Should not use Google Desktop?

The EFF (Electronic Frontier Foundation) has announced that the new features added in the software version of Google Desktop provided on February 9 have too many security risks and do not guarantee privacy. private.

Picture 1 of Should not use Google Desktop? A group of personal privacy protection experts briefed individuals and businesses that: ' The latest Google Desktop version should not be used ' because user information will be stored on the server hosting database (database server) of Google.

The new " Share Across Computers " feature keeps web browsing history, Microsoft Office files, PDF and text (TEXT) on Google's servers allowing users to execute remote search (remote search) from many different browsing computers, but according to the EFF, this is the point where malevolent hackers can easily exploit.

According to Google, user information is stored on their servers in case the user's personal computer is inactive or offline while the updated information is indexed on. another computer. Google repeated, repeating the chorus: ' We temporarily store this information on Google's servers and automatically delete old content, and your information will not be accessed by anyone else when using the search engine. of Google '

Google says users can use the ' Clear my Files ' option manually to delete information on the server or select the ' Don't Search These Items ' option to cancel certain files or special locations on the server. index of server. But the EFF sees this as inappropriate, it's like the user is exposing their A-sin heel, especially the government can intervene in personal affairs, especially in the context of the US government. are confronting the parliament in the explanation of the "phone tapping campaign".

Another information that should be repeated is that Google itself must fight to ensure the safety of their Google Desktop search application. In November 2004, Google was in a hurry to provide programs to patch security vulnerabilities when this application specifically users into information theft attacks (' man-in-the-middle data leak). attacks ').

TRUNG NGUYEN