• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

Google Agrees To Pay $ 8.5 Million To Settle Buzz Class Action Lawsuit

September 6, 2010

Views: 5,293

And once again Google is in the news regarding privacy issues, this time it’s regarded their social networking service Buzz (which by all accounts is pretty much a flop). The way in which the service used Gmail users address books alarmed a lot of people and the default settings were rather risky and revealed a lot more than most people were comfortable with.

This led to a lot of people boycotting Buzz and in the end rolling out server civil cases against Google. They did attempt to rectify the issue by moving the checkbox to a more prominent position – but honestly the defaults shouldn’t have exposed such personal information to the public Internet in the first place.

Google has agreed to pay $8.5 million to settle a class action lawsuit claiming it violated the privacy of Gmail users when it released Google Buzz, a Gmail bolt-on that turned the email service into a Tweetbookish social networking tool.

The suit in question consolidates several civil cases filed against the company over Google Buzz, which was rolled out to all Gmail users in February – before it had been publicly tested. By default, Buzz automatically exposed users’ most frequent Gmail contacts to the public internet. You did have the option of hiding the list from the public view, but many complained that the checkbox that let you do so was less than prominently displayed.

Within days, Google agreed to move the checkbox to a more prominent position, and it rejiggered the way it handles user contacts. But this didn’t prevent a spate of lawsuits.

I wonder who is actually going to get this $8.5 million though, there are no details on that front. And who are the class representatives? Did any actual individuals band together under this class action suit to get a sweet payout from Google?

I guess more details may come out some time after the case.

In settling the consolidated case, Google will create an $8.5 million fund that will be used to distribute awards to organizations focused on internet privacy or privacy education. It will also be used to pay the lawyers and class representatives – i.e. the people who sued.

Clearly, Google is desperate to challenge the Facebooks of the world with a widely used social networking service of its own, which would expand its its efforts to collect data on users that can then be used to target ads. But like Orkut before it, Buzz hasn’t exactly achieved that goal – just judging from anecdotal evidence. Google has not said, however, how many people actually use the service.

It’s a win for Internet privacy and Google has been getting in a lot of trouble lately, especially with privacy issues regarding their illegal capturing of Wifi data during the Google Wifi Scanning debacle.

Google seem to be trying to go into to many areas and not successfully, they really can’t compete with Twitter and Facebook so why bother trying? They already have a huge user base for existing services, so why not improve those and capture more market share.

Source: The Register

Related Posts:

  • Systemic Ransomware Events in 2025 - How Jaguar Land…
  • Initial Access Brokers (IAB) in 2025 - From Dark Web…
  • Deepfake-as-a-Service 2025 - How Voice Cloning and…
  • Privacy Implications of Web 3.0 and Darknets
  • An Introduction To Web Application Security Systems
  • mcp-scan - Real-Time Guardrail Monitoring and…
Share
Tweet
Share
Buffer
WhatsApp
Email

Filed Under: Legal Issues, Privacy Tagged With: google, google-privacy, Privacy



Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Systemic Ransomware Events in 2025 - How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Views: 2,293

Jaguar Land Rover’s prolonged cyber outage in 2025 turned what would once have been a “single … ...More about Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

SmbCrawler - SMB Share Discovery and Secret-Hunting

SmbCrawler – SMB Share Discovery and Secret-Hunting

Views: 2,134

SmbCrawler is a credentialed SMB spider that takes domain credentials and a list of hosts, then … ...More about SmbCrawler – SMB Share Discovery and Secret-Hunting

Heisenberg Dependency Health Check - GitHub Action for Supply Chain Risk

Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Views: 1,406

Heisenberg Dependency Health Check is a GitHub Action that inspects only the new or modified … ...More about Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Dark Web Search Engines in 2025 - Enterprise Monitoring, APIs and IOC Hunting

Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

Views: 3,323

Dark web search engines have become essential for enterprise security teams that need early … ...More about Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

mcp-scan - Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Views: 1,241

mcp-scan is a security tool from Invariant Labs that can run as a static scanner or as a dynamic … ...More about mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Initial Access Brokers (IAB) in 2025 - From Dark Web Listings to Supply Chain Ransomware Events

Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Views: 1,119

Initial Access Brokers (IABs) have moved from niche forum actors to central wholesalers in the … ...More about Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (232)
  • Cryptography (85)
  • Dark Web (6)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (13)
  • Hacker Culture (10)
  • Hacking News (237)
  • Hacking Tools (709)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,434,174)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,174,103)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,564)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,361)
  • Password List Download Best Word List – Most Common Passwords (934,679)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,406)
  • Hack Tools/Exploits (674,320)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,445)

Search

Recent Posts

  • Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like November 26, 2025
  • SmbCrawler – SMB Share Discovery and Secret-Hunting November 24, 2025
  • Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk November 21, 2025
  • Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting November 19, 2025
  • mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers November 17, 2025
  • Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events November 12, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2026 Darknet All Rights Reserved · Privacy Policy