Feeds

Creepy photo-tagging tech slotted into Google+

'Find my face' feature lands

Top three mobile application threats

Eric Schmidt may have been creeped out by the idea of using huge facial databases to identify individuals online, but that hasn't stopped Google from debuting its own version of the technology.

Google+, Mountain View's own take on social networking, is now loaded with a photo-tagging and "find my face" feature that punters must opt-in to use.

By default, the Chocolate Factory has switched off the "find my face in photos and prompt people I know to tag me" option, however, as soon as a user clicks on a photograph Google+ politely asks that individual to consider enabling the feature.

It also points out the user has total control over the "find my face" option.

In July, Google bought facial recognition outfit pittpatt, at which point it was clear that the company would eventually add a photo-tagging feature to Google+.

However, it's a move that appears to fly in the, er, face of Google chairman Schmidt, who in May this year indicated that the world's largest ad broker had no intention whatsoever of using such creepy tech in the firm's products.

But then, we suppose, seven months is a long time in the online world. Google has been closely watching the fallout from Facebook's botched attempt at stealthily folding facial recognition tech into its users' accounts. And it now better understands the softly softly catchy monkey approach is better than an iron fist when it comes to debuting features in Google+.

The company spectacularly failed to win over privacy advocates when it rolled out the nearly defunct Buzz, which was bolted onto Gmail accounts without first asking for permission from that particular userbase.

This year has proved extremely embarrassing for both Facebook and Google when it comes to butter-fingered handling of data online. The pair, now humiliatingly subjected to bi-annual privacy audits for the next 20 years in the US, are attempting to regain trust from their respective users.

It's unlikely that this means Facebook or Google will do less evil with the data they farm come 2012. But it does mean the companies are much more under the spotlight when it comes to herding identities on the interwebulator.

Now it's a question of being a little more creative with how to best use the tech stored in their gun rooms. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Ubuntu 14.04 LTS: Great changes, but sssh don't mention the...
Why HELLO Amazon! You weren't here last time
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
OpenBSD founder wants to bin buggy OpenSSL library, launches fork
One Heartbleed vuln was too many for Theo de Raadt
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.