Google Glass; Privacy Fear And Embarrassment

Google Glass; Privacy Fear And Embarrassment

Google Glass; Privacy Fear And Embarrassment
google-glass-embarrasing

Google Glass is extremely high tech and can be very beneficial to users. However, Google had to send out a reminder to such users to take them off during intimate and very, very private situations. During a conference in San Francisco for Google developers in 2013, a few attendees had forgotten to take their Google Glass off while in the bathroom. This resulted in a private situation being documented. This just goes to show that although this piece of technology proves extremely useful, wearers need to remember that they have it on at all time.

Originally, Google Glass had privacy fears surrounding it because the device can record video less noticeably than a device that is handheld. This makes it extremely difficult for others to know whether or not they are currently on camera. Others have worried about general safety, such as a cyclist trying to do something on Google Glass and not paying attention to where they are going.

Those who are spotted wearing Glass can also be subjected to what the Internet likes to call ‘trolls.’ “I was screen-casting on a huge display, and while at the OK Glass menu,” says Shazafar Khaja, a Glass user, “Someone in the audience yelled, ‘OK Glass Google pictures of naked girls’, and Google picked up on it. I quickly unplugged the cable. If I’d been a bit late, the Google search results would have flashed on the huge display.”

Reading user stories such as this one just goes to show that being a user of Google Glass can have some very unexpected, and embarrassing moments.

Kadeaus Couloute, another Glass user, tells his story about an embarrassing moment while in Japan. “The first time some teenagers saw me wearing it, they started pointing and laughing. I got closer to them to hear what they were saying, and they said in Japanese, ‘Look at him! Look at him! He is trying to be Vegeta!’. Not being a Dragonball Z fan, I thought Vegeta was a Japanese word that I had not learned yet. So I tried to translate, which failed, then I Google searched it and saw the character. I felt extremely awkward.”

Not only are hundreds of thousands of people mocking Glass, and Glass users who call themselves ‘Explorers’, all over the Internet, but there are also videos constantly being posted. These videos are parodies on Google Glass, such at filmmaker Tom Scott’s video titled, ‘A New Way to Hurt Yourself,’ which can be found here.

So all in all, it would appear that Google Glass is quite the fuel for making non-users, or non-Explorers, laugh their heads off. Sure, the device is nothing but high technology that gives users an extra boost through their day, but Glass does make a lot of people laugh. It’s no doubt that there are always going to be embarrassing Glass stories, mainly for users who are wearing their Glass in countries that might not know much, or anything at all, about the device.

By Linda Green

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…