{"id":562,"date":"2008-04-01T09:00:25","date_gmt":"2008-04-01T08:00:25","guid":{"rendered":"http:\/\/www.itwriting.com\/blog\/?p=562"},"modified":"2008-04-01T09:00:25","modified_gmt":"2008-04-01T08:00:25","slug":"is-google-gears-safe","status":"publish","type":"post","link":"https:\/\/www.itwriting.com\/blog\/562-is-google-gears-safe.html","title":{"rendered":"Is Google Gears safe?"},"content":{"rendered":"<p>I imagine that is the question most users will ask when they see this dialog:<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/www.itwriting.com\/images\/gearsdlg.gif\"> <\/p>\n<p>There are a couple of things I don&#8217;t like about this dialog. First, the website is defined only by an URL. The problem is, it&#8217;s a plain http connection so there&#8217;s no SSL certificate involved, so I can&#8217;t easily check the identity of the site. This one is Google, so it&#8217;s not too difficult; but what if it is some other site? It is not particularly easy to verify the ownership of an URL; whois information is not reliable.<\/p>\n<p>Second, what are the implications of my decision? If you click <strong>What is this<\/strong>, you get <a href=\"http:\/\/gears.google.com\/?help\">this page<\/a>, which explains offline functionality but doesn&#8217;t mention security. It does mention that Gears is a beta &#8211; personally I think this should be up-front in the security warning dialog as well. Do you trust this beta software?<\/p>\n<p>If you go to the <a href=\"http:\/\/code.google.com\/support\/bin\/topic.py?topic=11628\">Frequently Asked Questions<\/a>, there is still no mention of security. Is nobody asking about it? <a href=\"http:\/\/code.google.com\/support\/bin\/answer.py?answer=69212&amp;topic=11691\">This article<\/a> is the closest I can see, but merely repeats the information in the original dialog, that Gears allows websites to write to my computer. Enquiring minds ask: where can they write data? Where can they read data? Could they install malware or execute code?<\/p>\n<p>We could do with a link to <a href=\"http:\/\/code.google.com\/apis\/gears\/security.html\">this page<\/a>, about the Gears security model. This tells me that Gears uses a same origin policy:<\/p>\n<blockquote>\n<p>A web page with a particular <i>scheme, host, and port<\/i> can only access resources with the same <i>scheme, host, and port<\/i>.<\/p>\n<\/blockquote>\n<p>It also says:<\/p>\n<blockquote>\n<p>Google Gears data files are protected with the user&#8217;s operating system login credentials. Users with separate login names cannot access each other&#8217;s Google Gears data files, as enforced by the operating system.<\/p>\n<\/blockquote>\n<p>The bit about &#8220;as enforced by the operating system&#8221; should be highlighted. If your users have local admin rights, as on some Windows boxes, they will be able to access files belonging to other users.<\/p>\n<p>But is Gears safe? What if I&#8217;m taken in by a scam site and give it permission to use Gears?<\/p>\n<p>It may not be too bad. Gears can&#8217;t write anywhere on my hard drive, only to a location in my local profile or home directory. It doesn&#8217;t use the browser cache, presumably because it isn&#8217;t reliable; it may get cleared. Still, I guess some sort of attack might be possible along the lines of: write an executable to my local resource store, then give me a link to click and run it. Gears could fill your home directory with stuff you do not want, of course, but that&#8217;s the explicit permission you give when you agree to let a site write to your computer.<\/p>\n<p>This presumes that Gears does not have security bugs. There may be and probably are ways to mount attacks using Gears that I have not thought of.<\/p>\n<p>Bottom line: Gears is probably fairly safe, provided that the site really is trustworthy, but it is a beta and the usual caveats apply. Check that URL carefully. Avoid Gears when used by smaller organizations that might not have sites well defended against malware. I still don&#8217;t like the dialog though; and I&#8217;m surprised that Google does not make it easier for users to examine the security issues.<\/p>\n<p>This post is prompted by yesterday&#8217;s announcement of <a href=\"http:\/\/googleblog.blogspot.com\/2008\/03\/offline-access-to-google-docs.html\">Offline access to Google Docs<\/a>.<\/p>\n<div class=\"wlWriterSmartContent\" id=\"scid:0767317B-992E-4b12-91E0-4F059A8CECA8:a2857c87-3077-4c81-a82b-d08c7943dc41\" style=\"padding-right: 0px; display: inline; padding-left: 0px; padding-bottom: 0px; margin: 0px; padding-top: 0px\">Technorati tags: <a href=\"http:\/\/technorati.com\/tags\/google\" rel=\"tag\">google<\/a>, <a href=\"http:\/\/technorati.com\/tags\/google%20docs\" rel=\"tag\">google docs<\/a>, <a href=\"http:\/\/technorati.com\/tags\/offline\" rel=\"tag\">offline<\/a>, <a href=\"http:\/\/technorati.com\/tags\/google%20gears\" rel=\"tag\">google gears<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>I imagine that is the question most users will ask when they see this dialog: There are a couple of things I don&#8217;t like about this dialog. First, the website is defined only by an URL. The problem is, it&#8217;s a plain http connection so there&#8217;s no SSL certificate involved, so I can&#8217;t easily check &hellip; <a href=\"https:\/\/www.itwriting.com\/blog\/562-is-google-gears-safe.html\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Is Google Gears safe?<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36,75,96],"tags":[],"class_list":["post-562","post","type-post","status-publish","format-standard","hentry","category-google","category-security","category-web-authoring"],"_links":{"self":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/posts\/562","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/comments?post=562"}],"version-history":[{"count":0,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/posts\/562\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/media?parent=562"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/categories?post=562"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/tags?post=562"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}