{"id":20,"date":"2011-11-26T17:23:12","date_gmt":"2011-11-26T17:23:12","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/cyberspaceincourt\/?p=20"},"modified":"2011-11-28T21:21:21","modified_gmt":"2011-11-28T21:21:21","slug":"googles-advice-on-security","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/cyberspaceincourt\/2011\/11\/26\/googles-advice-on-security\/","title":{"rendered":"Google&#8217;s advice on security"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-23 alignnone\" src=\"http:\/\/blogs.law.harvard.edu\/cyberspaceincourt\/files\/2011\/11\/google-300x228.png\" alt=\"\" width=\"300\" height=\"228\" srcset=\"https:\/\/archive.blogs.harvard.edu\/cyberspaceincourt\/files\/2011\/11\/google-300x228.png 300w, https:\/\/archive.blogs.harvard.edu\/cyberspaceincourt\/files\/2011\/11\/google.png 655w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Yesterday I was on Google and I noticed that they had added a link to the bottom of the homepage. It directed to <a href=\"http:\/\/www.google.com\/goodtoknow\/\">http:\/\/www.google.com\/goodtoknow\/<\/a> where Google shared some tips on safety and privacy, both in terms of the general realm of the internet and on how Google handles privacy\/data collection.<\/p>\n<p>From the perspective a young, internet-savvy generation, most of the tips that Google suggests seem to be common sense (run Windows Update\/Apple Software Update, don\u2019t click on weird links that you get in your email, signing out of accounts when you use public computers). However, I did like the article on choosing a secure password. I\u2019ll be the first to admit that I use essentially the same password for all of my activity online \u2013 instead of remembering different passwords to different accounts, I can just remember one \u201cmaster\u201d password and use that extra brainpower to cram for my psychology and math midterms.<\/p>\n<p>Unfortunately, it\u2019s that great of an idea \u2013 it means that if one account is compromised, maybe from a site with not that strong of security, <em>all<\/em> of your accounts could potentially be at risk. I learned this the hard way back in middle school; I let a stranger online use one of my smaller accounts for a MMOFPS and he ended up stealing items from my primary account since I used the same password for all my accounts.<\/p>\n<p>I also liked the tip on using a password from a song, film, or play. For example, \u201cTo be or not to be, that is the question\u201d can be simplified into password form as \u201c2bon2btitq\u201d is a seemingly random, near un-guessable password at a first glance, but easy to remember.<\/p>\n<p>That being said, choosing a secure password is, while important, a small worry compared to some breaches of privacy perpetrated by large online companies (even Google, whose motto is \u201cdon\u2019t be evil\u201d). I\u2019ll discuss this in further detail the next time I post!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Yesterday I was on Google and I noticed that they had added a link to the bottom of the homepage. It directed to http:\/\/www.google.com\/goodtoknow\/ where Google shared some tips on safety and privacy, both in terms of the general realm of the internet and on how Google handles privacy\/data collection. From the perspective a young, [&hellip;]<\/p>\n","protected":false},"author":4479,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[38073],"tags":[],"class_list":["post-20","post","type-post","status-publish","format-standard","hentry","category-d"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/cyberspaceincourt\/wp-json\/wp\/v2\/posts\/20","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/cyberspaceincourt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/cyberspaceincourt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cyberspaceincourt\/wp-json\/wp\/v2\/users\/4479"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cyberspaceincourt\/wp-json\/wp\/v2\/comments?post=20"}],"version-history":[{"count":5,"href":"https:\/\/archive.blogs.harvard.edu\/cyberspaceincourt\/wp-json\/wp\/v2\/posts\/20\/revisions"}],"predecessor-version":[{"id":47,"href":"https:\/\/archive.blogs.harvard.edu\/cyberspaceincourt\/wp-json\/wp\/v2\/posts\/20\/revisions\/47"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/cyberspaceincourt\/wp-json\/wp\/v2\/media?parent=20"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cyberspaceincourt\/wp-json\/wp\/v2\/categories?post=20"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/cyberspaceincourt\/wp-json\/wp\/v2\/tags?post=20"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}