Technology, Discovery & Innovation NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home Computing Digital Life Discovery Space More Topics...
You are here: Home / World Wide Web / Google Denies Safari Privacy Breach
Google Insists Safari Privacy Bypass Didn't Collect IDs
Google Insists Safari Privacy Bypass Didn't Collect IDs
By Adam Dickter / Sci-Tech Today Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
FEBRUARY
17
2012



A day after Twitter admitted that it uploads contacts from iPhones and other mobile devices via an application and keeps them for 18 months, Google was caught with its hand in the privacy cookie jar. The search giant developed a code to thwart the private browsing settings of Apple's Safari browser, allowing it to track unsuspecting users' Web surfing, The Wall Street Journal reported.

When the paper called Google to inquire about the practice, the code was discontinued.

Whiz Kid

The privacy breach was uncovered by Jonathan Mayer, a graduate student in computer science at Stanford University with an interest in cybersecurity. The Journal then had a technical adviser confirm that 22 popular Web sites installed the code on a test computer running Safari, while 23 left the code on an iPhone version of the browser.

Attempts to reach Mayer were not successful. Rachel Whetstone, Google's senior vice president for communications and public policy, said in an e-mail statement that the Journal's allegations were off-base.

"Apple's Safari browser blocks third-party cookies by default," she said. "However, Safari enables many Web features for its users that rely on third parties and third-party cookies, such as "Like" buttons. Last year, we began using this functionality to enable features for signed-in Google users on Safari who had opted to see personalized ads and other content -- such as the ability to "+1" things that interest them."

Whetstone said the code in question was actually "a temporary communication link between Safari browsers and Google's servers, so that we could ascertain whether Safari users were also signed into Google, and had opted for this type of personalization."

The link was intended to be anonymous to separate the data collected from personally identifying information, she said. But Google didn't anticipate that the functionality would then open the door for other Google advertising cookies.

"We didn't anticipate that this would happen, and we have now started removing these advertising cookies from Safari browsers," Whetstone said.

Apple did not respond to our calls seeking comment in time for publication, but told the Journal it was looking into the matter.

Good Intentions

Wireless tech analyst Gerry Purdy of MobileTrax said the issue seems reminiscent of the recent controversy over the Carrier IQ software, which was found to run in the background of many popular smartphones, collecting a range of information.

"I suspect that Google has an admirable cause, the ability to make ads that are more relevant to the people who are paying the money," he said. "The industry has got to better regulate or monitor and disclose to people what information is being collected and what the risks and benefits are."

Targeted ads on computers and mobile devices can enhance the user experience, he said,by helping them find products and services closest or most relevant to them. But transparency, he added is key.

"One of the fundamentals of the advertising programs is that people want to make sure they fully understand what's happening," Purdy said, "and what we're seeing right now in a series of events is somewhat of an equivocation."

Read more on: Google, Safari, Apple, Privacy
Tell Us What You Think
Comment:

Name:

lev vaine:

Posted: 2012-03-07 @ 8:48am PT
Sugarmountain's empire is friend-enemy. Many pple given notice about this subterfuge do not care nor r worried about privacy issues cause they believe that they r not important or r doing anything wrong = they do not understand the larger issue.

Google SaBaDidea:

Posted: 2012-02-22 @ 4:11pm PT
OOPS !!
We got caught, so what should we do now?
Hmmmmmmm........
I know, we'll lie through our teeth and hope it sounds believable.

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY BE OF INTEREST
IT departments are embracing cloud backup, but there's a lot you need to know before choosing a service provider. Learn all the critical things you need to know by accessing the white paper, "5 Things You Didn't Know About Cloud Backup". Access the White Paper now.
MORE IN WORLD WIDE WEB
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Russian Gang with Stolen IDs Hacks Hosting Company
In August, a Russian cyber gang obtained what researchers called “the largest cache of stolen data." Now, those hackers may be putting their ill-gotten gains to criminal use.
 
Dairy Queen Latest Retailer To Report Hack
Known for its hot fries and soft-serve ice cream, Dairy Queen just made cyber history as the latest victim of a hack attack. The fast food chain said that customer data at some stores may be at risk.
 
Lessons from the JPMorgan Chase Cyberattack
JPMorgan Chase is investigating a likely cyberattack. The banking giant is cooperating with law enforcement, including the FBI, to understand what data hackers may have obtained.
 

Enterprise Hardware Spotlight
AMD's New FX Series CPU Breaks Processing Speed Record
The new FX-8370 processor from Advanced Micro Devices has set a record for silicon processor speed, the company announced. Overclocked, the eight-core chip was measured at 8722.78 MHz.
 
Intel Intros Lightning-Fast PC Processors
Call it extreme. Intel just took the covers off its first-ever eight-core desktop processor, which is aimed at hardcore power users who expect more than the status quo from their computers.
 
HP Previews ProLiant Gen9 Data Center Servers
Because traditional data center and server architectures are “constraints” on businesses, HP is releasing new servers aimed at faster, simpler and more cost-effective delivery of computing services.
 

Mobile Technology Spotlight
Rumor Mill Puts Mobile Wallet in iPhone 6
Apple is moving toward the mobile wallet world with its next iPhone. The tech giant has partnered with retailers, banks and major payment networks to make it happen, according to Bloomberg.
 
Will iPhone Finally Catch Up with NFC Mobile Payment Ability?
Apple's latest version of the iPhone may have a mobile wallet to pay for purchases with a tap of the phone. The iPhone 6 reportedly is equipped with near-field communication (NFC) technology.
 
Visual Search To Shop: Gimmick or Game Changing?
Imagine using your phone to snap a photo of the cool pair of sunglasses your friend is wearing and instantly receiving a slew of information about the shades along with a link to order them.
 

Navigation
Sci-Tech Today
Home/Top News | Computing | Digital Life | Discovery | Space | Innovation | Health | Science News
Environment
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.