Google Facing New Privacy Probe Over Safari Incident 134
An anonymous reader writes "Last month we discussed news of a controversial method Google was using to bypass Safari's privacy settings in order to enable certain features for users who were logged in to Google. Now, U.S. regulators are investigating Google's actions to see whether the search giant has violated the privacy protection agreement they signed last year that includes a clause prohibiting Google from misrepresenting how users control the collection of their data. 'The fine for violating the agreement is $16,000 per violation, per day. Because millions of people were affected, any fine could add up quickly, depending on how it is calculated. ... A group of state attorneys general, including New York's Eric Schneiderman and Connecticut's George Jepsen, are also investigating Google's circumvention of Safari's privacy settings, according to people familiar with the investigation. State attorneys general can have the ability to levy fines of up to $5,000 per violation.' European regulators are adding the Safari investigation to their review of Google's consolidated privacy policy."
Re:Slashdot Groupthink (Score:3, Funny)
But but but, if people can't build their identity over corporate cheerleaderism, what will they do? You mean I'm really a middle-class IT drone and not a proud member of TEAM GOOGLE or TEAM APPLE? Impossible!
Ra ra my mega corp can beat up your mega corp! Apple is evil, Google loves me!
Re:Bug? (Score:3, Funny)
If I leave my car door unlocked it's still illegal to steal it.
LOL the CAPTCHA for this post is "burglar".
Alert W3C posting exploit code! (Score:4, Funny)
I visited this rogue site that posts hostile code exploits and learned how to circumvent user privacy....
http://www.w3schools.com/jsref/met_form_submit.asp [w3schools.com]
Even worse, this malware generating site makes exploit code even easier...
http://api.jquery.com/submit/ [jquery.com]
And yes, I used the most evil and corrupt search engine ever invented (past and future) to locate these hacker havens