Language Selection

English French German Italian Portuguese Spanish

Google's Growth Prompts Privacy Concerns

Filed under
Security

Google is at once a powerful search engine and a growing e-mail provider. It runs a blogging service, makes software to speed Web traffic and has ambitions to become a digital library. And it is developing a payments service.

Although many Internet users eagerly await each new technology from Google Inc., its rapid expansion is also prompting concerns that the company may know too much: what you read, where you surf and travel, whom you write.

"This is a lot of personal information in a single basket," said Chris Hoofnagle, senior counsel with the Electronic Privacy Information Center. "Google is becoming one of the largest privacy risks on the Internet."

Not that Hoofnagle is suggesting that Google has strayed from its mantra of making money "without doing evil."

Rather, some privacy advocates worry about the potential: The data's very existence - conveniently all under a single digital roof - makes Google a prime target for abuse by overzealous law enforcers and criminals alike.

Through hacking or with the assistance of rogue employees, they say, criminals could steal data for blackmail or identity theft. Recent high-profile privacy breaches elsewhere underscore the vulnerability of even those systems where thoughtful security measures are taken.

Law enforcement, meanwhile, could obtain information that later becomes public, in court filings or otherwise, about people who are not even targets of a particular investigation.

Though Google's privacy protection is generally comparable to - even better than - those at Microsoft Corp., Yahoo Inc. (Nasdaq:YHOO - news), Amazon.com Inc. and a host of other Internet giants, "I don't think any of the others have the scope of personal information that Google does," Hoofnagle said.

Plus, Google's practices may influence rivals given its dominance in search and the fierce competition.

"Google is perhaps the most noteworthy right now by the simple fact that they are the 800-pound gorilla," said Lauren Weinstein, a veteran computer scientist and privacy advocate. "What they do tends to set a pattern and precedent."

The concerns reflect Google's growing heft. As startups get bigger and more powerful, scrutiny often follows.

Google says it takes privacy seriously.

"In general, as a company, we look at privacy from design all the way (through) launch," said Nicole Wong, an associate general counsel at Google.

That means product managers, engineers and executives - not just lawyers - consider the privacy implications as new technologies are developed and new services offered, Wong said.

She also said that Google regularly seeks feedback from civil liberties groups such as the Center for Democracy and Technology and the Electronic Frontier Foundation, both of which credit Google for listening even if it doesn't always agree.

Google's privacy statements specify that only some of its employees have access to personal data - on a need-to-know basis - and such access is logged to deter abuse.

Google Chief Executive Eric Schmidt says a tradeoff exists between privacy and functionality, and the company believes in making fully optional - and seeking permission beforehand - any services that require personally identifiable information.

"There are always options to not use that set of technology and remain anonymous," Schmidt told reporters in May.

But what is meant by personally identifiable information is subject to debate.

Google automatically keeps records of what search terms people use and when, attaching the information to a user's numeric Internet address and a unique ID number stored in a Web browser "cookie" file that Google uploads to computers unless users reconfigure their browsers to reject them.

Like most Internet companies, Google says it doesn't consider the data personally identifiable. But Internet addresses can often be traced to a specific user.

Here's just some of the ways Google can collect data on its users:

_One of Gmail's selling points is its ability to retain e-mail messages "forever."

_Google's program for scanning library books sometimes requires usernames to protect copyrights.

_The company is testing software for making Web pages load more quickly; the application routes all Web requests through its servers.

_Google also provides driving directions, photo sharing and instant messaging, and it is developing a payments service that critics say could add billing information to user profiles.

Because storage is cheap, data from these services can be retained practically forever, and Google won't specify how long it keeps such information.

Without elaborating, Google says it "may share" data across such services as e-mail and search. It also provides information to outside parties serving as Google's agents - though they must first agree to uphold Google's privacy policies.

Much of the concern, though, stems from a fear of the unknown.

"Everybody gets worried about what they (Google) could do but what they have done to date has not seemed to violate any privacy that anyone has documented," said Danny Sullivan, editor of the online newsletter Search Engine Watch.

Eric Goldman, a cyberlaw professor at Marquette University, believes the focus ought to be on the underlying problem: access by hackers and law enforcement.

"We still need to have good technology to inhibit the hackers. We still need laws that make hacking criminal. We still need restraints on government surveillance," Goldman said. "Google's database doesn't change any of that."

Anne Rubin, 20, a New York University junior who uses Google's search, Gmail and Blogger services, says quality overrides any privacy concerns, and she doesn't mind that profiles are built on her in order to make the ads she sees more relevant.

"I see it as a tradeoff. They give services for free," she said. "I have a vague assumption that things I do (online) aren't entirely private. It doesn't faze me."

