
Spy v. Spy 398
An anonymous reader writes "MSNBC is reporting on a brewing battle between makers of spy software and anti-spy software. According to this article the makers of Spector and WinWhatWhere have added a feature to their new software that disables the popular anti-spy software Who's Watching Me."
Grey Spy (Score:2, Funny)
-- Azaroth
Re:Wrong URL (Score:3, Informative)
with things like this happening (Score:3, Insightful)
Re:with things like this happening (Score:4, Interesting)
Re:with things like this happening (Score:3, Insightful)
Re:with things like this happening (Score:2)
Re:with things like this happening (Score:2, Insightful)
Re:with things like this happening (Score:3, Interesting)
Re:with things like this happening (Score:3, Interesting)
This reminds me of the old computer program "Core Wars." My ancient history is horribly rusty, but this whole concept goes back to one of the East Coast heavyweights (MIT? Harvard?) where the programmers would write self-replicating code fragments and set them loose overnight. The code was designed to multiply itself and destroy any other code it found. The winner was the one with the most code at the end of the run.
I'm sure someone who knows the real history will provide it.
Same concept here... only now the vendors are using our computers for their fights...
Too bad I don't have one of Gibson's Hosaka decks yet... I'd love to jack in and watch the fights.
Re:with things like this happening (Score:2, Informative)
This reminds me of the old computer program "Core Wars." My ancient history is horribly rusty, but this whole concept goes back to one of the East Coast heavyweights (MIT? Harvard?) where the programmers would write self-replicating code fragments and set them loose overnight. The code was designed to multiply itself and destroy any other code it found. The winner was the one with the most code at the end of the run.
It lives. [koth.org]
Vicious circle. (Score:4, Insightful)
Whatever works for them, you can't blame a company for pulling this kind of tactic if it's the easiest way to do it.
Personally, I hate spyware almost as much as I hate popups. Almost. Of course it's all a vicious circle, just like Trillian vs. AOL. One side will do one thing, the other counter it. Rarely does anyone win in the long run, short of taking it to court.
This is a trojan horse, plain and simple. (Score:5, Insightful)
Sure you can. Watch. I'll do it right now. =)
Without warning the user, WinWhatWhere disables another piece of software for which that person has paid good money. That's like IE deleting Netscape if it detects it on your system. That's like your trusty Chevy switching to Battlebots mode every time it detects a Honda in the highway.
It's destruction of property. (Or, since we're talking about software here, illegally depriving someone of their licensed usage of a product.)
Re:This is a trojan horse, plain and simple. (Score:3, Interesting)
No way they do it without a warning. I would stake what little fortune I have that they explicitly demand permission to do the altering in the EULA. No one reads them anyway, and even fewer would recognize what the legal-speak meant when they say that you grant them the right to alter "certain incompatible software modules installed herewith and therefore, etc". Once you click through the installer, they'd be free and clear.
This is kind of a stretch, but does anyone actually have a copy of their Licensing Agreement? I bet it's a good read.
Re:This is a trojan horse, plain and simple. (Score:2, Interesting)
Yup, here [winwhatwhere.com] it is.
Nowhere do they seek permission to alter other software... but I did get a good laugh out of this last line (emphasis mine):
"Any use of this software in conjunction with any hardware, device or apparatus to surreptitiously intercept wire, oral, or electronic communications may violate state and federal laws, so there."
Re:This is a trojan horse, plain and simple. (Score:4, Funny)
So what?
If you think EULAs are agreements I have a nice big stretch of seaside property in Oklahoma for you.
EULAs are just stray scritti that superstitious publishers make you click through. No one reads them. No one agrees to them. They are no more contractually binding than my next two sentences are.
