Delete/Never-Use Google Allo: Says Snowden

Edward Snowden has warned people not to use Google’s new chat app, because it lets the company read everything that they say.

Google has finally released its new chat app after showing it off over the summer. It comes with a robot that watches everything people say and then stores it for later analysis, using that data to improve the app itself.

But that also means that chats are stored on Google’s servers indefinitely, and are able to be read by it. The company had initially indicated that the messages would only be stored temporarily, limiting the possible impact of any data breach and retaining some privacy for users.

But it now appears that Google won’t be doing that after all. Instead it will keep hold of all conversations. Google will use that data to improve parts of the app, such as its smart replies feature. That will allow the app to read through conversations and try and work out how people talk – it can then use that data to suggest what they might want to say to their friends.

But Google would presumably also be able to use that same data at a future date to target ads at users. Since their personal conversations might include some of their most sensitive data, that could lead to prying of a kind that most people would object to.

Making the change does probably keep Google on the right side of the law. By keeping track of all messages, Allo conversations will be accessible by law enforcement with warrants – something that can’t happen on apps like iMessage or WhatsApp, both of which have run into trouble over not being able to give up information to authorities.

All of those problems led Mr Snowden to send out a flurry of tweets telling people not to use Allo. “Free for download today: Google Mail, Google Maps, and Google Surveillance,” he wrote. “That's #Allo. Don't use Allo.” Another read: “What is #Allo? A Google app that records every message you ever send and makes it available to police upon request.”

Snowden already called Allo "dangerous" after it was revealed at Google's I/O conference earlier this year. Google does allow people to switch into a different mode, called Incognito, where conversations will be end-to-end encrypted so that they can’t be read by Google. But that isn’t turned on by default and leads most of the app’s features to break, turning it into just a conventional chat app.

"We've given users transparency and control over their data in Google Allo," said a Google spokesperson. "And our approach is simple, your chat history is saved for you until you choose to delete it. You can delete single messages or entire conversations in Allo.

"We also provide the option to chat in Incognito mode, where messages are end-to-end encrypted and you can set a timer to automatically delete messages for your device and the person you’re chatting with's device at a set time."

Independent


 

« Company Lost $44m Through One Email Fraud
Finding The Right Security Professional »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Renaissance

Renaissance

Renaissance is Ireland's premier value added distributor of IT security solutions and a leading independent provider of business continuity consultancy.

Identity Theft Resource Center (ITRC)

Identity Theft Resource Center (ITRC)

ITRC is a non-profit organization established to empower and guide consumers, victims, business and government to minimize risk and mitigate the impact of identity compromise and crime.

Hack Miami

Hack Miami

HackMiami is the premier resource in South Florida for highly skilled hackers that specialize in vulnerability analysis, penetration testing, digital forensics, and all manner of IT security.

Cortado Mobile Solutions

Cortado Mobile Solutions

Cortado Mobile Solutions is the manufacturer of the mobile device management solution Cortado MDM.

RCMP Cybercrime Strategy

RCMP Cybercrime Strategy

The RCMP Cybercrime Strategy sets out in an Operational Framework and Action Plan to combat cybercrime.

CERT.LV

CERT.LV

CERT.LV is the national Computer Emergency Response Team for Latvia.

Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER)

Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER)

The Office of Cybersecurity, Energy Security, and Emergency Response (CESER) addresses the emerging threats of tomorrow while protecting the reliable flow of energy to Americans today.

Secude

Secude

SECUDE is an established global security solutions provider offering innovative data protection for SAP users.

ACM-CCAS

ACM-CCAS

ACM is a UKAS-accredited certification body helping businesses around the world perform to a higher standard. Our certifications include ISO 27001 and ISO 22301.

eXate

eXate

eXate provides pioneering technology that empowers organisations to protect, control and manage their sensitive data centrally, providing a complete data privacy solution.

Pacific Cyber Security Operational Network (PaCSON)

Pacific Cyber Security Operational Network (PaCSON)

PaCSON is an operational cyber security network of regional working-level cyber security experts in the Pacific.

Safe Systems

Safe Systems

Safe Systems provide compliance centric IT services for community banks and credit unions, ensuring that they are kept up to date on current technologies, security risks, and regulatory changes.

ProCheckUp

ProCheckUp

ProCheckUp is a London-based independent provider of cyber security services, including IT Security, Assurance, Compliance and Incident Response.

Willyama Services

Willyama Services

Willyama Services is a certified Information Technology and Cybersecurity professional services business providing services to government and private sector clients.

Antivirus Tales

Antivirus Tales

Antivirus Tales offers a platform to resolve all types of antivirus-related issues. The platform also provide various blog articles and informative guides to fix antivirus software errors.

Cypheria

Cypheria

Cypheria harness the expertise of elite military units and combine it with extensive digital combat experience to deliver unparalleled security solutions for organizations.