Is Gmail Allowing Third-Party Developers to Peep Into Your Emails?

Must Read

Free Netflix in India: A Result of Slow Growth In Q3 2020?

Netflix is testing a new strategy that could lead to free Netflix in India. The online streaming...

Jio Pages: The Indian Browser Reliance Is Betting On Now!

Looks like Reliance wants to establish Jio as a synonym of technology. After launching a fleet of...

Flipkart, Amazon Hurtle To Secure Their Slice in Aditya Birla Fashion

The battle conch for the festive season has already been blown. Now in a bid to take...

While the godawful data breach scandal by Social-media giant Facebook still brews fresh, resulting in a loss of million dollars, other tech-firms are also in balls-and-chain when it comes to user privacy.

Right of the press report by Wall Street Journal claims that Google has allowed third-party app developers to delve into emails of Gmail usersThe Wall Street Journal, which was the first to point this “tech’s dirty secret” has been hiding in the invisibility cloak for a long time now. Undermining the whole fiasco leads to the upshot of Gmail’s access settings which allows specific software developers to sift through user’s emails and retrieve recipient addresses, timestamps and if it’s less than a nightmare, even entire message.

The third-party developers then share the user details with marketers, and strip in funds, in return. Considering Gmail’s huge user base that spans across 1.4 billion users, this is a vast pool of private data, out in the open for sale.

Advertisements

In the reports, Wall Street Journal has kept eagle-eyes on two third-party apps.

One is Return Path, an app which is responsible for collecting data for marketers from under’s mailbox. For its own beneficial purpose, this company has sifted through over 8,000 emails in a span of two years.

An able partner-in-crime of Return Path is an email management app, Edison Software. It is allegedly allowing its employees to access user emails to facilitate app’s Smart Reply feature.

A Run-down Along Gmail Route

The hugely successful Google email client, Gmail, has been garnering additional functionalities from innumerable third-party developers.

First, one must build an app that connects to Gmail using the Application Programming Interface (API) supplied by Google and the successive events are a cake-walk. These apps provide additional functionality to the Gmail, for instance, to quickly unsubscribe from any marketing emails sent to your address.

Advertisements

Herein, Gmail, carefully and tactfully, nudges users into granting third-party access. When Gmail users sign-up for any services, Google requires them to grant permission. However, once users grant permission, this app can browse through their mailbox and can read the contents of sent and received messages.

As of now, Google has not disclosed the number of apps currently having access to Gmail.

However, as a good deal of waving past the allegations, developers claim that this practice is not illegal and user agreements envelop the same under its guidelines. Sifting through users’ emails stands useful for companies to keep track of user’s shopping habits or other “relevant” trends, deemed necessary.

Crossing the Privacy Boundaries

Given the above argument, one might draw a conclusion that email providers, facilitating third-party developer’s access to scrawl through user’s private emails are common, and hence banal practice to be worried about. However, the catch here is that although Google continues accessing user mails, it goes out of boundary by allowing other companies to do that.

While there’s no evidence that Gmail add-on developers have misused any data, as of now, one can surely grasp how discourteous it is to breach user privacy and dig into private emails. Again, there have been incidents surfacing up now and then, which clearly depicts the vulnerable states of certain tech-giants when it comes to data privacy and security issues. With the fiasco wherein Google users fell victim to a phishing attack, this outlines how crucial it is to realize the depth of issues. Certain doppelganger that disguised itself as a permissions request from Google Docs tried to gain access to user contacts, replicating Google’s authorization system. This attack highlights the weakness of Google’s permissions system.

As part of the new updates, Google introduced a new search functionality that allows them to customize additional settings as well as tiny tutorials, like for changing the password.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest News

Huawei All Set To Bid Adieu To Smartphone Market?

The effects of the US ban on Huawei, along with a few other Chinese companies, have started...

Tata Group To Acquire 50% Stake In BigBasket: A Winning Edge Against JioMart?

The Tata Group has apparently found its winning edge against Ambani's JioMart and might add this newfound opportunity to their shopping list...

Amazon Locks Head With The Music Industry: Twitch Letting Streamers Use Unlicensed Music!

The global e-commerce giant Amazon.com, Inc. (NASDAQ:AMZN) has upset the biggies of the music industry as one of its acquisitions have been...

Mobile Internet Speed In India: From Bad To Worse [REPORT]

Languishing. And la…g…g…i…n…g. The sorry state of the desi internet in India. In a rather sad turn of events,...

Google Boots Out 3 Immensely Popular Android Apps from Play Store: Questions About Content Policing Resurface

With such a flourishing wilderness of Android apps on the Google Play Store, there is every likelihood of encountering something seemingly innocuous...

Reliance Future Group Deal In The Soup: SIAC Orders To Put The Deal On Hold

When Reliance agreed to acquire Future Group for $3.4 billion, recently, the share of Reliance Industries Limited rallied on the stock market....

In-Depth: Dprime

Will ‘TikTok By Microsoft’ Be A Winner?

For the last two years, TikTok has been in the public eye for all sorts of reasons. First, it was the exploded...

Facebook Subscription Model: Looking Beyond Ad Dollars?

Seldom do job listings create a stir this gripping. However, when the job listing in question is a stealth post from Twitter,...

Will The Online Food Delivery Market in India End Up Becoming A Two-Horse Race?

It's pretty much evident that the food delivery space in India is all set to get riled up soon enough as one...

More Articles Like This