By clicking reply you agree to transfer to me your firstborn daughter, along with the sum of $50,000, at whatever point in the future I request. If your firstborn daughter is over the age of majority at that time, I may, at my option, take a younger daughter, a son, or an automobile, in place of her. You agree that I may, if I feel it necessary, take those items you have agreed to provide me without informing you until afterwards. You agree to hold me harmless and without blame for any incidental property damage or criminal charges that may result from such action on my part.
There, I even bolded it to make sure you read it, unlike those silly little EULAs.
who should sue? (Score:2)
I think the producer of WinWhatWhere has a better case than the end user: copyright violation, unfair business practices, possibly DMCA.
Re:This is a trojan horse, plain and simple. (Score:2)
Litigation time... (Score:2)
I don't see how these companies expect not to get sued. By technical definition, spyware is a virus. Not only is "unauthorized alteration of a computer system" illegal, but if I had copyrighted material on my machine, the spyware could be considered an unlawful circumvention device under the DMCA.
The folks who write spyware are no better than hackers and virus writers - for that is what they are, and they should be treated accordingly. How long will it be until these tools are used for corporate espionage, and the companies that make them be raided by the FBI?
Kind of makes you want to install spyware on the computers at the MPAA... or Adobe, for that matter.
Re:Litigation time... (Score:2)
Note for those who didn't read the article: the spyware in question is actual spyware applications that are purposely installed (like something the FBI or a suspicious spouse/employer might use). It is not referring to the third-party marketing spyware crap that gets attached to downloads.
Re:Litigation time... (Score:3, Interesting)
By technical definition, spyware is a virus.
Uh, no. Spyware are just applications that do what they are designed to do, and are loaded on just like any other application. A virus breaks into your computer in unauthorized ways. A virus can be spyware, but spyware is not a virus.
If I found that someone had installed unauthorized spyware on my machine and broke my anti-spyware, I would be suing not just the individual who installed it on my machine in the first place, but also the company that makes the spyware.
And would you also sue a binocular manufacturer if someone spys on your wife in your backyard?
More virus-like that the company might admit (Score:4, Insightful)
In this country, based on the lawyer-fication (and simultaneous puss-ification) of the United States, intent often has a lot to do with whether you win or lose in court.
To win a lawsuit against somebody who built a product that was used to commit a crime, you have to prove the manufacturer intended the product to be used to commit a crime. While it would be hard to argue that the binocular manufacturer intended the product to be used illegally, it might not be so tough with the Spyware. Consider that Spyware has only one function, to collect data without the knowledge of the person under surveillance.
Further, if you check out the web-site, you'll see that the Spyware referred to in the article has a "remote stealth install" method, rather similar to an Outlook/VB Script virus.
You send the victim (er, your husband) an email with the "stealth installer" executable attached. If your target is an average Outlook user who double-clicks on every attachment he gets, all he'll see is...Well, nothing. According to their web-site when the target clicks on the stealth installer [winwhatwhere.com] the software is up and running in a few seconds without alerting the target to its presence.
No, it's not "technically" a virus, it's a trojan horse. As far as I know, there's no special legal protection given to authors of Trojan Horses who sell them for profit.
Re:Litigation time... (Score:2)
Re:Litigation time... (Score:3)
At which point we are no longer talking about his PC. He's merely asking for control of his own personal property. The company is asking for control of its own property. There is no conflict here.
I would hope, however, that if you did see the need to install this software on your company's machines, you would be decent enough to let the employees know that they were being monitored.
Fair fight (Score:3, Insightful)
Re:Fair fight (Score:2, Informative)
As for limited resources and interest, I don't believe either is true. The wide variety of resources listed at EPIC [epic.org]'s site, and the variety of anti-spy products [google.com], seem to contradict that idea.
How long until... (Score:2, Interesting)
Re:How long until... (Score:2, Interesting)
Who's Watching Me comes with a 90 day trial, but you have to pay if you want to keep the program. If I downloaded and paid for Who's Watching Me, then someone surreptitiously installed WinWhatWhere which disabled the software I'd _paid for_ I believe I would be pissed. It's like a worm disabling the antivirus/firewall programs you've paid for.
