InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Follow publication

Facebook Knows What You Eat: Discover The Entire Data Facebook Collects About You, Step By Step.

I bet most Facebook users are not aware of what they really know about them.
What if I told you that YOU can visualize it in just 5 minutes?

A story of how I have explored https://facebook.com/dyi programmatically.

I’m gonna show you how to do it yourself, and we will explore my (censored) Facebook data together.

A (pretty censored) version of the data I’m about to show you. Open-Source code at the end of the post.

Some spooky commercials I ran into the other day, related to something that I was, most certainly, 100%, speaking about in person around my phone (not new to anyone, but boy! they are insolent) got me thinking about what Facebook REALLY knows about me.

I am grateful for all the good Facebook brought so far, and I appreciate the company. They have done some amazing things, This post’s intention is to open your eyes to how the advertisement world works with a real-world example.

At the end of the day, like any other free product software — If you don’t pay for it, your data is the key component of their business.

I found some interesting “Facebook-related data” about me in Facebook’s archive and I believe you would like it.

No Idea how they got it, but we can all guess together …
it has something to do with $$$$$.

Whether they bought it or collected it themselves.

From my dashboard — which is about to be reviewed

Compliance — Asking For Your Rights

Giant (and also small) companies must comply with the latest privacy laws if they wish to scale worldwide or enter the European or Californian market.

Facebook, one of the biggest players in the advertisement oligopoly (next to Google), is offering their users to download their data for free at any time.

So I created a new archive. After a few hours, I have received a link to my email.

The “Download Your Information” section on Facebook. It may take a few hours for the results to be ready.

The HTML Files contained an offline version of https://www.facebook.com/your_information.
It is really nice, but after a few minutes of jumping between pages, I understood there must be a better (more efficient) way.

So I looked at the JSON files, which contained a lot of information that the HTML versions were missing.

The HTML version is skinnier. It is obviously making it harder for people, even technical as I am, to really understand the data and really see the whole picture.

You can choose a HTML version, or a very detailed JSON output archive.
I asked for both. The really interesting data is hidden deep inside the JSON version.

Facebook Archive JSON version is more verbose than HTML version

So I downloaded their JSON format and focused on the data that I could not see completely in the HTML5 web interface (And there is lots of it).
It’s like there is more to be shown — but although it is an offline piece of all the data, The web interface encapsulates some of the events.

I wanted to see the entire picture in front of my eyes.
I felt like I could understand it better using graphs, numbers, and lines, rather than through their website/HTML archive.

It would be cool to see it on one screen.
I needed to stream that data and index it somewhere…
No way I’m gonna look after everything, file by file, or page by page.

Indexing The Data

(Technical Details — Feel Free To Skip)

For the geeks among us, Let me elaborate.

I chose to go with a docker stack composed of ELK (Elastic + LogStash + Kibana) components. I implemented a custom LogStash file stream that preprocessed the interesting JSON files from the downloaded ZIP archive to ElasticSearch.

Then I split the records that contained multiple elements (events, clicks, likes, notifications, marketplace item clicks, etc.) so I could query real Facebook objects easily (as if they are indexed in a GraphQL), and create ElasticSearch indexes with my interesting fields.
An ElasticSearch service from the stack would index all my events that ever took place inside Facebook’s servers regarding my data.
Later on, We are going to visualize the data and research it using Kibana.

The Compose file (which can be translated to Kubernetes services using Kompose) is available at at end of the post.

I ran docker-compose up and it all started to play.
After some samples went through ElasticSearch, I created index patterns manually using 1 click.

Finally, using Kibana, I started to work with these pieces of data and understood what I was facing.

Finding The Right Place To Start

There is an insane amount of data about me.
I am not talking about the obvious data Facebook collects from their services… A lot of the data came from other places.

I had to focus. There was too much.
Let’s take a look at the Ads And Business dashboard I created, which covers only some of Facebook’s relationships with more than 300 companies.

So, my question is: What do they Buy and Sell about me?
After years of using their products (Facebook, Instagram, WhatsApp) for Free, they must know me pretty well.

The Results

Facebook receives much of its information from 3rd party apps and services. I didn’t even need to actually have a Facebook, an Instagram, or a WhatsApp account connected to any of these apps in order to be identified.

I had to make the data visible somehow:

A (pretty censored) version of the data I’m about to show you. Open-Source code at the end of the post.

They know about each and every digital incident that took place on 300+ websites, Which I am really using, or have used, without logging into Facebook or relating to it in any way.

They know how I pay for each and every service, what apps I’ve installed or changed, and what websites I visited, thanks to Facebook Pixel technology and other “great, privacy-respecting” tools.

Another great question came up — who inside Facebook can really see this data?
I bet you also used, even once, one of the following:

  • Spotify
  • Airbnb
  • Zoom
  • Food Delivery Services (Like Wolt)
  • Domain Registrars
  • Air and Travel Agencies
  • Shopping websites
  • Many Landing Pages
  • Social/Music/Video Streaming platforms

Nevertheless, Facebook had my browsing history for a variety of websites. Stop worrying about deleting it occasionally.
Do you believe it? Well, here are some examples from my personal dashboard.

Facebook knows I eat, whenever I order delivery.

Food Delivery Services Logs — 3rd party cookies everywhere — Facebook logged my cart events. I wasn’t logged in.

They know about my personal user flows on 300+ websites. from login to cart and checkouts.

Some Off Facebook Activity Events TreeMap, every square is a Website. This let me understand which services gave Facebook the most events about me. Bigger is less privacy respect.

They know which sites I view, even when looking at previews.

They know where, how, and when I Fly and Travel — my booking tickets/accommodation were logged.

Checkout and Payment detailed events — Each block is a unique transaction. Each Color is a different type of event.

They (obviously) know my music taste. From Spotify, not from page likes.

Spotify Sent Facebook many Events.

And “CUSTOM” data events — some nasty data they rather not name — that got me asking- why? What the **** is CUSTOM?

“CUSTOM” — This piece of data is private, and Facebook does not share it. Almost 1/5 of the archive’s events type are CUSTOM, and I do not know what they mean.

I almost forgot the most precious jewel: “advertisers_who_uploaded_a_contact_list_with_your_information.json”

If that isn’t enough, I can also find “profile_information.json” among the files.
This file, profile_information, included all the top facts about me, with some 0 timestamp values in a tuple, as if it was stored optimally for data science projects, experiments, and queries.

It's like your due diligence provided by Facebook!
relationships, interests, skills, etc. Think of it as your basic profile info, which has historical and inner data that Facebook does not use or support in their user interfaces. These fields are used by computers, for computers, to customize your ads (Or sell them, to whoever pays the most).

I have much more to cover, But I have started an open-source skeleton for you curious people (who read the article, all the way) so you can download your data and visualize it immediately on your computer.

When you find more interesting files in your archives that I didn’t mention, It is really easy to add new data to the pipeline and I am sure you can discover it. There will be a part 2 to this blog post!

What I do (About Me)

Avi Lumelsky — I’m a Software Engineer / Security Researcher.
I practice mostly in the fields of Privacy, Deep Learning, and Cyber Security.

I will cover the progress in future posts.
I hope you enjoyed this article.
You can also read my previous article about Google Phishing POC.

Code Please

The code is available at https://github.com/avilum/facebook-archive-analyzer.

You are more than welcome to follow me on GitHub, here.
Feel free to comment, leave questions or feedback,
and of course — Sharing is Caring.

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by Avi Lumelsky

A business-oriented security researcher, who loves Privacy and AI, with deep security insights.

Responses (3)

Write a response