (Grant CNS-0846065 and a Graduate Research Fellowship, Grant DGE-0718124) and by a Microsoft Research PhD Fellowship.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Franziska Roesner .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 International Financial Cryptography Association

About this paper

Cite this paper

Roesner, F., Gill, B.T., Kohno, T. (2014). Sex, Lies, or Kittens? Investigating the Use of Snapchat’s Self-Destructing Messages. In: Christin, N., Safavi-Naini, R. (eds) Financial Cryptography and Data Security. FC 2014. Lecture Notes in Computer Science(), vol 8437. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45472-5_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-45472-5_5

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-45471-8

  • Online ISBN: 978-3-662-45472-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics