Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Dark side of the Net (they re spying on your computer - and you)
Livewire ^ | June 12 2002 | Nathan Taylor

Posted on 06/13/2002 9:58:48 AM PDT by dead

A multitude of companies may be spying on your computer - and you, writes Nathan Taylor.

You may not know it, but you could be lending spare computer power to a new software company in the United States. A viral program, Altnet (formerly known as Brilliant Digital), is covertly installed with recent versions of popular file sharing software KaZaA, along with several other file sharing programs. Altnet uses the spare processing power of the host computer for the company's own ends. That is, it can hijack a user's spare processing power for use by the company, with the user being none the wiser.

It's not the first time that KaZaA has secretly installed unwanted software. Late last year, the Australian-owned software company was embroiled in a scandal in the Net community. As part of the install process for KaZaA's eponymous file sharing software, an extra application called ClickTillUWin was surreptitiously forced on to the user's computer.

Ostensibly, ClickTillUWin delivers advertising to a computer. KaZaA, which gives away its software for free, uses revenue from the advertising (which appears in a bar at the top of the application) to make ends meet.

But ClickTillUWin does not just deliver ads to users. It contains a virus that reports back to its developers, Cydoor, which websites computer users visit. This information is then used to deliver "targeted" advertising. So if the program found you visited a lot of sports sites in a day, for instance, it might deliver more ads for sporting goods to your system.

Then there's vx2, which came with another file-sharing tool, Audio Galaxy. It monitors when a computer user fills in an online form. It takes the information and sends it back to the developer. Even credit card information may be sent back.

You might be excused for thinking that these are malicious programs inserted by hackers. They're not. These are legitimate programs bundled with commercial and free software, sometimes from major companies -- but the companies are less than forthright about letting users know what is being installed on their computer along with the software.

A number of software development/marketing houses in the United States and elsewhere develop spyware. Most of them you would have never have heard of: Cydoor, Brilliant Digital, Conducent and Radiate are some of the biggest. These companies started on the premise of delivering ads with software that can be downloaded for free (paying a chunk of the revenue to the developer of the free software), but have morphed into something far more sinister.

"Businesses demanded information about behaviour that can be used to sell," said Nigel Waters of Pacific Privacy Consulting. With Net advertising revenue so thin on the ground, struggling software providers sought a competitive advantage. Many adware applications turned into spyware applications. Adware programs are applications that foist advertisements and links on the unsuspecting party. TopText, which comes with a number of applications, is an example of this kind of stealth advertisement. It parses Web pages that the user visits and inserts hypertext links on keywords, linking to sponsor pages. These links look no different to the links that would originally appear on the Web page. Other programs might simply replace banner advertisements on Web pages visited with banner ads provided by the software manufacturer, effectively stealing ad revenue.

While TopText is merely invasive, most others are much worse. Most adware/spyware applications include additional tracking software, which secretly reports a user's Internet movements back to the software developer. In short, all those free programs that you installed could be reporting your every move back to an unknown marketing or development company. Ostensibly, this information is gathered for marketing purposes, but in most cases the companies involved do not reveal what they are doing with the information they gather.

According to Waters, the privacy implications of these programs are "potentially devastating". "They threaten to breach fundamental principles of fair collection and result in a range of organisations knowing more about the users than the user wants," he says. What's more, there is not nearly enough awareness of the phenomenon in Australia, but Waters says "knowledge and resistance are growing fast".

As for the Spyware purveyors themselves, early indications are that the strategy has been only marginally successful. Earlier this year, online ad provider DoubleClick abandoned targeted advertising schemes, since the cost of gathering and maintaining the information outweighed the premiums they could charge for having it.

The biggest culprit when it comes to spyware is free software. Because bundling spyware is an easy way to get revenue, huge numbers of free applications now come bundled with at least one spyware package. If you're a user of free software, particularly file-sharing, Napster-like tools such as KaZaA, LimeWire, BearShare or Grokster, there's a pretty good chance that you're running some spyware on your computer right now. They're not the only culprits; the spyware Aureate (see the sidebar) alone comes with no less than 490 different applications, including games, Net tools and productivity software.

The host software vendors, of course, argue that the presence of adware/spyware is the "price" for using their software: if you don't like it, don't use their software. Fair enough, too, says Pacific Privacy's Nigel Waters. "They're not inherently unethical," he says. "There can be legitimate uses, but only if users are fully informed and have as much choice as possible."

Electronic Frontiers Australia's executive director Irene Graham, holds a similar position. For Graham, the issue is not the presence of the software, but the fact that the spyware is so carefully hidden, and that so few users know about its presence. ``We don't object, in principal, to the software,'' she says. ``It's a fair position that you do not have to use the software as long as the provider of the software gives clear and explicit information about what is happening. As long as the user has informed consent, it's OK. There needs to be, clear in advance, advice to users of these programs that their movements are being tracked. Right now, that's not happening.''

Purveyors of adware/spyware hit back at such criticisms by saying that they do, in fact, warn users about the spyware as part of the license agreement during the install process. For privacy groups, however, that's not nearly enough. "The `click-wrap' model of user licenses is clearly not good enough, because people don't read it," says Graham. "It doesn't usually work because there is so much legal mumbo-jumbo that people skip though. To put things about privacy in there just doesn't cut it. It needs to be somewhere obvious. It needs to be somewhere that you can't just click past it without making an informed decision. And there's also the other problem that the only person who sees it is the person who installs the software."

Under the terms of the current Privacy Act, most of the spyware applications would fall into an untested legal grey zone, according to the EFA's Irene Graham. The law is only breached if the data collected is associated with a specific individual, rather than used as bulk statistical data. Most spyware applications do not record the name of the user, although they may record the Internet address of the infected computer. Whether on not the IP Address (a computer's unique address on the Internet) constitutes individual identification has yet to be tested in court, says Graham.

In any case, the law can only be applied to Australian companies or companies within Australia. Unfortunately, most of the software infected with spyware is downloaded from foreign companies over the Internet, untouchable by Australian law.

Very few of the spyware applications are easy to remove. In nearly all cases, the host software has to be uninstalled first, and then removing the spyware may involve some serious computer voodoo, involving hacking the Windows registry (a challenge well beyond most computer users) and the tracking and deletion of specific files.

For those particularly worried about the invasion of their privacy, two applications in particular are designed to detect and remove spyware, although they frequently require the removal of the host program as well (so users can't have it both ways). Lavasoft's Ad-aware and Gibson Research's OptOut automate the detection and removal of most known spyware products.

With their revenue sources being cut off, however, the free software vendors are not at all happy with these applications. In true viral fashion one of the spyware vendors, RadLight, has hit back, with RadLight's free media player coming with a routine that actually turns the tables on Ad-aware and removes it from the system. A small clause in the RadLight license agreement states: "You are not allowed to use any third party program (e.g. Ad-Aware) to uninstall applications bundled with RadLight."

Wherever this battle ends up, for the meantime it's worth reading the license agreements of the software you install -- painful as that may be.


Know your spyware

A quick look at some of the most prevalent spyware applications.



TOPICS: Culture/Society; News/Current Events; Technical
KEYWORDS:
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-63 next last
To: rdb3
"I should have known better."

Keep dreamin', llama.

41 posted on 06/14/2002 1:01:43 PM PDT by Psycho_Bunny
[ Post Reply | Private Reply | To 40 | View Replies]

To: You are here
If they were, he'd be driving a Mac, in which case we should all pity him.


Bush Turns His Back To Mac
42 posted on 06/14/2002 1:30:36 PM PDT by Bush2000
[ Post Reply | Private Reply | To 35 | View Replies]

To: rdb3
Is it too much to ask that adults act like, well... ADULTS?

Yes.

43 posted on 06/14/2002 1:31:13 PM PDT by Poohbah
[ Post Reply | Private Reply | To 38 | View Replies]

Comment #44 Removed by Moderator

Comment #45 Removed by Moderator

To: dead
It's not the first time that KaZaA has secretly installed unwanted software. Late last year, the Australian-owned software company was embroiled in a scandal in the Net community. As part of the install process for KaZaA's eponymous file sharing software, an extra application called ClickTillUWin was surreptitiously forced on to the user's computer.
Kazaa Lite is Kazaa without Cydoor or the Brilliant Digital junk (which actually acts more like a virus than anything else).

Audiogalaxy's supposedly clean right now. I run Adaware pretty regularly. BTW, if you use adaware don't delete the spoof DLL from Kazaalite...Kazaa looks for it when you log on.

-Eric

46 posted on 06/14/2002 1:37:46 PM PDT by E Rocc
[ Post Reply | Private Reply | To 1 | View Replies]

To: Poohbah
It appears it does.
47 posted on 06/14/2002 2:03:52 PM PDT by rdb3
[ Post Reply | Private Reply | To 43 | View Replies]

To: Psycho_Bunny
Quite correct. There is no such thing as a secure computer.

There is also no such thing as an entirely safe automobile. B ut I'd be safer in a Mercedes than in a Yugo. Accumulated data over numerous years have proved this point.

Likewise, some companies' operating systems have regularly been shown to have security problems. Other operating systems have managed to be proven secure in it's default configuration for over five years.

Any operating system or software is vulnerable to a stupid user. However, some operating systems and software packages have proven to be more vulnerable than others, even given the same stupid users. That's due to the design philosophies.

As long as Microsoft keeps treating security as a PR problem instead of a design problem, malware, viruses and debilitating bugs will continue to plague the users of their software.

48 posted on 06/17/2002 4:33:30 PM PDT by Knitebane
[ Post Reply | Private Reply | To 31 | View Replies]

To: Bush2000
Go ahead and send me the binary in question. The following will happen:

My email client will download the email with the attachment. Nothing happens.

I click on the attachment. My email client will ask me what I want to open the attachment with, the default being a hex editor. Again, nothing happens.

I open up a console window and change to the attachment directory. I type the name of the attachment. The operating system responds "Permission denied".

In order to execute the attachment, I must deliberatly issue "chmod +x attachment" before it will execute. And even then, the worst it can do is damage, delete or change files in my home directory. No other user's files and no system files can be damaged.

These are fundamental differences between how unix-type operating systems and Windows-type operating systems are designed. The amount of damage that a Code Red or a Nimda outbreak can cause shows this.

And the blah, blah, installed users, blah, blah, popular platform, blah, blah standard excuse doesn't cut it. Apache still holds the largest market share of web servers, yet IIS has had many more damaging attacks.

Like MSDOS, Amiga, MVS and C/PM, Windows-based operating systems are out of date. Those people that continue to use outdated, buggy, and unsecure legacy software will continue to have problems.

49 posted on 06/17/2002 4:49:46 PM PDT by Knitebane
[ Post Reply | Private Reply | To 32 | View Replies]

To: Knitebane
You missed what I was saying. Statistics mean nothing at this point because Linux doesn't have enough of the market...yet...to make the statistics valid. Linux still primarily exists in the realm of “competent users”. We'll have no idea at all how vulnerable these OSs are until Linux and Apple systems are as widespread, flexible and attacked as much as Windows systems.

Until then, it's just theory....although Linux looks like it will end up being more secure. But, in the end - as it becomes a more flexible platform - the margin of security will probably not be that much more.

50 posted on 06/17/2002 5:01:41 PM PDT by Psycho_Bunny
[ Post Reply | Private Reply | To 48 | View Replies]

To: Psycho_Bunny
But we can infer that Open Source Software is more secure than Windows software by examining other areas where OSS has a greater percentage of marketshare.

Apache vs. ISS, Sendmail vs. Exchange, NFS vs. SMB (CIFS)

All of the OSS packages listed above have a marketshare/installed base greater than the Microsoft package that it competes with, yet the statistics show that the Microsoft packages have a great deal more of the serious security problems.

As Linux migrates to the desktop, this will become much more obvious. Applying standard trend analysis techniques to the available data should convince all but the most entrenched Microsoft advocate.

51 posted on 06/17/2002 5:26:19 PM PDT by Knitebane
[ Post Reply | Private Reply | To 50 | View Replies]

To: toupsie
President Bush and his PowerBook G3/500 "Pismo"

Just goes to show you all those CFR conspiracy types were right. And there is not a dimes worth of difference between Bush and Gore after all.

52 posted on 06/17/2002 5:39:26 PM PDT by Yeti
[ Post Reply | Private Reply | To 22 | View Replies]

To: Bush2000
Since MacOS X is based and is UNIX, it makes it very simple to see what software is running on the computer.

True, but since many Mac users are utter morons, that capability will probably not help them.

It's comments like that that make think Bill Gate's little WinBorgs are all pompous PC bigots.

53 posted on 06/17/2002 5:50:00 PM PDT by NapaCA
[ Post Reply | Private Reply | To 18 | View Replies]

To: Bush2000
True, but since many Mac users are utter morons,

There you go again, FriendOfBill.

Of course, since most computer users of any kind are indeed utter morons when it comes to computers, I can't dispute the point.

54 posted on 06/17/2002 6:00:26 PM PDT by jimtorr
[ Post Reply | Private Reply | To 18 | View Replies]

To: NapaCA
It's comments like that that make think Bill Gate's little WinBorgs are all pompous PC bigots.

At least you didn't deny it ... ;-p
55 posted on 06/17/2002 11:39:08 PM PDT by Bush2000
[ Post Reply | Private Reply | To 53 | View Replies]

To: Knitebane
Dude, you're living in a dream world if you think I can't crack an Apache server.

And Exchange Server isn't a problem....it's the clients that are the problem.

And there is no reason to believe Linux will remain as secure as it is. To take market share, it's going to have to support automation or else it's not going to take the desktop share it should.

56 posted on 06/18/2002 9:04:54 AM PDT by Psycho_Bunny
[ Post Reply | Private Reply | To 51 | View Replies]

To: Psycho_Bunny
*Snort*

Seems that we all live in the same dream world, because Exchange Server is a wreck. Exhange Server has no vulnerabilities? Please go here and educate yourself.

And yes, Apache can be cracked. The arguement was whether IIS is less secure than Apache. And the answer is well documented. Running ISS is dangerous.

There is a lot of evidence that Linux and other OSS operating systes will become more secure over time rather than less. OSS programers treat security problems as bugs and fix them. Microsoft treats security problems as PR problems and tries to hide them.

57 posted on 06/19/2002 9:02:07 AM PDT by Knitebane
[ Post Reply | Private Reply | To 56 | View Replies]

To: Knitebane
"Exhange Server has no vulnerabilities?"

I don't recall saying that. If you're going to make stuff up, don't reply to me.

58 posted on 06/19/2002 9:28:58 AM PDT by Psycho_Bunny
[ Post Reply | Private Reply | To 57 | View Replies]

To: Psycho_Bunny
"Exhange Server has no vulnerabilities?"

I don't recall saying that. If you're going to make stuff up, don't reply to me.

And Exchange Server isn't a problem....it's the clients that are the problem.

56 posted on 6/18/02 12:04 PM Eastern by Psycho_Bunny

You may not have used the exact words, but you implied that Exchange wasn't a security problem.

59 posted on 06/19/2002 9:36:59 AM PDT by Knitebane
[ Post Reply | Private Reply | To 58 | View Replies]

To: Knitebane
You're correct to that extent...My intent was "primary problem"

In any event I tire of the dispute. It's sooooo old. And you're preaching to the coders choir. I simply don't live in the rose-pedal strewn world that thinks Linux is going to do everything but solve the problems in the middle-east and cook breakfast. I know better.

60 posted on 06/19/2002 9:43:36 AM PDT by Psycho_Bunny
[ Post Reply | Private Reply | To 59 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-63 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson