Google published an apology over its blog on a “mistake” done in 2006 that allows Google Street View cars to collect WiFi details (MAC addresses, SSID information and payload) over non-password protected WiFi connection.
So, is Singapore safe from this mess, I am not sure? But based on their official remarks, it still happens. Here is an excerpt from Google Blog on what happens.
In 2006 an engineer working on an experimental WiFi project wrote a piece of code that sampled all categories of publicly broadcast WiFi data. A year later, when our mobile team started a project to collect basic WiFi network data like SSID information and MAC addresses using Google’s Street View cars, they included that code in their software—although the project leaders did not want, and had no intention of using, payload data.
Read the Full Story on Google Blog
[ad#boxlist]
(source)