'Related' Browser Add-On: Handy, But at Cost to Privacy

Google's Chrome and IE browser extension makes finding related Web content a snap but the privacy trade-off is high

A nifty Google browser extension called "Google Related" makes finding associated Web content a snap, but for privacy-minded Web surfers the convenience will come with a hefty cost. The Chrome Web browser extension creates a navigation bar at the bottom of the browser, and as you roll your mouse cursor over the bar Google generates content relevant to what's on the page you're viewing.

Google announced the Web browser extension Tuesday for its Google Chrome Web browser. The Google Related add-on takes the form of a toolbar for Microsoft's Internet Explorer browser. No support for Apple's Safari, Firefox, or Opera Web browser software was announced.

I took the Google Related for a spin and liked it. It's easy to see how it can become one of those "must have" extensions. While the content displayed by Related may be limited in volume, it's still valuable for fleshing out the content of a webpage or providing jumping off points for additional searches.

Here is how it works. Google Related creates a strip of buttons that pop into view when you hover your cursor over the bottom edge of your browser. Hovering on a button displays a list of content -- video, images, news, maps, reviews, shopping and Web pages -- related to the content on the Web page.

Button categories are also tied to the Web page's content. For instance, if you're on a restaurant page, the buttons allow you to pop up a map to the eatery, read reviews of it, and see related restaurants in the same area. On a news page, you might see a button for news related to stories on the page, one websites relevant to those stories and another for related images.

The tool doesn't work with all websites. It didn't work with Internet Movie Data Base, for instance or, ironically, with Google.com pages when I visited those sites.

What I liked best about the add-on was the fact that when I was visiting a site the tool was "smart" enough to figure out the character of the site -- a restaurant, for instance, or shopping site -- and configure itself in a way that was relevant to the location. So when I stopped by one of my favorite Italian restaurant sites, I could see a map to it, not that I needed it, and reviews of it, also superfluous in this case, and related restaurants, which could be used when in an adventuresome mood. But when calling up a product in Amazon, it provided buttons for comparing products and related video and images.

Google is careful to alert potential users of Related that the tool gathers information about the pages you visit and sends it back to Google. You can hide the tool for specific websites through its options menu. On the Google toolbar, you can disable it entirely through that tool's options menu.

Information collected by Related includes the URL of website visited, your machine's IP address and one or more Google cookies. That data is retained in Google's server logs and maintained according to its general Privacy Policy.

In addition to that information, Google says it may collect non-personal usage statistics about your installation of Related, such as the version number, language and how often certain actions are taken in the extension. These usage statistics do not include personal information such as your Google Account information, email or name.

Google says it uses the information gathered from Related to operate and improve the tool.

Google Related might not be for everyone, but if you can look past privacy issues and are type of Web surfer who appreciates a deeper dive into related content your viewing without having to revisit Google.com this extension is for you.

For more tips on better browsing you may want read 10 Must-Have Google Chrome Extensions and 10 Must-Have Firefox Extensions.

Follow freelance technology writer John P. Mello Jr. and Today@PCWorld on Twitter.

Join the CSO newsletter!

Error: Please check your email address.

Tags Browsers & Add-OnsapplicationsGoogleMicrosoftonline privacybrowserssoftwareInternet ExplorerchromeApple

More about Amazon Web ServicesAppleGoogleMicrosoft

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by John P. Mello Jr.

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts