You are here

Internet Security

Emily Litella Meets Google Wallet

To see how the call for the FCC to investigate the allegation that Verizon is blocking Google Wallet is a misinformed Emily Litella rant, please see my Forbes Tech Capitalist Blog post here.

SOPA Fixes Isolate Opponents, Especially Google

The House Manager’s Amendment to the pending House Stop Online Piracy Act (SOPA) fixed the major legitimate problems with the original bill, effectively isolating the small but extremely vociferous minority of SOPA opponents, especially Google.

See my Forbes Tech Capitalist post here for a political outlook of the SOPA/PIPA anti-piracy legislation, which is likely to become law in 2012.

In Defense of Rule of Law & "Cyber-Conservatism"

Many thanks to Adam Thierer of the Technology Liberation Front, for selecting my book, Search & Destroy, as a top twenty most Important Cyber-Law & Info-Tech Policy books of 2011 because “it represented the beginning of an articulation of a philosophy of “cyber-conservatism.”  I also thank Adam for his critical and insightful review of Search & Destroy, which clearly delineates his principled cyber-libertarian differences with my principled “cyber-conservative” views.

Android’s Pickpocket behind Google Wallet

The kerfuffle painting the Google Wallet App as an innocent victim of Verizon blocking -- in violation of an "open" Internet and net neutrality regulations -- completely misses the forest for the trees. This conflict revolves around two ongoing industry battles.

To see what this kerfuffle is really all about read my Forbes Tech Capitalist blog post here: Android's Pickpocket behind Google Wallet.

 

The Top Ten Threats to Google

In compiling and ranking the top threats facing Google, I was amazed at the breadth, depth, diversity and seriousness of the threats and liabilities facing Google.

Please see my Forbes Tech Capitalist post here to learn the ranking of what threats to Google are most serious and why.

Google Too Fast and Loose for LAPD

How could Google fail to meet the security needs of the City of Los Angeles in its trophy government cloud contract?

Learn why in my Forbes Tech Capitalist post here, entitled "Google Too Fast and Loose for LAPD."

Jobs' Apple Standard vs. Page's Google Standard

Given that Apple and Google are the #1 and #2 most valuable brands in the world and that Google has invaded all of Apple’s markets in the last few years as a new competitor, it is illuminating and instructive to compare and contrast the radically different visions, values, and standards, of Apple’s former leader Steve Jobs and Google’s current CEO Larry Page.

  • See my Forbes Tech Capitalist post: "Jobs' Apple Standard vs. Page's Google Standard" here.

Google 21st Century Robber Baron

See my Forbes post "Google 21st Century Robber Baron" which briefly tells the story of Google's Robber Baron rap sheet, in advance of Google's Wednesday Senate antitrust hearing.

  • The post is documented with 79 links to the supporting evidence.

The post also explains why Google's Board of Directors have been AWOL while all this scofflaw behavior has been going on.

Google's Rogue WiSpy Invasive Behavior Proliferates -- Security is Google's Achilles Heel -- Part XIII

Evidence continues to mount that Google's management and supervision of its Android operating system is out-of-control when it comes to protecting privacy and security.

 

  • Google's corporate ethos that it is better to "ask for forgiveness than permission" increasingly means Android has no privacy by design and hence less security for users by default.
  • Requiring and respecting the need for permission and authorization is a bedrock truism of IT security -- and the evidence below increasingly indicates that Google has a deep aversion to that IT security truism.

Consider the growing pattern of Google's default design and behavior that maximizes collection of private information, which inherently puts users at greater security risk.

 

First, and profoundly disturbing, is a new TechRepublic revelation in a post by security blogger Donovan Colbert.

 

In setting up his new Android-based tablet, Mr. Colbert discovered that the Android operating system by default, i.e. without permission, automatically collected and implemented encrytion key passcodes to automatically gain access to private networks without the permission of the user. In Mr. Colbert's own words:

Pages