3 Things You Should Do Before You Get Facebook’s New Timeline

There’s one thing I can say for sure about Facebook’s new Timeline: It’s better. I’m just not sure whom it’s better for.

It’s probably better for app makers and brand pages that benefit from the credibility they get from prominent mentions in your Timeline. And it’s probably also better for people who love to use Facebook to tell the story of their lives. But is it better for you? You’ll have to decide.

The idea behind Timeline is: “Tell your life story with a new kind of profile.” Knowing that Facebook’s goal if for you to share your story with the widest possible audience, you should take a few steps to make sure you are only sharing the chapters of your life you really want to.

1. Get your friends’ settings right and audit your friends.
Whenever there are big changes on Facebook, outrage follows. Then it fades and Facebook grows. You can expect a similar cycle as Timeline rolls out. The Timeline is designed to tell your story through the content you’ve posted on Facebook. Some will find that unsettling.

The fact that Facebook built a setting that automatically makes all of your past posts “Friends Only” along with the slow roll out of Timeline indicates that Facebook is anticipating some backlash. Facebook has made the basic friend settings easy and you can now easily change the settings on any old post.

If you’re a “Friends Only” user like me, I recommend that you take advantage of the “reset button” set all of your old posts to “Friends Only”. To do this, go to the arrow in your upper right corner > Privacy Settings> Under “Limit the Audience for Past Posts” click “Manage Past Post Visibility.” If you use this setting, you can’t undo it. You can edit each post’s settings individually but you can’t change them back all at once. You can always make any post only available to you by selecting the “Custom” setting.

2. Check how you are tagged
Anyone can now tag anyone on Facebook. And if a friend tags you in something it could end up in your profile. You can always remove a tag but unless you have your settings right, a joke picture could pop up right at the moment a potential employer happens to click on your Timeline.

Go to the arrow in your upper right corner > Privacy Settings> Under “How Tags Work” click “Edit Settings.”

Here are my recommendations for tagging:


I have Timeline Review and Tag Review on for maximum Timeline control.  Timeline Review lets me approved anything tagged with my name before it shows up on my profile. Tag Review lets me approve tags on my content. I also have Maximum Timeline Visibility set to “Custom” “Only Me” for an extra layer of protection.  I don’t let Facebook recognize me in photos nor do I let friends check me into Places.

This is about as locked down as you can get. But I’ve found erring on the side of privacy has never been a problem for me on Facebook.

3. Edit your apps.
An app can write directly to your “wall”/timeline if you’ve given it permission to do so. Fact is you probably don’t remember if you’ve done so. And now apps play a more prominent role in your profile. So you should go through your approved apps and delete any that you are a) not using and b) would never like to see show up in your profile.

Go to the arrow in your upper right corner > Privacy Settings> Under “Apps & Websites” click “Edit Settings”> Under “Apps You Use” click “Edit Settings”> Click the light blue “x” next to any app you want to get rid of. Now, whenever you use an app, actually read the permissions the apps want. And it the app can write to your profile, your activity will become visible in your timeline

Extra Tip: Turn of Instant Personalization
Go to the arrow in your upper right corner > Privacy Settings> Under “Apps & Websites” click “Edit Settings”> Under “Instant Personalization” click “Edit Settings”> Uncheck the box that says “Enable instant personalization on partner websites.”

Why?
Facebook has been automatically sharing your public Facebook data with third- party partners through apps for over a year now. Now that apps will be posting to your timeline, you may end up having your activity on sites you didn’t mean to make public show up on your timeline. This is being very cautious. But it could help avoid some unintended consequences.

In Conclusion

The fact is we can’t be fully aware of the implications of Timeline until its widely implemented. When will that be?

On Quora, a, a Facebook employee speculated that it would be before the end of October. (If you’re dying to get the profile, here’s one way people have been able to get it.) The one thing you have to understand up the Facebook Timeline is that it can make your life feel way more public. More than LinkedIn, Twitter or most any other site, Facebook has the content to tell the story of our lives over the past few years.

Going forward, Facebook—I believe—hopes that you will embrace Facebook as the channel for your lifecast and mindcast in a public way. And if you do, Facebook will hit the billion-user mark before the end of 2011.

