Feeds

Google+ is an identity service, Schmidt says

Weed out evil

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

Hoping, perhaps, to bring the curtain down on the so-called ‘nym wars’, Google chairman Eric Schmidt has discussed the advertising giant’s identity policies in a Q&A at the MediaGuardian Edinburgh International TV Festival.

Google+, which the outside world thinks of as another social networking service, is in fact something else, Schmidt said: “It essentially provides an identity service with a link around your friends,” he said in a transcript provided here.

Asked about the so-called ‘nym wars’, Schmidt explains Google’s policy (while sidestepping the implementation that prohibits some real names): “But we want people to stand for something, we want people to be willing to express themselves. There are obviously people for which using their real name is not appropriate, and it’s completely optional, and if you’re one of those people don’t do it. Seems obvious.”

Saying that he’s been thinking about identity for 20 years, Schmidt calls it a “hard problem”: “The Internet would be better if we had an accurate notion that you were a real person”, he says.

A real person, Schmidt says, can be held accountable: “we could check them, we could give them things …bill them, you know, we could have credit cards and so forth … there are all sorts of reasons.”

“My general rule,” Schmidt said, “is that people have a lot of free time and … there are people who do really evil and wrong things on the Internet, and it would be useful if we had strong identity so we could weed them out.”

This doesn’t mean “eliminating them”, he says: “if we knew their identity was accurate, we could rank them. Think of them like an identity rank.”

He admits this is a problem in countries with oppressive attitudes to their citizens or their citizens’ communications, but adds that “sensibilities are different”.

“There, there’s no assumption of privacy, everybody assumes the Internet is bugged and that the secret police are after them.” ®

Providing a secure and efficient Helpdesk

More from The Register

next story
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Lords take revenge on REVENGE PORN publishers
Jilted Johns and Jennies with busy fingers face two years inside
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Yes, yes, Steve Jobs. Look what I'VE done for you lately – Tim Cook
New iPhone biz baron points to Apple's (his) greatest successes
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.