Exactly
I bet they do store *queries*. A Request does not automatically equate to storing something in a database. Do MSN/BING/Yahoo!/[INSERTSEARCHPROVIDER] not store the queries (along with environmental info. about those queries) and the subsequent clicks and look at that data?
And there's things like this from the article:
---
In the second part of the video, LePage demonstrates how Internet Explorer 8 has a privacy feature called InPrivate, a privacy mode to allow browsing without leaving a trace. Unfortunately, he fails to acknowledge the existence of Google Chrome's Incognito, which disables history tracking, which undercuts his argument.
---
And there's the question of how IE does it's Anti-phishing
Just check your browser's privacy options and set them to level you are comfortable using them.
"(1) "Subversive organization" means every corporation, society, association, camp, group, bund, political party, assembly, body or organization, composed of two or more persons, which directly or indirectly advocates, advises, teaches or practices the duty, necessity or propriety of
But in the end
So
Doesn't it seem just a LITTLE odd that the Chinese government would want this information, Google knows someone wants this information, and the attack originated in China?
Malevolent/Corrupt/Evil
And to make waters muddier
There's more than one angle for responsibility in the debate.
I think there's validity to that
However, if you are programming with security exceptions, you are likely to develop things that have/require more security exceptions (e.g. you must be admin/dbo/superuser/root to run it). It's not going to happen just because you're running as admin
Why propagate the Microsoft development model of must-be-admin-to-run-the-software?>
The biggest difference between time and space is that you can't reuse time. -- Merrick Furst