Updates (Score:2, Informative)
That goes for all sides of the fence.
Trespassing? (Score:4, Insightful)
And if they claim they're system files? (Score:2)
Plenty of Windows programmers (and those of us bit in the ass by Gnome/KDE version fuckups) have mused at one point or another that DLL Hell should be a crime, but I doubt anyone ever took it seriously.
Re:And if they claim they're system files? (Score:2)
AntiSpy Tech (Score:2, Funny)
Mmmm.. FUN! And a legal nightmare.. (Score:5, Interesting)
Okay, this is my computer. I purchase a piece of software that is supposed to detect snooping software hiding out on my machine. Said snooping software destroys my anti-snooper, interfering with it's proper operation and generally depriving me of it's service that I have paid for.
Shouldn't I be able to sue the snooper software, as I did not ask for it and did not give any kind of authorization for it's installation into my system? To say nothing of the trespassing charges I'm going to bring against the snooper developer..
Re:Mmmm.. FUN! And a legal nightmare.. (Score:2, Interesting)
But at home, you might have a case if the spyware was installed by someone who doesnt own the computer and cnat prove you gave them permission to install software. But you = $$, spyware = $$$$$$$$$$$, guess who wins in our financially independant court system? >:)
Re:Mmmm.. FUN! And a legal nightmare.. (Score:5, Insightful)
In that case, shouldn't you sue the person who installed it rather than the company who makes the software? Didn't we all agree that there was nothing wrong with writing DeCSS or Napster or other software - it was only the person using it for illegal purposes who was at fault?
Re:Mmmm.. FUN! And a legal nightmare.. (Score:3, Interesting)
IANAL, but you're comparing apples & oranges. DeCSS did not embed some alternate functionality into its software. It did exactly what it advertised itself to do. A better comparison is to that of a virus or a worm. When I download an email, my intention is to read my email. But when that email exploits my machine in a way that I hadn't intended, the author of the virus or worm is held accountable. This is the current law.
It doesn't matter who installed the software. What matters is that a clandestine operation took place in direct subversion of the user's intention. This software is a virus, and I suspect that if you read the current crop of computer crimes, you'd probably be able to classify this software as such.
Re:Mmmm.. FUN! And a legal nightmare.. (Score:2, Flamebait)
Shouldn't you be fired?
Re:Mmmm.. FUN! And a legal nightmare.. (Score:3)
Having been on the other side of the problem (trying to maintain a few thousand PCs) I can see the need to control what's loaded. If something breaks the cause could be just about anything, and the last thing you need is to find rogue software the user loaded, even if it's legal and won't get them in trouble with the PC police [bsa.org]. Maybe it wasn't the rogue software, maybe it was. Maybe unloading it to check will just make the problem worse. It's a headache the techs don't need.
Bottom line: it's their computer, they make the rules. And here one rule is users don't load any software. Another rule is you can be fired for breaking the rules.
Re:Mmmm.. FUN! And a legal nightmare.. (Score:3, Insightful)
Shouldn't I be able to sue the snooper software, as I did not ask for it and did not give any kind of authorization for it's installation into my system? To say nothing of the trespassing charges I'm going to bring against the snooper developer..
Consider this situation: You are at work, and you'd like to know if someone's snooping on you (a valid concern). You install your anti-snooper, and the snooping software disables it. Since the computers are owned by the company, you really have no legal recourse (take your software elsewhere?).
Alternative situation: You are married (this may be a stretch...), and your wife thinks that your time spent reading slashdot is really time being spent talking to hideous women in yahoo chat rooms. She gets suspicious enough to buy, and install, activate the snooping software on your home computer. It disables anti-snooping software you installed long before. Now, assuming you believe in the concept of marriage, the computer is as much hers as it is yours: why should your software be any more important than hers?
