@ARTICLE{Glet_Michał_Access_2020, author={Glet, Michał and Kaczyński, Kamil}, volume={vol. 66}, number={No 3}, journal={International Journal of Electronics and Telecommunications}, pages={405-410}, howpublished={online}, year={2020}, publisher={Polish Academy of Sciences Committee of Electronics and Telecommunications}, abstract={Access logs may offer service providers a lot of information about specific users. Depending on the type of the service offers, the operator is capable of obtaining the user’s IP, location, communication habits, device information and so on. In this paper, we analyze a sample instant messenger service that is operating for a certain period of time. In our sandbox, we gathered enough data to correlate user communication habits with their localization, and even contacts. We show how seriously metadata may impact the user’s privacy and make some recommendations about mitigating the quantity of data collected in connection with this type of services.}, type={Article}, title={Access Logs – Underestimated Privacy Risks}, URL={http://czasopisma.pan.pl/Content/115219/PDF/56_2547_Kaczynski_skl_new1.pdf}, doi={10.24425/ijet.2020.131892}, keywords={metadata, privacy, cybersecurity, instant messaging, access logs}, }