Cheers,

Jason

More posts from this topic

Unbenannt-3-1

How should we deal with defamation and hate speech on the net? – Poll

Everybody probably agree that the net has developed a discussion culture very different from what we are used to in real life. The used adjectives vary form inspiring, free and unrestricted to crazy, sick and shocking. The (apparent) anonymity when discussing on-line leads to more open and frank opinions, which is both good and bad. It becomes especially bad when it turns into libel and hate speech. What do you think about this? Read on and let us know in the poll below. We do have laws to protect us against defamation. But the police still has a very varying ability to deal with crimes on the net. And the global nature of Internet makes investigations harder. Most cases are international, at least here in Europe where we to a large extent rely on US-based services. This is in the headlines right now here in Finland because of a recent case. The original coverage is in Finnish so I will give you a short summary in English. A journalist named Sari Helin blogged about equal rights for sexual minorities, and how children are very natural and doesn’t react anyway if a friend has two mothers, for example. This is a sensitive topic and, hardly surprising, she got a lot of negative feedback. Part of the feedback was clear defamation. Calling her a whore, among other nasty things. She considered it for a while and finally decided to report the case to the police, mainly because of Facebook comments. This is where the really interesting part begins. Recently the prosecutor released the decision about the case. They simply decided to drop it and not even try to investigate. The reason? Facebook is in US and it would be too much work contacting the authorities over there for this rather small crime. A separately interviewed police officer also stated that many of the requests that are sent abroad remain unanswered, probably for the same reason. This reflects the situation in Finland, but I guess there are a lot of other countries where the same could have happened. Is this OK? The resourcing argument is understandable. The authorities have plenty of more severe crimes to deal with. But accepting this means that law and reality drift even further apart. Something is illegal but everybody knows you will get away with the crime. That’s not good. Should we increase resourcing and work hard to make international investigations smoother? That’s really the only way to make the current laws enforceable. The other possible path is to alter our mindset about Internet discussions. If I write something pro-gay on the net, I know there’s a lot of people who dislike it and think bad things about me. Does it really change anything if some of these people write down their thoughts and comment on my writings? No, not really. But most people still feel insulted in cases like this. I think we slowly are getting used to the different discussion climate on the net. We realize that some kinds of writing will get negative feedback. We are prepared for that and can ignore libel without factual content. We value feedback from reputable persons, and anonymous submissions naturally have less significance. Pure emotional venting without factual content can just be ignored and is more shameful for the writer than for the object. Well, we are still far from that mindset, even if we are moving towards it. But which way should we go? Should we work hard to enforce the current law and prosecute anonymous defamers? Or should we adopt our mindset to the new discussion culture? The world is never black & white and there will naturally be development on both these fronts. But in which direction would you steer the development if you could decide? Now you have to pick the one you think is more important.   [polldaddy poll=8293148]   Looking forward to see what you think. The poll will be open for a while and is closed when we have enough data.   Safe surfing, Micke  

Sep 8, 2014
BY Micke
Connecting people

Why is social media called antisocial?

You have all seen the pictures circulating on the net. A bunch of people all tapping at their smartphones and paying no attention to the world around them. With the title: ANTISOCIAL. And you have probably also seen this is real life. Sometimes a friend just seems to be more interested in the phone than in you. And maybe it has been the other way around sometime? ;) Most of these people are probably using social media. I do agree that it is rude to ignore persons who are physically present and pay more attention to the phone. Especially if you are alone with someone. And yes, that behavior seems antisocial from other’s point of view. But the funny thing is really that social media and our mobile devices form the most social system invented so far. Think about it. You can be in contact with people everywhere in the world. You can send and receive messages instantly and follow what others do right now. You can share your own feelings spontaneously. You can have a pure peer-to-peer exchange of thoughts not curated by any outsiders. You can select to communicate with a single person or a larger group. You are not limited to written text, you can use pictures and video as well. The real point here is that those “antisocial” types aren’t just tapping their phones, they are communicating with real people. Our traditional definition for the word social was formed before we had Internet. People associate it with personal face-to-face contact and are slow to update their mindsets. Or to be precise, we already have a younger generation who have grown up with the net and social media services. Their definition is up to date, but many of us older persons still see the net as less social or not social at all. Let’s all agree to never call someone who is concentrating on the phone antisocial. But the word rude may be justified. Let’s also agree to not be rude against others by ignoring them in favor of the phone. It’s of course OK to check the phone now and then at the party, but always prioritize people who are present and want to talk to you. And why not take it one step further? Turn off the phone and try to be without it for a couple of hours. Can you do it? Next time you go out for dinner with someone is a good time for that experiment. You may be less social on the net for a while, but your company will see you as much more social.   Safe surfing, Micke   PS. If you must be able to take urgent calls and can’t turn off the phone, at least turn off the data connection. That will mute the social media apps.  

