12:41 PM
Kevin Casey
Kevin Casey

Online Privacy: We Just Don't Care

Facebook leaked your data (again). Big Brother's watching everyone and everything. And Google is testing a "service" that sounds like you providing them a list of everything you own.

A rumor recently surfaced that Google is testing a new service, in the loosest sense of the word, called Google Mine. As InformationWeek's Thomas Claburn noted, Google Mine appears to serve no one but Google. You give Google a list of stuff you own -- and that's it. (OK, it's a bit more than that -- but that's really kind of it.)

I'm a heavy user of a variety of Google services -- a modern serf, according to information security pundit Bruce Schneier's analogy, and a loyal one at that -- but I'm left scratching my head. Why would I ever need Google Mine? Google does not lack for information about me: Email, Internet searches, and so forth. Now I should inventory my house and upload that, too -- while apparently getting nothing in return? (Welcome, burglars!)

Google may have a copy of every email I've sent during the past seven years or so, but at least Gmail gives me, you know, free email. Yet I've no doubt that if Google Mine rolled out tomorrow, thousands upon thousands -- and likely millions -- of people would sign up overnight.

Zuckerberg was onto something, though perhaps not for noble reasons. "Privacy" has evolved to a point of "anything but." Many of us, me included, seem awfully comfortable with the apparent reality that there is absolutely no such thing -- and we continue to dump large troves of personal information online. Even Zuckerberg's self-serving logic in those salad days of 2010 is alarmingly sound in hindsight. We don't care about our privacy on the Internet because we use the Internet.

After all, what's the alternative -- drop Google? I don't think they make paper maps anymore. Disconnect Skype? But then I'd have to actually start paying for phone calls again. Don't use Facebook? Are you kidding me? What else am I supposed to do with these pictures of my kids?

2 of 2
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
1/11/2014 | 4:54:34 AM
Online Privacy: We Just Don't Care
According to news by Forbes, teens in the US really care about their privacy, which comes as a surprise to many.

The web of social networking spun by Mark Zuckerberg has quickly spawned around the world to engulf a substantial majority of internet users.

I would also share 10 Things about Facebook That Affect Your Internet Privacy!
Register for Dark Reading Newsletters
White Papers
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-05-02
Multiple cross-site scripting (XSS) vulnerabilities in Cisco Finesse Server 10.0(1), 10.5(1), 10.6(1), and 11.0(1) allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCut53595.

Published: 2015-05-01
The Jpeg2KImagePlugin plugin in Pillow before 2.5.3 allows remote attackers to cause a denial of service via a crafted image.

Published: 2015-05-01
The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request.

Published: 2015-05-01
Red Hat Enterprise Virtualization (RHEV) Manager before 3.5.1 ignores the permission to deny snapshot creation during live storage migration between domains, which allows remote authenticated users to cause a denial of service (prevent host start) by creating a long snapshot chain.

Published: 2015-05-01
Red Hat Enterprise Virtualization (RHEV) Manager before 3.5.1 uses weak permissions on the directories shared by the ovirt-engine-dwhd service and a plugin during service startup, which allows local users to obtain sensitive information by reading files in the directory.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.