Google bends to Chrome privacy criticism
It agrees to anonymize data from browser's OmniBox bar
Computerworld - Reacting to criticism that its new Chrome browser was essentially acting as a keylogger, potentially recording users' every keystroke, Google Inc. yesterday said it would render anonymous the data it collects from the browser within 24 hours.
A privacy expert said the change's impact couldn't be gauged without knowing exactly how Google will "anonymize" the data it records as users type in Chrome's "OmniBox," the name given to the browser's combination address bar-search bar.
Google has taken heat over the "Google Suggest" feature used within OmniBox since it launched Chrome last week. The Suggest feature automatically lists related search queries and popular Web destinations based on the text typed into the OmniBox. Suggest works by logging users' keystrokes -- not just in the OmniBox, but since late last month in Google's primary search field -- and offering the most likely sites or searches based on a blend of popularity and the search company's own algorithms.
Suggest transmits those keystrokes to Google's servers, as the feature's FAQ acknowledges. "Just as E.T. needs to phone home in order to get a spaceship to pick him up, Google Suggest needs to talk to Google while you type in order to offer suggestions to you," the FAQ reads.
While all keystrokes typed into Chrome's OmniBox are sent to Google, the vast majority aren't permanently recorded, but instead are discarded as soon as suggestions are returned to the browser. About 2% of the time, however, the keystrokes are recorded, along with associated data such as the IP address of the user who entered those keystrokes.
Previously, Google said it needed that data to monitor and improve Suggest. On Monday, the company announced it would change how long it keeps the data logged from Suggest.
"Given the concerns that have been raised about Google storing this information, and its limited potential use, we decided that we will anonymize it within about 24 hours, basically, as soon as we practically can," said Urs Holzle, Google's senior vice president for operations, in an entry to the company's blog late Monday.
"All data retention is a balance between user privacy and trust on the one hand, and security and innovation on the other," argued Holzle. "In the case of Google Suggest, we decided it's possible to provide a great service while anonymizing data almost immediately."
Google Suggest, which had been in development since 2004, began rolling out to Google's search engine late last month. Before that, it was widely used by Google Toolbar, Mozilla Corp.'s Firefox and Apple Inc.'s iPhone.
The logging, transmitting and recording of keystrokes, however, returned to the forefront when Google released Chrome a week ago. What sparked the criticism over Chrome was the everything-in-one-place nature of the browser's OmniBox, said Alissa Cooper, the chief computer scientist at the Center for Democracy and Technology. Unlike other browsers, which separate the address bar -- where users type URLs -- from the search bar, Chrome combines the two.
- Continuing coverage: Google's Chrome browser
- Review: Google's Chrome -- the first true Web 2.0 browser
- FAQ: Google polishes up its new browser, Chrome
- Frankly Speaking: Google Chrome's SaaS model should worry IT
- John Brandon: Chrome is Google 2.0
- Steven J. Vaughan-Nichols: Google Chrome: First run around the track
- Seth Weintraub: Google Chrome is a mixed bag for Apple
- First Look: Is Google's Chrome a glimpse of the future?
- Google's Chrome aims to kill Windows, make Web the OS of choice
- Preston Gralla: Chrome takes dead aim at Windows 7 and Microsoft Office
- Mission Critical: Managing Mobile Applications & Content Smartphones, tablets and other mobile devices have become embedded in enterprise processes, thanks to the consumerization of IT and a new generation of...
- Securing Mobility, From Device to Network At one time, the process of managing and securing mobile devices and applications was fairly straightforward. Most organizations worried about one application (email)...
- Planning for Mobile Success Many organizations are seeing clear and quantifiable benefits from the deployment of mobile technologies that provide access to data and applications any time,...
- The Challenges and Opportunities of Mobile Application Development Nearly all business users now demand mobile devices--their own or company-owned--along with anywhere access to corporate applications and data. What turns mobile devices...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily... All Privacy White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!