Forum Moderators: open
It said a bug in its software meant information that people believed was private had been accessible by third parties.
Google said up to 500,000 users had been affected.
Google is about to have its Cambridge Analytica moment. A security bug allowed third-party developers to access Google+ user profile data since 2015 until Google discovered and patched it in March, but decided not to inform the world. When a user gave permission to an app to access their public profile data, the bug also let those developers pull their and their friends’ non-public profile fields. Indeed, 496,951 users’ full names, email addresses, birth dates, gender, profile photos, places lived, occupation and relationship status were potentially exposed, though Google says it has no evidence the data was misused by the 438 apps that could have had access.
[edited by: Brett_Tabke at 8:10 pm (utc) on Oct 8, 2018]
[edit reason] added quotes [/edit]
In a statement, the firm said the issue was not serious enough to inform the public.
Google said up to 500,000 users had been affected.
We made Google+ with privacy in mind and therefore keep this API’s log data for only two weeks. That means we cannot confirm which users were impacted by this bug. However, we ran a detailed analysis over the two weeks prior to patching the bug, and from that analysis, the Profiles of up to 500,000 Google+ accounts were potentially affected.
Are they shutting it down entirely, or just removing some features?
At the same time, we have many enterprise customers who are finding great value in using Google+ within their companies. Our review showed that Google+ is better suited as an enterprise product where co-workers can engage in internal discussions on a secure corporate social network. Enterprise customers can set common access rules, and use central controls, for their entire organization. We’ve decided to focus on our enterprise efforts and will be launching new features purpose-built for businesses. We will share more information in the coming days.
Time to update all my footers that had links pointing back to my SM pages. Probably should just remove them all as I doubt that anyone ever clicks on them.After reading this at a couple places, I removed them all a few minutes ago.
We made Google+ with privacy in mind and therefore keep this API’s log data for only two weeks.
the two weeks prior to patching the bug,
A security bug allowed third-party developers to access Google+ user profile data since 2015 until Google discovered and patched it in March,
I know that bugs happen, even the brightness engineers with the higher skill can't avoid them. But what I find surprising is that, Google has a dedicated team, which is tracking security issues at "others" sites and software. They are not auditing their own code? Yes, they did since they found the bug, but 3 years to discover it, this is long.
[edited by: phranque at 2:09 am (utc) on Oct 9, 2018]
[edit reason] fixed url [/edit]