IT ISN (Score:3, Insightful)
Seems like torts galore... (Score:2)
sPh
Re:Seems like torts galore... (Score:2)
I don't think your example holds. To file a counterclaim, the writer of the virus would have to admit who they were and what they had done, which I don't think they would care to do!. And generally, the writer of a virus does not have permission to install the virus on your system.
If the system belongs to you, and the spyware is installed without your permission, then you have every right to go after who did it.
sPh
Yikes (Score:3, Funny)
At some point a company will probably (if it hasn't happened already) offer the fact that they do not run such software as an benefit. Some day, that may be a decision you make ranking right up their with stock options/benefits/work location/pay rate.
And heck, maybe we'll pick our spouses the same way. As in, "Do you promise to love and obey your husband and never use spyware on him?"
Grounds for divorce. (Score:5, Insightful)
Re:Grounds for divorce. (Score:4, Funny)
Maybe that's why you are unmarried ?
Re:Grounds for divorce. (Score:2)
But anyways...
I run a squid proxy server for the family, it makes it easy to filter stuff from the kids, and speed up browsing. I ran a statistic program on it to see what stats would pop up. Little johnny likes to surf disney, Little Suzie likes warner brothers, etc.. But just looking I noticed there was alot of "Apartment" pages in cache. Not wanting to be paraniod I asked why she was surfing all the apartment websites. She could of gotten mad, but she understood I was working on the proxy. (Love them geek-chicks)
Also, I dont feel bad about monitoring my kids use on the Internet. They are all young, and I dont want them seeing goatse.cx....
Re:Grounds for divorce. (Score:2)
Maybe there's something else going on? Maybe they where traking your usage to see whta site you went to to get an idea of what to get you for christmas? The fact that you don't trust your spouse enough to trust that they had a reason besides watching what you do n case your cheating?
see, not so cut and dry, like most of life. If you go off every time you suppose something, you are in for a very short marriage.
Re:Grounds for divorce. (Score:2)
Re:Grounds for divorce. (Score:2)
I think it is different with regards to love. Things become complicated.
Case in point. I was dating this girl, we were both in love (or so I thought). We talked a lot about getting married.
I come home from they gym one day. She had been using my computer to check her mail on yahoo.
No problem - "Hey babe! You done with my computer?!"
She responds "Yes, honey"
I sit down on the couch (laptop), and she left her mail open.
Right there in front of me are about 20 emails from her ex-boyfriend. One of which had pictures from the last weekend.
Evidentally she REALLY, REALLY, REALLY, had to get married and was doing everything in her power to make it happen.
Lie, cheat, whatever.
I totally trusted this person.
Now would I use WinWhatWhere? Probably not... but I guess that situation taught me something. I guess I would be more open to the situation this time around.
BTW... she is now married to a founder of a big tech company we all know and level. (sucker!)
Re:Grounds for divorce. (Score:3, Insightful)
Re:Grounds for divorce. (Score:4, Interesting)
I have confidential information concerning many of my clients and former clients on my machines. I do not share that info with my spouse. Nor do I want my doctor, lawyer or accountant sharing my confidential information with their spouses.
The spyware folk appear to me to have got off very likely in the article. It appears likely to me that the overwhelming use of their wares in the long term is likely to be outright criminal, capturing passwords, credit card numbers etc. This was the modus operandi in the crimes Mitnick was sent to jail for the first time.
The law enforcement issue sounds to me to be bogus, if law enforcement really needs such tools they would be best advised to develop them internally and use them sparingly. Genuine vendors of law enforcement tools will typically only sell to law enforcement and verify who they are selling to.
Using the tools without a court order is very likely to be illegal in many jurisdictions. It would appear to be unauthorised modification of a computer system. If it isn't illegal already it is an oversight and it is likely to be made so.
This story strikes me as being very similar in tone to the early stories we would hears from the hacker community. 'We never do damage' they would say, 'we only go after child pornographers and terorists', having (legally) reviewed intercepts of the activities of certain widely reported hacker's activities I can assure people that they misrepresent their actions and motives.
