Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Google Privacy Government Safari

Google Facing New Privacy Probe Over Safari Incident 134

An anonymous reader writes "Last month we discussed news of a controversial method Google was using to bypass Safari's privacy settings in order to enable certain features for users who were logged in to Google. Now, U.S. regulators are investigating Google's actions to see whether the search giant has violated the privacy protection agreement they signed last year that includes a clause prohibiting Google from misrepresenting how users control the collection of their data. 'The fine for violating the agreement is $16,000 per violation, per day. Because millions of people were affected, any fine could add up quickly, depending on how it is calculated. ... A group of state attorneys general, including New York's Eric Schneiderman and Connecticut's George Jepsen, are also investigating Google's circumvention of Safari's privacy settings, according to people familiar with the investigation. State attorneys general can have the ability to levy fines of up to $5,000 per violation.' European regulators are adding the Safari investigation to their review of Google's consolidated privacy policy."
This discussion has been archived. No new comments can be posted.

Google Facing New Privacy Probe Over Safari Incident

Comments Filter:
  • by cpu6502 ( 1960974 ) on Friday March 16, 2012 @12:28PM (#39379041)

    "Google did no wrong. Google is awesome."

    Realthink:
    I don't trust Google anymore than I trust Microsoft or Apple or any other megacorp. I hate corporations. (But I fear government.)

  • by stupor ( 165265 ) on Friday March 16, 2012 @12:29PM (#39379047)

    If my boss asked me to do something like this, I'd fight it kicking and screaming. I'd probably quit too if the software was significant like a google.

  • Investigate Apple (Score:2, Insightful)

    by haystor ( 102186 ) on Friday March 16, 2012 @12:31PM (#39379093)

    Isn't Safari the one misrepresenting what the security settings do?

    While I'm as shocked as the next person that google knows I've been buying windshield wipers, how is it that google is being held to the promises Safari has made to its users?

  • by betterunixthanunix ( 980855 ) on Friday March 16, 2012 @12:33PM (#39379115)
    Why fix security problems when you can just prosecute people?
  • Re:Bug? (Score:4, Insightful)

    by bkaul01 ( 619795 ) on Friday March 16, 2012 @12:47PM (#39379331)
    Of course, but patching the hole and going after people who create malware that takes advantage of it is not an either/or choice: both are necessary, generally speaking. Google, in taking advantage of a browser exploit, is essentially stooping to the tactics used by malware authors, even though unlike them it has signed agreements and generated official privacy policies saying it'd do no such thing.
  • by Richard_at_work ( 517087 ) on Friday March 16, 2012 @01:02PM (#39379575)

    Google isn't being held to the promises Safari has made, Google is being held to the agreement it had with the DoJ because in the course of collecting data about the user they deliberately circumvented, admittedly fairly weak, restrictions the user placed on their actions within the browser.

    There are two entirely different issues at hand here - Safari needs to be fixed somehow (although someone further down the thread suggests this isnt an easy fix) and Google got caught with its hand in the cookie jar when it probably shouldn't have had it there.

    Just because your window is open doesn't mean people are allowed to climb through it to circumvent the locked door.

  • by TheRaven64 ( 641858 ) on Friday March 16, 2012 @01:05PM (#39379621) Journal
    Apple released a browser that had a security hole. Google exploited the security hole. If OpenSSH ships with a vulnerability that allows someone to get root access on my server, should the OpenSSH team or the attacker be prosecuted?
  • by Americano ( 920576 ) on Friday March 16, 2012 @01:25PM (#39379907)

    Isn't Safari the one misrepresenting what the security settings do?

    It's an unintended side effect of how Safari handles third-party cookies: Safari blocks third party cookies, but makes an exception for sites the user interacts with (i.e., if you click on an ad, it will allow that ad to install a cookie). So what Google is doing is basically loading a no-op form element in an iframe and automatically submitting it - this tricks Safari into behaving as if the USER submitted the form (thus interacting with the ad), allowing Google to set the cookie.

    Safari WOULD block setting of the cookie without this workaround being coded & inserted into the ads being served up by DoubleClick... so it's not a case of Google being held to account for promises Safari makes, it's that Google is being held to account for intentionally exploiting a loophole in the software to abuse users. People keep trying to turn this into an "Google vs. Apple" issue, and the real issue (and where it's eroding trust in Google) is that it's a "Google vs. Users" issue. I can't trust Google to honor those settings in my browser, can I trust them to honor any other settings and preferences I set in my browser, or register with them?

    There's no reason Google couldn't have instead put up a page saying "We notice you don't allow third party cookies... this will mean you can't +1 things, blah blah blah," and include instructions on changing the setting if the user wishes to enable +1's and other tracking, rather than simply disregarding the users' settings and exploiting the loophole.

  • by Anthony Mouse ( 1927662 ) on Friday March 16, 2012 @02:49PM (#39380987)

    Exploiting privacy vulnerabilities is bad, bad, bad.

    That word...I don't think it means what you think it means.

    Let me give you an example. If you want to jailbreak an iPhone, you have to find a security vulnerability. Like, a real one, not this "well if you submit a form then it isn't considered a third party cookie" grey area nonsense, a real root shell "exploit." Is the company that makes the jailbreak website then "exploiting privacy vulnerabilities" because having rooted the phone, the software could in theory then send all the user's pictures and web history to the jailbreak author and so on? No, not until they do something that actually impairs the user's privacy.

    Adding a +1 button to a third party website doesn't exactly fall into the same category as stealing credit card numbers or turning on one's webcam without authorization.

  • by Anthony Mouse ( 1927662 ) on Friday March 16, 2012 @03:21PM (#39381473)

    The question becomes what happens after Google reported it, and seemingly kept using that pump until it was properly calibrated.

    You're making the "corporations are people" fallacy. Corporations are not actually, literally people. The people who work on Chrome and Webkit are almost certainly not the same people who work on Google+ and the like. They probably don't have any idea what the other is doing. It's not like every time anyone submits a patch to anything, they go running around to all the other departments to tell them about it.

    On top of that, calling this a "vulnerability" or "exploit" is really pushing it. There is no obvious hard line between first and third party cookies. They have no obvious or official definition. Safari drew the line in a way that classified a lot of the borderline cases as "first party" cookies -- which actually makes a certain amount of sense, since they block third party cookies by default and over-blocking would break too many things.

    So along comes, I don't know, everybody who uses cookies that would be blocked by Safari's defaults, and when they encounter Safari, they take steps to restore the original functionality. And since some (but not all) of those people are the sort of ad networks who track you in a way that made browser vendors consider an option to block third party cookies in the first place, Google submitted a patch to classify more of them as third party. Which breaks more legitimate stuff, because it's a trade off. It's not that the original default is bad, broken, or a vulnerability...it's that the line is a silly, ambiguous one to draw in the first place. What it's trying to accomplish is Do Not Track, but as a hack and consequently with a lot of collateral damage to legitimate features that everyone then scrambles to mitigate with work arounds like the one Google had been using.

    So that happens, and along comes the Microsoft propaganda machine to point out that because Google is both a social network and an ad network, wouldn't it be nice to accuse the ad network of privacy violation as a result of a borderline cookie feature shared by all social networks? Give me a break.

If all else fails, lower your standards.

Working...