new social attack vector
Jun. 8th, 2007 07:57 amLet us suppose that our target, Tom, is a habitual user of an RSS aggregator. Early on Tom used the service as a fast browser selector, making filtering decisions but ultimately viewing the content by clicking the links. Soon, however, he starts reading some sources right in the aggregator. Eventually Tom relies on the aggregator for leads, filtering and the majority of reading.
Now Mallory gains control of the aggregator in such a fashion that she can insert, edit and delete stories. Tom has a high degree of unwarranted trust in his news source. I don't see any standard verification mechanisms in place for Tom to assure authenticity...
Google is perfectly positioned to be Mallory.
Now Mallory gains control of the aggregator in such a fashion that she can insert, edit and delete stories. Tom has a high degree of unwarranted trust in his news source. I don't see any standard verification mechanisms in place for Tom to assure authenticity...
Google is perfectly positioned to be Mallory.
(no subject)
Date: 2007-06-11 05:20 pm (UTC)And the reality is that Google doesn't have a particularly secure lock on this space. I've fallen into Google Reader as my principal source for tech news, but its hold there is insecure: there are a bunch of other well-reviewed options. So if they did piss people off, they could lose much of their audience with great speed.
So I'm not *too* worried about this particular danger. Frankly, it's a fair ways down on my list of "Things about Google that worry me"...