SlideShare a Scribd company logo
Building on Social Application PlatformsJonathan LeBlanc – Technology EvangelistYahoo! Developer Network – Partner IntegrationsTwitter: @jcleblanc
2Valuation: $4 Billion (May 2010)Business InsiderSold for between $15 - $25 MillionSan Francisco Examiner
3
4RockYou! User Database Hacked“In December 2009, an attacker breached the company's database of usernames and passwords of its 32 million users.”Techweet: http://www.techweet.comZynga Threatens to Leave Facebook“Zynga was threatening to leave Facebook altogether in the wake of Facebook's requiring exclusive use of Facebook credits for monetization in applications.”TechCrunch: http://www.techcrunch.comSpammers Running Wild In Latest MySpace Phishing Attack“…suggesting that the site has fallen prey to a security exploit that grants spammers access to accounts.”TechCrunch: http://www.techcrunch.com
5
6Avoiding Disaster with Open SourceAccessing the Social GraphAuthorizing Application Authenticating UsersSecuring Third Party Code
7Accessing the Social Graph
8Authorization and Authentication
9Front-End Security
10Thank youRead More LinksOpenSocial: http://www.opensocial.org/

More Related Content

PDF
RSA Monthly Online Fraud Report -- August 2013
 
PDF
Compilation of phishing and keylogger attacks
PPTX
What is the Cybersecurity plan for tomorrow?
PPTX
Can you predict who will win the US election?
PDF
5 ways criminals use facebook
PDF
Iranian Hackers Have Hit Hundreds of Companies in Past Two Years
PDF
RSA Monthly Online Fraud Report -- June 2014
 
PPTX
Mobile application security
RSA Monthly Online Fraud Report -- August 2013
 
Compilation of phishing and keylogger attacks
What is the Cybersecurity plan for tomorrow?
Can you predict who will win the US election?
5 ways criminals use facebook
Iranian Hackers Have Hit Hundreds of Companies in Past Two Years
RSA Monthly Online Fraud Report -- June 2014
 
Mobile application security

What's hot (20)

PPTX
Content Management System Security
PDF
The rise of malware(ransomware)
PPT
Current Emerging Threats
PDF
Patches Arrren't Just for Pirates
PPTX
Websecurity fundamentals for beginners
PPTX
cyber attacks in May , breaches in May
PPTX
Ransomware
PPTX
Ransomware
PPTX
null Bangalore meet Feb 2010 - news Bytes
PDF
A Guide to Internet Security For Businesses- Business.com
PDF
Invincea "The New Threat Vector"
DOCX
Security Paper
PPTX
Attacking the Privacy of Social Network users (HITB 2011)
PPT
Social apps 3_1_2008
PPTX
Facebook Controversies
PDF
Ransomware hostage rescue manual
PDF
Anatomy of an Enterprise Social Cyber Attack
PPTX
Phishing attack
PPT
0926182320 Sophos[1]
PPT
Communications In A Web 2.0 World - Texas State University Mass Communication...
Content Management System Security
The rise of malware(ransomware)
Current Emerging Threats
Patches Arrren't Just for Pirates
Websecurity fundamentals for beginners
cyber attacks in May , breaches in May
Ransomware
Ransomware
null Bangalore meet Feb 2010 - news Bytes
A Guide to Internet Security For Businesses- Business.com
Invincea "The New Threat Vector"
Security Paper
Attacking the Privacy of Social Network users (HITB 2011)
Social apps 3_1_2008
Facebook Controversies
Ransomware hostage rescue manual
Anatomy of an Enterprise Social Cyber Attack
Phishing attack
0926182320 Sophos[1]
Communications In A Web 2.0 World - Texas State University Mass Communication...
Ad

Viewers also liked (6)

PPTX
Securing RESTful APIs using OAuth 2 and OpenID Connect
PPTX
The Upheaval of Open Commerce
PPTX
Patologia benigna de estomago
PPTX
Facebook for the Floundering
PDF
OAuth2 and LinkedIn
PDF
Salem State College's Employee Handbook
Securing RESTful APIs using OAuth 2 and OpenID Connect
The Upheaval of Open Commerce
Patologia benigna de estomago
Facebook for the Floundering
OAuth2 and LinkedIn
Salem State College's Employee Handbook
Ad

Similar to Building on Social Application Platforms (20)

PPT
The Social Media Renaissance
PPT
Facebook Apps Vs Google Open Social
PDF
Google IO 2008 - Opensocial: Meet The Containers
PDF
Meet The Containers
PPT
Myspace
PPT
Myspace
PPT
Netlog Developer Day
PPT
Make Web, Not War - Open Source Microsoft Event
PPTX
Building Social Business Applications with OpenSocial
PPT
A .net developer experiences with web2.0 and social media
PDF
Social networking
PPT
RockYou 4-22-08
PDF
South America 2008: Open Social For Brand Advertising and Media
PPT
OpenSocial Vs Facebook
PPT
AAA towing Roadside Assistance
PPT
Emerging Technologies and Trends in Social Media
PPT
Social Media in a Nutshell
PPT
MySpace Board Meeting - Group 8
PPTX
Facebook Presentation
PDF
Open Platforms in Web 2.0
The Social Media Renaissance
Facebook Apps Vs Google Open Social
Google IO 2008 - Opensocial: Meet The Containers
Meet The Containers
Myspace
Myspace
Netlog Developer Day
Make Web, Not War - Open Source Microsoft Event
Building Social Business Applications with OpenSocial
A .net developer experiences with web2.0 and social media
Social networking
RockYou 4-22-08
South America 2008: Open Social For Brand Advertising and Media
OpenSocial Vs Facebook
AAA towing Roadside Assistance
Emerging Technologies and Trends in Social Media
Social Media in a Nutshell
MySpace Board Meeting - Group 8
Facebook Presentation
Open Platforms in Web 2.0

