A Paranoid Guide to Google Data Privacy
You can partially switch to Yahoo and take other steps to shield your data from Google, but what happens if Google itself is compromised? One particularly privacy-conscious Computerworld contributor suggests five potential scenarios and the "Defcon 1" and "Defcon 2" solutions.
Logan Kugler explores the two sides of the risk coin when using Google services: the data Google is pulling from you, and the sensitive things hackers could pull out of you or Google itself through password cracking or authorization fake-outs. Each risk is then broken into two steps: "Defcon 2" for smart but probably sensible fixes, and "Defcon 1" for, well, people who are securing the world's nuclear armament information (or at least feel like they are).