Re:Grounds for divorce. (Score:3, Insightful)
For people who live in democratic western countries - such as ourselves - you would think this to be true.
However, there are many countries with long records of human rights abuses. Many police agencies in such countries would not think twice about using said software.
Even worse - it would appear even our own law-abiding law-enforces are a little dubious. The recent furore over DIRT for instance. Check out this little article on the reg [theregister.co.uk]
If you want to know more about DIRT - a snooping/trojan tool produced in the US and used in the 3rd world to plant evidence on suspects computers - you should search theregister.co.uk or the archives at cryptome.org (they even have a link to download a cracked copy, if it hasnt been pulled yet).
It makes scary reading, look into it.
Re: Corporate use of spyware (Score:5, Insightful)
I've read about the use of spyware in the past... some very large companies make use of it. I seem to remember that Deloitte & Touche uses some spyware that's rather... comprehensive. I want to say some of the features included (among other things)...
I have to consider the other hand as well... If you're hiring a consulting company, they have an obligation to do their job to the best of their ability. That means using all the resources legally available to them -- no matter how distasteful. If you've got someone who's supposed to be doing data entry, and they're actually running their own little eBay store out of the supply room... well, you're going to need all the ammo you can get to convince the boss to fire his brother!
With the sentiment of "It's OUR computer, OUR time, and OUR money!", I don't think you're going to be seeing spyware-free companies advertising the fact anytime soon.
In fact, with the precedent that computers have been and continue to be monitored; a company could incur severe liability for deliberately not monitoring! Consider the potential liability burden when you don't catch sexual harrasment or some particularly nasty criminal activity... What happens to the company when it's shown that 'standard industry practices' would have given advance warning of, or even prevented [some illegal event]?
What happens? A check with LOTS of zeros to the left of the decimal... at the best, your lawyer gets it. At worst, THEIR lawyer gets one, THEY get one, etc...
Double-edged DMCA to the (cough) rescue? (Score:3, Interesting)
I was worried until (Score:3, Informative)
But for now, I am not too concerned although I thank
But woe be the day when Cydoor and the like start doing the same
Re:I was worried until (Score:2, Insightful)
Isn't the fact that WinWhatWhere is crashing its competitors' software just as much evidence of its existence, though, as if the other programs came out and said, "Hey, you have WinWhatWhere on your computer!"
I wonder how undetectable can you make a process if someone's running Windows 2k on their home box? If I pull up a list of services, or hit CTRL-ALT-DEL to see what processes are running, I'm going to see it right there.
It's funny how (Score:2, Insightful)
If you dont want to be watched (Score:2, Insightful)
Why has my computer turned into a battleground? (Score:3, Interesting)
I remember the days when you had to be worried about downloading a virus in the newest internet app. Today, those worries are a thing of the past. Viruses don't spread in zip files anymore, they arrive in my inbox. Now I have to be worried that any app I download has spyware in it. I want to download RealPlayer? Ha, I better enjoy giving Real plenty of information about everything I do. I want to download Bearshare? Ha, I better enjoy sending my every move to probably dozens of companies.
However, I don't enjoy doing this, so I download something to prevent this. Mind you, it's rather unethical that Bearshare, Real, Morpheus, etc, don't give me the opportunity to even prevent the spyware from being installed, but I'll let it slide. I download something to shut these things down, only to find my download either is knocked out when the spyware overwrites part of the executable, or my download contains spyware itself...
Give me a break, it's enough to make a person unplug his computer and never go online again. At least I'm confident in one thing...
With me, the advertisers are wasting their time, as I will NEVER buy anything online ever again. I don't know where they get their marketing info, and as such, I will always expect them to have received it fradulently.
