Featured: It looks like you, it posts like you, an it has your pictures, but ... it's not you; the problems of fake Facebook accounts.
There's a lot to this question.
Let's work it in reverse order.
A Facebook account is no different than any other online account. Your “unique identifier”, as you call it, is your email address1, and indeed, you are required to set a password on the account. You log in to your Facebook account with your email address and password.
When you associate an email address with a Facebook account, you must verify that you actually own that email address. Facebook sends an email to that email address, containing a link you must click to confirm that ownership. While you can associate multiple email addresses with a single Facebook account (a good idea for account recovery), you cannot use the same email address on different Facebook accounts.
Most importantly, you can't use an email address with a Facebook account without the owner of that email account clicking the link to confirm it's what they want. Put another way, no one can open a Facebook account using your email address unless you click the confirmation link to confirm it. (Unless, of course, your email account has been hacked, in which case you'll likely have other problems.)
What people can do is create Facebook accounts in your name using some other email address. It's not your email address that was used; it's someone else setting up their own Facebook account and making it look like you.
It's very easy to set up imposter accounts. Somebody can set up an email address using a free email service like Outlook.com or Gmail, and then create the Facebook account using your name and other information.
If you have a Facebook account, they can also use anything that's publicly visible to make their account look more legitimate. If they can see your birthday, your location, your associations, likes, and follows, they can use all that. They can even make copies of and use any photos — including your profile photo — if those are publicly visible.
Even if you don't have a Facebook account, they can use any information they know or are able to find to make their fake account look more like the real you.
And, to be extra clear, since it's not using your email address, it's not your account, and you do not have control over it — even if everything in that account looks to be like you. The best you can do is hope Facebook will help and warn your friends there's a fake ‘you' on Facebook.
This kind of impersonation is, unfortunately, relatively common, and sadly, there's little you can do about it.
You should definitely contact Facebook; they have a Report an Impostor Account page.
If it starts to cross the line into illegal activity, defamation, or worse, you can try to contact law enforcement. (Just be forewarned that law enforcement has little time for this type of thing, and often very little expertise.)
Invitations — from Facebook or any other service — are nothing to worry about.
All an invitation means is that someone has your email address and can send you email. That's it.
Given the number of people with whom we share our email address so they can send us email, it's no surprise that those email addresses make their way into online services like Facebook, who would love for us to have an account.
There's never been a bounty that I'm aware of, but there is an … interesting … technique that is also not unique to Facebook.
When people set up an account with Facebook (and many other services), they're asked to share their contacts with the service. This contact list can be used in either of two ways:
- It can be used to identify your friends who already use the service. Since email addresses uniquely identify users, and your contact list is full of email addresses, all the service needs to do is see who already has an account and connect the two of you, or at least suggest the connection. This is what most people expect when sharing their contacts with a service, and is the way that most “please share your contacts” requests are worded: as a service to you.
- It can be used to identify the email addresses of all your friends who don't use the service. The service can then send them all invitations to sign up for accounts. Many people consider this spam, and it's the biggest reason not to share your contact lists with online services.2
So, other than a little spam, there's nothing really underhanded about invitations you receive. It's just the service being a little over-aggressive trying to recruit new members.
As long as somebody isn't actually trying to impersonate you, the best thing you can do is delete the invitations you get.
Related Links & Comments: Could Someone Set Up a Facebook Account in My Name?
Ad-Free Ask Leo!
Support Ask Leo! and enjoy an ad-free experience whenever you visit askleo.com.
It's been hard to avoid hearing about cryptocurrencies lately, especially Bitcoin. Opinions run the gamut from it being “worthless, artificial gold” to the wave of the future and next universal currency we'll all be using someday. Regardless of what you think about its future, the underlying technology is fascinating to people like me.
Recent reports once again question the (unverified) excessive amount of electricity being used to power Bitcoin mining operations.
The question is, of course, how does mining something that exists only as bits and bytes in a computer use so much electricity? Heck, just what is “mining” in this context, anyway?
To understand that a little better while sidestepping some of the complexity, we'll play a game.
Continue Reading: How Does Bitcoin Mining Work?
Disappearing disk space is a very common scenario.
Somehow, no matter how much we have, disk space never seems enough. As we collect pictures and programs (and the programs themselves collect data), more and more disk space is consumed. With so much happening on our computers these days, it's difficult to easily understand what's taking up space.
Fortunately, I can recommend a free tool that can give us some very helpful data.
Continue Reading: Where's My Disk Space Going?
A feature exclusively available to Ask Leo! Patrons Bronze level & above.
- Tip Of The Day: Check All Your Two-factor Options Before Giving Up
- Tip of the Day: Reboot Again After an Unexpected Shutdown
- Tip of the Day: Never Search for "Support"
- Tip of the Day: Know What to Encrypt in the Cloud
- Tip of the Day: A Cheap, Two-step NAS
- Tip of the Day: Bite the Bullet and Upgrade
- Tip of the Day: Not All Java Is the Same
More Ask Leo!
Leo's Other Projects....HeroicStories Since 1999, HeroicStories brings diverse, international voices to the world ' reminding us that people are good, that individuals and individual action matter. Stories - new and old - are published twice a week.
Not All News Is Bad - Each day I look for one story in the current news of the day with a positive bent. Just one. And I share it.
leo.notenboom.org - My personal blog. Part writing exercise, part ranting platform, it's where I write about anything and everything and nothing at all.
Help Ask Leo! Just forward this message, in its entirety (but without your unsubscribe link below) to your friends. Or, just point them at https://newsletter.askleo.com for their own FREE subscription!
Newsletter contents Copyright © 2018,
Leo A. Notenboom & Puget Sound Software, LLC.
Ask Leo! is a registered trademark ® of Puget Sound Software, LLC