More from Jonathan LeBlanc (20)

PDF
JavaScript App Security: Auth and Identity on the Client
PDF
Improving Developer Onboarding Through Intelligent Data Insights
PDF
Better Data with Machine Learning and Serverless
PPTX
Best Practices for Application Development with Box
PPTX
Box Platform Overview
PPTX
Box Platform Developer Workshop
PPTX
Modern Cloud Data Security Practices
PPTX
Box Authentication Types
PPTX
Understanding Box UI Elements
PPTX
Understanding Box applications, tokens, and scoping
PPTX
The Future of Online Money: Creating Secure Payments Globally
PDF
Modern API Security with JSON Web Tokens
PPTX
Creating an In-Aisle Purchasing System from Scratch
PDF
Secure Payments Over Mixed Communication Media
PDF
Protecting the Future of Mobile Payments
PDF
Node.js Authentication and Data Security
PDF
PHP Identity and Data Security
PPTX
Secure Payments Over Mixed Communication Media
PDF
Protecting the Future of Mobile Payments
PPTX
Future of Identity, Data, and Wearable Security
JavaScript App Security: Auth and Identity on the Client
Improving Developer Onboarding Through Intelligent Data Insights
Better Data with Machine Learning and Serverless
Best Practices for Application Development with Box
Box Platform Overview
Box Platform Developer Workshop
Modern Cloud Data Security Practices
Box Authentication Types
Understanding Box UI Elements
Understanding Box applications, tokens, and scoping
The Future of Online Money: Creating Secure Payments Globally
Modern API Security with JSON Web Tokens
Creating an In-Aisle Purchasing System from Scratch
Secure Payments Over Mixed Communication Media
Protecting the Future of Mobile Payments
Node.js Authentication and Data Security
PHP Identity and Data Security
Secure Payments Over Mixed Communication Media
Protecting the Future of Mobile Payments
Future of Identity, Data, and Wearable Security

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Cloud computing and distributed systems.
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Empathic Computing: Creating Shared Understanding
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Electronic commerce courselecture one. Pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Encapsulation theory and applications.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Big Data Technologies - Introduction.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
Reach Out and Touch Someone: Haptics and Empathic Computing
Cloud computing and distributed systems.
Spectral efficient network and resource selection model in 5G networks
The Rise and Fall of 3GPP – Time for a Sabbatical?
“AI and Expert System Decision Support & Business Intelligence Systems”
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Unlocking AI with Model Context Protocol (MCP)
Empathic Computing: Creating Shared Understanding
Dropbox Q2 2025 Financial Results & Investor Presentation
Electronic commerce courselecture one. Pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Chapter 3 Spatial Domain Image Processing.pdf
cuic standard and advanced reporting.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Encapsulation theory and applications.pdf
Machine learning based COVID-19 study performance prediction
Spectroscopy.pptx food analysis technology
Big Data Technologies - Introduction.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Programs and apps: productivity, graphics, security and other tools

Building on Social Application Platforms

Editor's Notes

  • #4: The social graph is the user footprint on the web. We are no longer living in the days when our online and real lives are separate. Developers can leverage off of this data to personalize and target applications for specific users.
  • #6: Why would you ever want to build an application in such a hostile space? One main reason:When you first deploy your application you have the potential to reach the huge network of users on the existing platform, allowing you to build a user base very quickly – much more so than in traditional software development.
  • #7: There are generally four layers that developers need to be concerned about when working in this space, all addressed by open source technologies.
  • #8: OpenSocial is a project which seeks to standardize the approach to accessing user social data on a platform.Shindig is an apache project which allows OpenSocial gadgets (or apps) to render in a container.
  • #9: OAuth is an open source project which is used to allow users to permission applications to perform actions or capture user data on their behalf. OpenID is a project which is used to take your social identity off the social networks and expose it, using a single sign-on username and password, to third parties.
  • #10: Traditionally, applications are secured by serving them up within iframes. They are simple to create / maintain and provide full content control for developers. The problem is that they are not secure and allow a host of XSS attacks on a container.Caja, a Google created open project, seeks to sandbox applications on a container to provide a layer of security on the container from applications. It rewrites front-end JavaScript, HTML and CSS to sanitize the code running on a platform and provides a sanitized version of the DOM to the application without allowing it to reach out to the real DOM.
  • #11: Links to the projects and platforms we talked about during this presentation