FWIW ref: BearShare... (Score:2)
Unfortunatrly on that box ANY Gnutella Win32 code I run crashes WIN2K within about 5mins with errors in either the NDIS driver or the HAL (eek!). No Gnutella for me I'm afraid. Maybe on another machine later on...
Real is on my list of software to avoid and not only for the intrusive amount of information they request. They change all sorts of extension associations too - drives me nutz! The "Gator" crap that comes with some programs is also pretty nasty. Yeah, I want a program on my machine that "trickles" in new code. Uh huh, sure. NOT! My thanks to the folks making AdAware, they really saved me some time and research! Much recommended for you Win32 users. They are even smart enough to skip over the "opt-out" cookie from Double-Click
Don't get me started on E-mail viruses. Between myself and my accounts plus all of my friends and relatives this is a constant headache!
Because it's running Windows (Score:2)
Seriously, it's that simple.
What do you expect from people using an operating system that has secret APIs [theregister.co.uk], made by a company that has a history of letting a vendor in [winntmag.com] on those secret APIs. The whole "Windows Experience" is shoddy and filled with "magic" crap like The Registry, low 64K of memory, undocumented and ever-changing Native APIs and other rubbish.
Microsoft and its favored vendors will always possess more and better knowledge of the system than you or I. What's to prevent MSFT from giving one of these two competing vendors access to a undocumented "native API" call that would let the favored vendor slip past the non-favored vendor? Nothing.
Contrast this to a computer running Linux or one of the BSDs - the APIs are all there for the viewing. No spyware vendor can count on undocumented APIs, or grotesque complexity to conceal their spyware. This is real security, derived from properties of open source, in contrast to Dare Obasanjo's strawman a argument [slashdot.org] about the security of open source.
Doh!! (Score:4, Funny)
Re:Doh!! (Score:2)
Re:Doh!! (Score:3, Funny)
My dreams were doubly broken! I thought the new version was going to be for the new Amiga!
Re:Doh!! (Score:4, Funny)
Re:Doh!! (Score:2)
How would you like to be a customer of these guys? (Score:3, Insightful)
I know - write an iron clad EULA to prevent reverse engineering, encrypt everything, and then just sue one another under the DMCA or somesuch until both companies are broke. Yeah, that's the ticket! There's not going to be any winners here...
Heh, and I've now met a few people that have caught spouses "cheating" using software like this. People are spying on their kids like crazy too. Maybe this new bill Hollingsworth has proposed will make our computers "pure? Maybe it'll cure world hunger too (ahem). What a mess!
Re:How would you like to be a customer of these gu (Score:2)
And, as usual, the lawyers are laughing all the way to the bank.
That reminds me of an entry from the Jargon File (Score:5, Informative)
This story says a lot about the ITS ethos.
On the ITS system there was a program that allowed you to see what was being printed on someone else's terminal. It spied on the other guy's output by examining the insides of the monitor system. The output spy program was called OS. Throughout the rest of the computer science world (and at IBM too) OS means `operating system', but among old-time ITS hackers it almost always meant `output spy'.
OS could work because ITS purposely had very little in the way of `protection' that prevented one user from trespassing on another's areas. Fair is fair, however. There was another program that would automatically notify you if anyone started to spy on your output. It worked in exactly the same way, by looking at the insides of the operating system to see if anyone else was looking at the insides that had to do with your output. This `counterspy' program was called JEDGAR (a six-letterism pronounced as two syllables:
But there's more. JEDGAR would ask the user for `license to kill'. If the user said yes, then JEDGAR would actually gun the job of the luser who was spying. Unfortunately, people found that this made life too violent, especially when tourists learned about it. One of the systems hackers solved the problem by replacing JEDGAR with another program that only pretended to do its job. It took a long time to do this, because every copy of JEDGAR had to be patched. To this day no one knows how many people never figured out that JEDGAR had been defanged.
Interestingly, there is still a security module named JEDGAR alive as of late 1994 -- in the Unisys MCP for large systems. It is unknown to us whether the name is tribute or independent invention.
