Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for performing authentication via social networking data. A system configured to perform the example method first receives a request for a security token from a requestor. The system identifies, for the request, an executor and a trustee from social network contacts of the requestor. The system generates a challenge question based on location history information common to the requestor, the executor, and the trustee. The system presents the challenge question to the executor and to the trustee. The system receives an executor response from the executor and a trustee response from the trustee, and when the executor response and the trustee response match, transmits the security token to the requestor.