{"id":24053,"date":"2014-06-18T19:41:17","date_gmt":"2014-06-18T23:41:17","guid":{"rendered":"http:\/\/www.opensource.im\/?p=24053"},"modified":"2014-06-18T19:41:17","modified_gmt":"2014-06-18T23:41:17","slug":"will-full-encryption-sideline-googles-targeted-ads","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/will-full-encryption-sideline-googles-targeted-ads.php","title":{"rendered":"Will full encryption sideline Google&#8217;s targeted ads?"},"content":{"rendered":"<p><p>    News  <\/p>\n<p>    By Zach Miners  <\/p>\n<p>    June 18, 2014 08:39 AM ET  <\/p>\n<p>    IDG News Service - Mining personal    data to deliver targeted ads is the lifeblood of Google's    business -- and of many other online firms. But what if that    data dries up at the source?  <\/p>\n<p>    Google released an early version of a     new tool recently that will provide full \"end-to-end\"    encryption for email. It's a super-strong cloaking technology    that scrambles messages before they leave their browser and    keeps them that way until they're decoded by the recipient.  <\/p>\n<p>    The technology makes use of a private key-string that only the    user has access to, meaning even the email provider can't read    the contents of messages. Google says anyone will be able to    use the tool with their existing web-based email service.  <\/p>\n<p>    It was hailed as a big step forward in privacy, but the    increased use of strong encryption also threatens the ability    of online firms to sell targeted ads, altering the calculus    that makes it worthwhile for them to offer online services for    free. Google, after all,     scans emails to deliver keyword-based advertising, and for    other purposes like blocking spam and malware. Yahoo also    scans email, though Microsoft says it does not.  <\/p>\n<p>    \"This tool is in direct conflict with their business model,\"    said Tyler Cohen Wood, an online security expert and cyber    branch chief for the Defense Intelligence Agency within the    U.S. Department of Defense. For Google to offer it, she said,    is strange.  <\/p>\n<p>    Google said the tool is intended for a subset of users who want    additional security beyond what the company already provides.    \"We recognize that this sort of encryption will probably only    be used for very sensitive messages or by those who need added    protection,\" Google said in its    announcement.  <\/p>\n<p>    But its goal is to eventually make a more polished version    available for download in its Chrome Web Store. And as users    become more insistent about privacy, other online firms may    offer similar capabilities.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Go here to see the original:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.computerworld.com\/s\/article\/9249186\/Will_full_encryption_sideline_Google_39_s_targeted_ads_\/RK=0\/RS=TH6GwZAVb80_XlfR_jQCb4rO93o-\" title=\"Will full encryption sideline Google's targeted ads?\">Will full encryption sideline Google's targeted ads?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> News By Zach Miners June 18, 2014 08:39 AM ET IDG News Service - Mining personal data to deliver targeted ads is the lifeblood of Google's business -- and of many other online firms. But what if that data dries up at the source<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-24053","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24053"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=24053"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24053\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=24053"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=24053"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=24053"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}