Re:That reminds me of an entry from the Jargon Fil (Score:4, Funny)
Can't legal action be used? (Score:2, Interesting)
Or am I just confused as always.
-Recovery1
Re:Can't legal action be used? (Score:2)
The software has a very specific purpose which it performs. I wouldn't blame the company if someone decided to install it on your computer without your permission.
The Best Anti-Spy Software (Score:2, Insightful)
I'm not trying to pat Linux or *BSD on the back here -- the Unix security model is far from ideal, actually -- but it's a good argument for open systems in general, even if they're not "free" as such.
Re:The Best Anti-Spy Software (Score:2)
Re:The Best Anti-Spy Software (Score:2)
I speak of course about OpenBSDs CryptFS, and Crypted Swap. FreeBSDs (up and coming) ACLs and MAC/LOMAC support, then NetBSDs ability to run on a DreamCast (or equally rare general use hardware) would ensure that a rogue program would have a hell of a time running.
That said, it'll only take a lousy admin to counter all of the enhancements.
Counter-countermeasure engineering problem... (Score:4, Interesting)
Of course, the anti-spy people could treat these countermeasures as an engineering problem.
A couple possible (partial) solutions:
1) Check for beligerant spyware during the install process (the install program would presumably be running from a CD, so it couldn't be corrupted). Later, if it detects that spyware is being installed, fire off warnings, send e-mails, make logs, etc. to make sure that the spyware can't cover it's tracks.
2) In the documentation, note that failure for the program to run or a crash could indicate the presence of spyware (and that you should run an "emergeny check" from the install disk).
3) Put a check on the integrity of the software in the MBR (using CRCs and such). If a spyware messes with that, it should trip off the BIOS virus checking. That would also have to be documented of course so the user understands what the heck is going on.
4) Have the anti-spyware run entirely from a separate disk (maybe a boot disk to be sure the spyware isn't running waiting to thwart the anti-spyware). When you come in to work, or sit down at your computer, throw in the disk to be sure nobody installed spyware when you weren't there.
5) Make the anti-spyware as stealthy as the spyware. If the spyware or the person installing isn't aware of the presence of anti-spyware, the anti-spyware is much more likely to be successful. Using polymorphic code, constantly changing file names, etc. could probably be pretty effective.
None of these solutions are perfect of course, but a bit of a battle is probably inevitable, as the two types of software both have legitimate and illegitimate uses, and the only way one of the two can succeed is by defeating the other.
Additional measures... (Score:2, Interesting)
2. Incorporate some of the latest virus technology (e.g., piggyback on spyware, change names, locations, and dll file names and locations, etc).
This might not necessarily solve the entire problem, but it could certainly up the ante.
Re:Counter-countermeasure engineering problem... (Score:2)
I know you can't do that with Win9x, but you can in NT/2K/XP. It would be a bit of hassle, but there's no way the spyware can access the anti-spyware's files.
Serves 'em right... (Score:2)
I mean, come on, people! Checking all contingencies is something you're supposed to learn in your first programming course. Especially in a hostile computing environment (spy vs. counterspy) you have to write airtight code or you'll get got.
Article Correction (Score:2)
SpectorSoft [spectorsoft.com] makes a product called Spector and SpectorPro, from what I can tell, it takes a bunch of screenshots.
WinWhatWhere Investigator [winwhatwhere.com] is a different program and should have had the URL as http://www.winwhatwhere.com [winwhatwhere.com]. Although it seems to do generally the same thing.
how about using tcpdump or ethereal (Score:2)
btw- an easy solution would be to run an eavesdropper on your router/masquerade machine (if you're using one). It would be extremely difficult for spyware to find that you're running tcpdump or ethereal on a remote machine.
Virtual Machines are the Answer (Score:3, Insightful)
Every operating system should have a sandbox that looks like the rest of your computer where you run programs you don't trust. When the program tries to install itself perminately or hook itself into a DLL, it will only do it to that particular sandbox.
