Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


01:22 PM
Rob Enderle
Rob Enderle

Is Google Stealing Our Digital Freedom?

With the Fourth Of July here, it's a good time to focus on freedom. It seems that often when new technology and new ways of getting revenue advance in an industry, those who don't understand that technology are exploited by those who do. Google's model seems to increasingly fit this mold, and the example it is setting is driving others down the same path.

With the Fourth Of July here, it's a good time to focus on freedom. It seems that often when new technology and new ways of getting revenue advance in an industry, those who don't understand that technology are exploited by those who do. Google's model seems to increasingly fit this mold, and the example it is setting is driving others down the same path.Now while I continue to talk about Google, it is because it is the leading user of the advertising revenue model and because it is the leader in search, which makes that model dangerous. It is far from the only company doing this, however, it is the company that is driving the behavior.

Google's financial model has bothered me for a long time, primarily because 97 percent of its money comes from advertising revenue yet it behaves as if it were a product company. This advertising revenue comes from selling eyeballs and the information that defines people on the Web, our virtual selves, to advertisers. The profit, which is impressively large, is the difference between the cost of the services it provides and the value of the information it is trading us for.

We go along with this largely because we both don't realize the value of what it is we are trading. And even if we did and still wanted to sell it, we have no way to actually consummate that deal.

But what if this information is captured while we are at work? Many of us have likely signed employment agreements that grant the rights to things we create to our companies. But Google appears to derive value from the information created while we use its services and, just like it doesn't compensate us for that value monetarily, it doesn't do that for our employers, either. If our employer uses a Google product, then it may pay a fee but likely doesn't account for the information value Google is pulling out of the firm. This would be like having a home-cleaning service that was aggressively priced but made up for it by taking things you probably wouldn't miss and then reselling them.

Now if there were a firm that specialized in the resale of stolen intellectual property, and it came to your company offering a free janitorial service, you'd likely chase them away with the equivalent of pitchforks. Even if they simply resold intellectual property but made no distinction on whether it was legitimately or illegitimately acquired, you would put out the garlic and keep it away from your door.

Google appears to make no distinction between the legal and illegal use of information except when it comes to its own information or information surrounding its executives. With that information, Google is highly protective. But Google has gotten into trouble repeatedly for providing information that countries and individuals felt was not its to provide. Back when CNET tried to point this out in Google's early years, instead of addressing the problem, Google blacklisted CNET.

The company's goal is to index and provide access to the world's information, regardless of ownership rights or laws. What's the difference between someone who sells stolen property and a legitimate store selling the same thing? A disregard for who owns the property and the local laws. Google has repeatedly shown both.

I really don't like the free model because I see it as a confidence game. What you are actually paying isn't disclosed, so you blindly think you aren't paying anything -- and that is the con. With Google and other "free" products and services, there is a cost. In all cases, the firm should be in full agreement with that cost and the ramifications of it before using the "free" or cheaper offering.

For security, any company that seems to show a disregard for laws and ownership rights should be looked at it for what it is. And what it's not -- a vendor that is protecting your, or your company's, rights and freedoms.

Freedom may be just a word, but many died to protect ours. Perhaps we shouldn't give it up with the false promise of "free stuff."

-- Rob Enderle is president and founder of Enderle Group. Special to Dark Reading.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Intel Issues Fix for 'Plundervolt' SGX Flaw
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/11/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-12-14
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
PUBLISHED: 2019-12-14
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
PUBLISHED: 2019-12-13
There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition...
PUBLISHED: 2019-12-13
Huawei CloudUSM-EUA V600R006C10;V600R019C00 have an information leak vulnerability. Due to improper configuration, the attacker may cause information leak by successful exploitation.
PUBLISHED: 2019-12-13
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board m...