Cutts Nips Net Neutrality Conspiracy Theory
Be careful with Google conspiracy accusations; Matt Cutts might make an example of you. After being accused of blocking anti-Net Neutrality pages on the Progress and Freedom Foundation site, Cutts gloats over data to the contrary on his blog.
Brett Glass, via Dan Farber’s Interesting People mailing list, discovered only pages on PFF.org’s website pertaining to Network Neutrality were flagged by Google as hosting malware. Once flagged, Google gandalfs the old "you shall not pass" command, barring searchers from accessing the infected page via search results.
Glass took this as Google attempting to silence those with opposing viewpoints via search. Cutts seems to have take that as fightin’ words, and reconfirmed with his blog audience he has never seen a false positive when it comes to malware.
After presenting several ways for a person to test a site for malware, Cutts refers finally to Google’s Safe Browsing Diagnostic page for PFF’s site. Of 256 pages tested, 34 resulted in malicious software being downloaded and installed without user consent. In all there were 36 scripting exploits averaging two new processes on infected machines.
Google determined PFF was not hosting the malware itself, but those particular pages were compromised by seven separate domains.
"It looks like pff.org stored their data in a SQL database but didn’t correctly sanitize/escape input from users, which led to a SQL injection attack where regular users got exposed to malicious code," wrote Cutts, before reiterating Google doesn’t make money from flagging malware. They do it, he implies, as a Good Thing, note the capitalization.
Are Good Things going into the corporate credo now, Matt?