This sort of protection has been supported by Intel since the 286, why is it we still don't use virtual machines for security purposes?
Now waitadoggoneminuteheah! (Score:3, Insightful)
Hey, it worked for Microsoft... (Score:2)
just firewall out this spyware stuff (Score:2)
From a Ex-Spector developer... (Score:5, Informative)
It's a classic case of the marketing weenies convoluting a product to fit a malformed business model. There's MORE MONEY selling a product to catch your "cheating husband" than to protect your kids. It feed on paranoia.
The good news is most developers could spot this product on their machine. Keystrokes slow down, mystery files appear, etc. It leaves a small footprint, but it's still a footprint. Don't look for it (Spector) in Task Manager. It's hiding in another application.
KPMG Redux? (Score:2)
This is from http://www.trapware.com/companyLinking.html [trapware.com] (terms and condition violation here).
Yeah right...So here's another TrapWare terms and conditions violation! [trapware.com] YAY!
If he really wanted to prevent linking, he'd set it up in apache so it only accepts incoming connections for legally authorised URLs, but judging by their website, they're quite oblivious to the nature of the Internet.
I encourage everyone to post links to their website in the blogs, just like what happened to KPMG [kpmg.com] a few months ago.
Duh, the easiest solution... (Score:5, Funny)
psxndc
pr0n (Score:3, Funny)
Amen to that. I run RedHat, and keep my pr0n in a .pr0n directory right there in my home directory. I couldn't possibly imagine her finding it. All she knows how to do is connect to the internet and browse the web.
Cheers, Joshua
Illegal in UK (Score:3, Informative)
The difficulty here is in getting it to court...
Re:Obligatory DIRT links (Score:2, Informative)
http://cryptome.org/dirt-feedback.htm [cryptome.org]
http://cryptome.org/dirt-author.htm [cryptome.org]
http://cryptome.org/dirt-safrica.htm [cryptome.org]
Re:Or use the simple method.... (Score:3, Informative)
Re:Or use the simple method.... (Score:2, Funny)
Re:Or use the simple method.... (Score:2)
Hey, if you have the key, you're vulnerable to social engineering attacks. Better to destroy the only key.
--G
Re:ot? (Score:3, Interesting)
The point is that what we're seeing now, with the spyware vs anti-spyware, is the same as Code Wars, but now moving to real systems instead of that virtual block of memory. And these are no longer games, but programs that may or may not affect both those that write them and those whose system the battle takes place on. So I certainly think there's a geek side to this, no only in the YRO aspect, but also in light of what used to be considered a harmless game years ago.
Re:ot? (Score:2, Insightful)
Maybe sandboxing by default will become the way of the future...
Sure they do... (Score:2)
Seriously though, I agree. People shouldn't have to hunt down programs like AdAware to dump this crap if they don't like it. I killed off the Aureate crap the CuteFTP installed the other day and then had to search high and low for a "fake" DLL to get the sily thing to run again. I think it's still screwed up but ran out of time to fool with it. What a PITA! Show me banners, fine. But report back on my acivities? No way - flag it with AV!
Re:Unices? (Score:2)
That's basically right - Linux/unix market share is too small, and marketing men know that Linux users typically will be able to detect such software and destroy it. We also tend to be a hard sell ;)
My other question is, if no unix spyware programs exist, how long will it be? With more and more people heading to mandrake, RH, and suse, is it only a matter of time before these people start checking client info, and trying to install RPM spyware packages?
Probably not until Linux gets MUCH bigger. Also, it's much much harder to get spyware onto a unix system because of it's inbuilt security. 9 times out of 10 I find unix security a total pain in the ass, but it does have the big advantage that (unless you're logged in as root) nothing can install or tamper with your system.
Re: (Score:2)
Re:And the users get it, in the end... (Score:2)