Google and Apple make mobile privacy an oxymoron

The very nature of cloud-based software is that we're sharing our content with a remote server

Google and Apple talk up security, but recent disclosures serve as a painful reminder of how much control mobile phone users give up when they power on their handsets.

The very nature of cloud-based software is that we're sharing our content with a remote server. Google, Apple, and other companies just reminded us of how much we trust our content security, but the writing has been on the wall for a while.

Stormy clouds

Consumers got a big wake-up call last spring when cloud-backup Dropbox claimed its content was more secure than it really was. The Federal Trade Commission caught Dropbox saying user content was inaccessible without the password when, in reality, Dropbox itself could access the content.

Dropbox, however, is a backup service, meaning that you have a primary memory space other than Dropbox. Your Dropbox content is likely on a home computer, laptop, or another device.

The security issue becomes more crucial with mobile.

How many users keep their address book on a server provided by Apple, Google, Microsoft, or RIM, the maker of the ubiquitous Blackberry? Phones may be packing more memory than ever, but the fragileness of mobile devices makes us more apt to access our precious data remotely as opposed to a memory card or the device itself.

Apple iCloud, Google Sync, and Microsoft Private Cloud are all capitalizing on our fear of losing mobile data.

Compared to home computers, phones also have more companies involved in the data processing chain, limiting users' ability to know who's accessing their information and, more importantly, what they're doing with it.

Take the example of Carrier IQ, the performance monitoring software installed on millions of phones. Last year, security expert Trevor Eckhart discovered the software was tracking everything you did with your phone, from web browsing to keystrokes. Worse, when the four major carriers were confronted, each had a different explanation for why the software was there and what they were doing with the sensitive information. As PC World's Jared Newman put it, we deserve a straight answer on Carrier IQ. Months later, it's still unclear how much damage was done by the software.

Too much control

Recent developments offer more evidence of mobile security issues.

According to The Wall Street Journal, Google successfully bypassed Apple's Safari's mobile security and tracked millions of iPhone, iPod, and iPad users (and, to a lesser extent, PC and Mac users). Google kept a web cookie hidden in an online ad, like the Google +1 button, and it would drop when the user pressed the icon. As PC World reported, the quiet cookie would live well beyond the 12 to 24 hours a regular cookie would survive and allow Google to get valuable user habit information.

And earlier this week, Apple was asked by the U.S. government if its approved apps fell short of protecting user data. The social networking app Path was caught uploading whole address books without permission, but users realized that Facebook, Twitter, and other popular apps have been doing the same thing all along.

After the nudge by lawmakers in Washington, Apple immediately enforced its policy, requiring all iOS apps to update their permissions, but why wasn't it enforcing it in the first place? It's probably the same reason why Google has been secretly tracking us: In these days of voluntary information sharing, it believes it can get away with it.

On Thursday, Google said it was working on a Chrome password generator so you won't have to worry about remembering and typing in passwords on any device. Google would ultimately become the gatekeeper between you and your favorite sites, not to mention knowing your passwords.

It is an ironic end to a privacy-deflating week.

Join the PC World newsletter!

Error: Please check your email address.

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Damon Brown

PC World (US online)
Show Comments

Cool Tech

Crucial Ballistix Elite 32GB Kit (4 x 8GB) DDR4-3000 UDIMM

Learn more >

Gadgets & Things

Lexar® Professional 1000x microSDHC™/microSDXC™ UHS-II cards

Learn more >

Family Friendly

Lexar® JumpDrive® S57 USB 3.0 flash drive 

Learn more >

Stocking Stuffer

Plox Star Wars Death Star Levitating Bluetooth Speaker

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Latest News Articles


GGG Evaluation Team

Kathy Cassidy


First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni


For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell


The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi


The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott


My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?