| You might want to think twice the next time a stranger asks to befriend you on a social networking site. If this IT World article is to be believed, that stranger might want to use innocuous personal information to create a convincing clone of your identity on another social network. Why clone your identity? To use it in nefarious . . .