Aug 21, 2014
BY Micke
alice

1,2 billion passwords stolen, but does it affect me?

You have heard the news. Russian hackers have managed to collect a pile of no less than 1,2 billion stolen user IDs and passwords from approximately 420 000 different sites. That’s a lot of passwords and your own could very well be among them. But what’s really going on here? Why is this a risk for me and what should I do? Read on, let’s try to open this up a bit. First of all. There are intrusions in web systems every day and passwords get stolen. Stolen passwords are traded on the underground market and misused for many different purposes. This is nothing new. The real news here is just the size of the issue. The Russian hacker gang has used powerful scripts to harvest the Internet for vulnerable systems and automatically hacked them, ending up with this exceptionally large number of stolen passwords. But it is still good that people write and talk about this, it’s an excellent reminder of why your personal passwords habits are important. Let’s first walk you through how it can go wrong for an ordinary Internet user. Let’s call her Alice. Alice signs up for a mail account at Google. She’s lucky, alice@gmail.com is free. She’s aware of the basic requirements for good passwords and selects one with upper- and lowercase letters, digits and some special characters. Alice is quite active on the net and uses Facebook as well as many smaller sites and discussion forums. Many of them accepts alice@gmail.com as the user ID. And it’s very logical to also use the same password, it sort of belongs together with that mail address and who wants to remember many passwords? Now the evil hackers enter the scene and starts scanning the net for weak systems. Gmail is protected properly and withstands the attacks. But many smaller organizations have sites maintained on a hobby basis, and lack the skills and resources to really harden the site. One of these sites belongs to a football club where Alice is active. The hackers get access to this site’s user database and downloads it all. Now they know the password for alice@gmail.com on that site. Big deal, you might think. The hackers know what games Alice will play in, no real harm done. But wait, that’s not all. It’s obvious that alice@gmail.com is a Gmail user, so the hackers try her password on gmail.com. Bingo. They have her email, as well as all other data she keeps on the Google sites. They also scan through a large number of other popular internet sites, including Facebook. Bingo again. Now the hackers have Alice’s Facebook account and probably a couple of other sites too. Now the hackers starts to use their catch. They can harvest Alice’s accounts for information, mail conversations, other’s contact info and e-mails, documents, credit card numbers, you name it. They can also use her accounts and identity to send spam or do imposter scams, just to list some examples. So what’s the moral of the story? Alice used a good password but it didn’t protect her in this case. Her error was to reuse the password on many sites. The big sites usually have at least a decent level of security. But if you use the same password on many sites, its level of protection is the same as the weakest site where it has been used. That’s why reusing your main mail password, especially on small shady sites, is a huge no-no. But it is really inconvenient to use multiple strong passwords, you might be thinking right now. Well, that’s not really the case. You can have multiple passwords if you are systematic and use the right tools. Make up a system where there is a constant part in every password. This part should be strong and contain upper- and lowercase characters, digits and special characters. Then add a shorter variable part for every site. This will keep the passwords different and still be fairly easy to remember. Still worried about your memory? Don’t worry, we have a handy tool for you. The password manager F-Secure Key. But what about the initial question? Does this attack by the Russian hackers affect me? What should I do? We don’t know who’s affected as we don’t know (at the time of writing) which sites have been affected. But the number of stolen passwords is big so there is a real risk that you are among them. Anyway, if you recognize yourself in the story about Alice, then it is a good idea to start changing your passwords right away. You might not be among the victims of these Russian hackers, but you will for sure be a victim sooner or later. Secure your digital identities before it happens! If you on the other hand already have a good system with different passwords on all your sites, then there’s no reason to panic. It’s probably not worth the effort to start changing them all before we know which systems were affected. But if the list of these 420 000 sites becomes public, and you are a user of any of these sites, then it’s important to change your password on that site.   Safe surfing, Micke  

Aug 7, 2014
BY Micke