Feeds

Google muzzles political dissidents with YouTube ID tweaks

It's about silo wars not real ones here at Google+

SANS - Survey on application security programs

As recently as February this year, Google allowed its users to sign up to its revenue-challenged video sharing website YouTube using a pseudonym.

In fact, Mountain View was so proud of that option that its director of privacy, product and engineering, Alma Whitten, penned a blog post in which she pointed out the importance of allowing individuals to provide content anonymously online.

"Using a pseudonym has been one of the great benefits of the internet, because it has enabled people to express themselves freely – they may be in physical danger, looking for help, or have a condition they don't want people to know about," she wrote in February on Google's public policy blog.

"People in these circumstances may need a consistent identity, but one that is not linked to their offline self. You can use pseudonyms to upload videos in YouTube or post to Blogger."

It's likely that Whitten was seeking to surf the Arab Spring wave. Indeed Google has made a big deal about the use of YouTube by activists across the Middle East as protests erupted across the region.

But, even before the arrival of Google+ – which is supposedly storming the interwebs according to, er, buzz from Ancestry.com founder Paul Allen – the company's policy about identity verification has ominously changed.

It's no longer possible for individuals to simply log on to YouTube with an anonymous username. The world's largest ad broker has clearly spotted a flaw in the site's business model and is now forcing users to sign in to the video-sharing site using an existing Google account such as that used for, say, Gmail.

This, of course, means Google is increasingly herding users of its products into one gated field.

However, up until very recently, it was possible for a Gmail account to be created that didn't require a real name to authenticate the individual was who they claimed to be.

That's a process that has long been in pace at Facebook. Indeed, Mark Zuckerberg's company even goes so far as to ask its users, whose accounts have been temporarily disabled for violating certain terms, to provide official photo ID to help get their stalking privileges reinstated.

And now, Google, with its latest attempt at social networking, is following suit.

As we pointed out last week, Google is telling people who have created private profiles in, say, the company's free email service Gmail, that their profile will be deleted after 31 July unless they switch it to public view first.

Furthermore, Google has an optional request for individuals to provide photo ID to reactivate disabled accounts. It also demands that real names are created from here on in.

What does this mean for the likes of political dissidents wanting to "freely express themselves" without fear of "physical danger" for exposing their real identity?

According to a post on the New World Notes blog that details one such case where a Google profile was suspended for using a pseudonym, the company's stance is as follows:

"Google Profiles are designed to be public pages on the web, which are used to help connect and find real people in the real world," said Google spokeswoman Katie Watson.

"By providing your common name, you will be assisting all people you know – friends, family members, classmates, co-workers, and other acquaintances – in finding and creating a connection with the the right person online."

But she declined to comment further on how Google differentiates between "common name" and "real name".

The Register put a number of queries to Google about the ID verification shift within its entire online estate now that Google+ has arrived, including requesting a statement about the changes to YouTube.

The company pointed us at this link that details its Google Profiles policy. Beyond that we were told: "At this stage, there is no further information to share." ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.