Abstract
Protection of personal data is a requirement from both ethical and legal perspectives. In the Internet, search engines facilitate our lives by finding any searched information within a single-click time. On the other hand, they threaten our privacy by revealing our personal data to others. In this paper, we give concrete examples of Google personal data exploits against user privacy, discuss the countermeasures to protect our privacy and introduce a penetration testing tool called TrackingDog checking and reporting privacy exploits over Google.
Chapter PDF
Similar content being viewed by others
References
A P3P Preference Exchange Language (Appel). http://www.w3.org/TR/P3P-preferences/.
EU Directives 2002/58/EC. http://www.dataprotection.ie/documents/legal/directive2002_58.pdf.
EU Directives 95/46/EC. http://www.cdt.org/privacy/eudirective/EU-Directive_.html.
Five Ways to Delete Your Google Cookie. http://googlewatch.eweek.com/content/five_ways_to_delete_your_google_cookie.html.
The gnu privacy guard. http://www.gnupg.org.
Google Hacking Database. http://johnny.ihackstuff.com/index.php? module=prodreviews.
Goolink-Security Scanner. www.ghacks.net/2005/11/23/goolink-scanner-beta-preview/.
Kerberos: The network authentication protocol. http://web.mit.edu/Kerberos/.
Robots exclusion standard. http://en.wikipedia.org/wiki/Robots.txt.
SiteDigger v2.0 — Information Gathering Tool. http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&subcontent/resources/proddesc/sitedigger.htm
Taking steps to further improve our privacy practices. http://googleblog.blogspot.com/2007/03/taking-steps-to-further-improve-our.html.
The Platform for Privacy Preferences. http://www.w3.org/2006/07/privacy-ws/.
Bundesdatenschutzgesetz (BDSG), Germany. https://www.datenschutzzentrum.de/material/recht/bdsg.htm, 1978.
Data Protection Act,UK. http://www.opsi.gov.uk/acts/acts1998/19980029.htm, 1998.
Bundesgesetz ber den Schutz personenbezogener Daten(Datenschutzgesetz 2000 — DSG 2000), Austria. http://www.dsk.gv.at/dsg2000d.htm, 2000.
Google Hack Honeypot Project. http://ghh.sourceforge.net, 2007.
Martin Kessler. Bachelorarbeit: Implementation of a penetration testing tool for searching cryptographic secrets and personal secrets with Google. Bauhaus Universitaet Weimar, Medien Fakultaet, October 2007.
Johnny Long. Gooscan Google Security Scanner. http://johnny.ihackstuff.com/modules.php?op=modload&name=Downloads &file=index&req=getit&lid=33.
Emin Islam Tatli. Google reveals Cryptographic Secrets. Technical Report of 1. Crypto Weekend, Kloster Bronbach, Germany, July 2006.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 IFIP International Federation for Information Processing
About this paper
Cite this paper
Tatli, E.I. (2008). Privacy in Danger: Let’s Google Your Privacy. In: Fischer-Hübner, S., Duquenoy, P., Zuccato, A., Martucci, L. (eds) The Future of Identity in the Information Society. Privacy and Identity 2007. IFIP — The International Federation for Information Processing, vol 262. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-79026-8_4
Download citation
DOI: https://doi.org/10.1007/978-0-387-79026-8_4
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-4629-4
Online ISBN: 978-0-387-79026-8
eBook Packages: Computer ScienceComputer Science (R0)