Feeds

Yahoo! mocks Google Privacy Theatre

Less-nonsensical anonymization

SANS - Survey on application security programs

Analysis The privacy gap between Yahoo! and Google is greater than you think. It's not just that Yahoo! will anonymize user search data 6 months before Google anonymizes user search data. It's that Yahoo! anonymization is less nonsensical than Google anonymization.

Today, as we dutifully reported, Yahoo! said it would anonymize user search data within a mere 90 days (with exceptions for fraud, security, and legal obligations). It even agreed to extend this unprecedented policy to page views, page clicks, ad views, and ad clicks.

Of course, anonymization is a meaningless word. But it would seem that Yahoo!'s use of the term isn't nearly as misleading as Google's. When Yahoo! says it will anonymize log data, it intends to:

  • Delete the final octet of the user's IP address
  • Run the user's Yahoo! ID through a one-way secret hash and delete the last 50 per cent of the hashed identifier
  • Run the user's cookie identifiers through a one-way secret hash
  • Filter all personally identifiable information - such as credit card numbers, social security numbers, and non-popular names - from search queries

In its lust for targeted advertising and who knows what else, Yahoo! has stopped short of true anonymization: deleting IPs, IDs, and cookie info entirely. Recreating this data isn't beyond the realm of possibility. But at Google, recreation is trivial.

The Mountain View Chocolate Factory says it will - at some unspecified point in the future - anonymize user data after nine months. But it takes some additional liberties with the word "anonymize".

With its nine-month anonymiztion, Google intends to "change some of the bits" in the user IPs stored on its servers. But that's it. The plan would leave cookie data alone.

And that means IPs are easily restored.

Google may erase certain IP bits on your nine-month-old search queries, but those bits will remain intact on newer queries - and both sets of queries will carry the same cookie info. Recovering the missing bits on older data is one-step process.

After 18 months, Google does alter cookie data - in some unspecified way. And the company argues that users have the power to scrub their own cookies before then. "We have focused on IP addresses, because we recognize that users cannot control IP addresses in logs," the company has told us. "On the other hand, users can control their cookies.

"When a user clears cookies, s/he will effectively break any link between the cleared cookie and our raw IP logs once those logs hit the 9-month anonymization point. Moreover, we are still continuing to focus on ways to help users exert better controls over their cookies."

Of course, most users don't even know what a cookie is.

Plus, Google has not said it will disassociate search queries from your Google ID - required for using Google services such as Gmail or Google Docs and Spreadsheets.

In September, Google also said it might tweak its nine-month policies. But today, in the email, the ad broker provided no update. At the moment, it's unclear when Google will even begin its nine-month IP doctoring.

But the company wants you to know it takes privacy very seriously. "We aim to strike the appropriate balance between protecting our users' privacy and offering them benefits of data retention, such as better security measures and new innovations," it said.

It did not mention advertising.

Yes, Yahoo! is balancing as well. But the wounded web portal has gone significantly further than Google to protect its users from hacks, subpoenas, and, yes, national security letters. The rub is that Yahoo! handles about 20 per cent of US search traffic - and Google commands 70. ®

Top three mobile application threats

More from The Register

next story
Ubuntu 14.04 LTS: Great changes, but sssh don't mention the...
Why HELLO Amazon! You weren't here last time
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.