Feeds

Third Voice slammed for ‘defacing’ Web sites

Webmasters up in arms over site comment software

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

US software developer Third Voice has provoked the ire of Internet users and Webmasters by releasing software that allows Web surfers to share comments about Web sites. The problem is not necessarily that the Third Voice system is invasive, but that it allows anyone to add comments -- such as spam -- to a Web site without the permission of the site's owner. Third Voice is a Windows-only browser plug-in that allows users to select text on a Web page and attach a comment, in the form of a pop-up note, to it. Other Third Voice users visiting the site see one or more icons on the page which signal the presence of comments. It's unlikely that the Third Voice software actually modifies a page's code directly -- it's more likely that Third Voice itself maintains a database of URLs and connected comments. That said, the effect -- at least for other Third Voice users -- is much the same: and it's not necessarily what the page designer intended. That's the issue for Webmasters, and some have argued that it's a violation of copyright (a difficult point to argue since apparently no copyright material is reproduced without authorisation). One Web site has even been set up to promote that idea that Third Voice's software should be banned. The site is full of example of comments obscuring original Web sites, though this isn't what a Third Voice user would initially see on loading the site. It's also interesting that the Say No To Third Voice site is provided by an ISP that throws up a window containing unwanted advertising -- so the campaigners are to a degree guilty of the very crime they accuse Third Voice of. However, the site does at least provide a JavaScript for Webmasters keen to make some attempt to prevent Third Voice 'tampering'. Webmasters have a right to protect their property, but then users have a right to comment on those sites. Third Voice is unlikely to go away, but the real test will be how it is used. If users don't want to see the extra comments, they don't need to download the plug-in. And if, as seems likely, the service becomes dominated by spammers, many users may choose simply to throw away the plug-in. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
'Cowardly, venomous trolls' threatened with TWO-YEAR sentences for menacing posts
UK government: 'Taking a stand against a baying cyber-mob'
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Don't bother telling people if you lose their data, say Euro bods
You read that right – with the proviso that it's encrypted
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.