Larry Ponemon, a privacy adviser, says research by his Ponemon Institute found Google consistently getting high marks for trust.

By contrast, Microsoft, whose software sometimes crashes and regularly gets violated by hackers, didn't fare as well despite what Ponemon and others acknowledge are improvements in its approach to privacy.

"People confuse customer service with obligations to maintain privacy," Ponemon said. "Google has a product that seems to work. It gets almost like a free ride on privacy."

That's changing.

Google, a perennially secretive company, may share some of the blame. It goes out of its way to strip its privacy statements of legalese so they are easier to read. But the statements remain vague on how long the company keeps data.

In an interview, Wong said Google had no set time limits on data retention; such determinations are left to individual product teams. She said the information helps Google know how well it is doing - for instance, are users getting the results they want in the first five, 10 or 100 hits?

"We keep data that's collected from our services for as long as we think it's useful," she said.

Google says it releases data when required by law, but its privacy statements offer few details. Wong said Google doesn't surrender data without a subpoena, court order or warrant. But she would not offer any details on how many requests it gets, or how often, and federal law bars Google from disclosing requests related to national security.

For civil lawsuits, Wong said, Google warns users before it complies so they can file objections with a court - a fact the company doesn't publicize.

Mark Rasch, who was a Justice Department prosecutor in the 1980s and has since advised companies on getting data from Internet companies, says electronic records will only become more relevant for investigators searching for evidence of intent and knowledge.

"As Google becomes more involved in parts of your lives including chats and blog, then it's going to get lots more subpoenas," he said. "It's a lot more than just a search tool."

Associated Press

More in Tux Machines

digiKam 7.7.0 is released

After three months of active maintenance and another bug triage, the digiKam team is proud to present version 7.7.0 of its open source digital photo manager. See below the list of most important features coming with this release. Read more

Dilution and Misuse of the "Linux" Brand

Samsung, Red Hat to Work on Linux Drivers for Future Tech

The metaverse is expected to uproot system design as we know it, and Samsung is one of many hardware vendors re-imagining data center infrastructure in preparation for a parallel 3D world. Samsung is working on new memory technologies that provide faster bandwidth inside hardware for data to travel between CPUs, storage and other computing resources. The company also announced it was partnering with Red Hat to ensure these technologies have Linux compatibility. Read more

today's howtos

  • How to install go1.19beta on Ubuntu 22.04 – NextGenTips

    In this tutorial, we are going to explore how to install go on Ubuntu 22.04 Golang is an open-source programming language that is easy to learn and use. It is built-in concurrency and has a robust standard library. It is reliable, builds fast, and efficient software that scales fast. Its concurrency mechanisms make it easy to write programs that get the most out of multicore and networked machines, while its novel-type systems enable flexible and modular program constructions. Go compiles quickly to machine code and has the convenience of garbage collection and the power of run-time reflection. In this guide, we are going to learn how to install golang 1.19beta on Ubuntu 22.04. Go 1.19beta1 is not yet released. There is so much work in progress with all the documentation.

  • molecule test: failed to connect to bus in systemd container - openQA bites

    Ansible Molecule is a project to help you test your ansible roles. I’m using molecule for automatically testing the ansible roles of geekoops.

  • How To Install MongoDB on AlmaLinux 9 - idroot

    In this tutorial, we will show you how to install MongoDB on AlmaLinux 9. For those of you who didn’t know, MongoDB is a high-performance, highly scalable document-oriented NoSQL database. Unlike in SQL databases where data is stored in rows and columns inside tables, in MongoDB, data is structured in JSON-like format inside records which are referred to as documents. The open-source attribute of MongoDB as a database software makes it an ideal candidate for almost any database-related project. This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the MongoDB NoSQL database on AlmaLinux 9. You can follow the same instructions for CentOS and Rocky Linux.

  • An introduction (and how-to) to Plugin Loader for the Steam Deck. - Invidious
  • Self-host a Ghost Blog With Traefik

    Ghost is a very popular open-source content management system. Started as an alternative to WordPress and it went on to become an alternative to Substack by focusing on membership and newsletter. The creators of Ghost offer managed Pro hosting but it may not fit everyone's budget. Alternatively, you can self-host it on your own cloud servers. On Linux handbook, we already have a guide on deploying Ghost with Docker in a reverse proxy setup. Instead of Ngnix reverse proxy, you can also use another software called Traefik with Docker. It is a popular open-source cloud-native application proxy, API Gateway, Edge-router, and more. I use Traefik to secure my websites using an SSL certificate obtained from Let's Encrypt. Once deployed, Traefik can automatically manage your certificates and their renewals. In this tutorial, I'll share the necessary steps for deploying a Ghost blog with Docker and Traefik.