{"id":9691,"date":"2015-06-27T19:00:21","date_gmt":"2015-06-27T23:00:21","guid":{"rendered":"http:\/\/thundercloud.net\/infoave\/new\/?p=9691"},"modified":"2015-06-27T19:00:21","modified_gmt":"2015-06-27T23:00:21","slug":"can-you-trust-your-antivirus-software","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/can-you-trust-your-antivirus-software\/","title":{"rendered":"Can you trust your antivirus software"},"content":{"rendered":"<p><em>We found the following article by Emsisoft very interesting. We&#8217;ve seen evidence that some free antivirus programs like AVG and Avast are edging dangerously close to becoming spyware and PUPs. This is extremely disturbing because the essence of security is the expectation or privacy and trust.\u00a0<\/em><\/p>\n<p><em>We are publishing the following Emsisoft article with the permission of our friends at Emsisoft.<br \/>\n<\/em><\/p>\n<blockquote>\n<h1>Antivirus software: Protecting your files, at the price of your privacy?<\/h1>\n<div class=\"post_info\">In <a title=\"View all posts in Emsisoft Lab\" href=\"http:\/\/blog.emsisoft.com\/category\/emsisoft-lab\/\">Emsisoft Lab<\/a>, <a title=\"View all posts in Emsisoft News\" href=\"http:\/\/blog.emsisoft.com\/category\/emsisoft-news\/\">Emsisoft News<\/a>, <a title=\"View all posts in Security Knowledge\" href=\"http:\/\/blog.emsisoft.com\/category\/security-knowledge-en\/\">Security Knowledge<\/a> by <a href=\"http:\/\/blog.emsisoft.com\/author\/emsi\/\">Emsi<\/a> on June 26, 2015 | <a href=\"http:\/\/blog.emsisoft.com\/fr\/2015\/06\/26\/logiciels-antivirus-proteger-vos-fichiers-au-prix-de-votre-confidentialite\/\">Fran\u00e7ais<\/a>, English, <a href=\"http:\/\/blog.emsisoft.com\/de\/2015\/06\/26\/antivirensoftware-schutz-fuer-ihre-dateien-aber-auf-kosten-ihrer-privatsphaere\/\">Deutsch<\/a><\/div>\n<blockquote><p><strong><em>\u201cPrivacy\u201d is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively.<\/em><\/strong> [Wikipedia]<\/p><\/blockquote>\n<h3>We have to make a statement here: Privacy is important. Period.<\/h3>\n<p>Large companies and governments unfortunately tend to disagree with us\u00a0these days. They want to make us believe that security and comfort always come at the price of privacy. We think that the risks for potential misuse of collected mass data always outweighs any argument for the advantages of gained functionality that is based on big data analysis.<\/p>\n<p>Only a few\u00a0people are aware that one of the biggest threats to their privacy is actually a piece of software running on almost all computers. A software they have bought believing it would actually protect their data: antivirus software.<\/p>\n<h2>Antivirus features that rely on techniques which affect your privacy<\/h2>\n<p>There are a couple of highly questionable features in everyday\u2019s protection software that we\u2019d like to analyze a bit more in detail:<\/p>\n<h3>1)\u00a0Scanning and blocking of dangerous\u00a0URLs<\/h3>\n<p>Almost all internet security products claim to prevent you from accessing\u00a0dangerous and fraudulent websites to keep you safe from malware downloads and fraud attempts. To do that, they typically forward all website addresses you visit\u00a0to a centralized server which scans the domain names\u00a0and paths against a massive database of dangerous URLs.<\/p>\n<p>You may ask why these scans can\u2019t be done on your local computer. The reason behind this requires a bit of technical knowledge: to check\u00a0addresses locally would require the whole database to be\u00a0constantly transferred and synchronized via online updates onto your computer. The problem with that approach is that there are literally millions of known bad website addresses that\u00a0change very frequently.\u00a0Online updates of protection software would become far too heavy for most users and every day hundreds of megabytes of data would need to be updated, which is simply impractical. That\u2019s why it is more efficient to send each visited address to a server who does all the work and just returns a \u201csafe\u201d or \u201cdangerous\u201d flag.<\/p>\n<p>The bad thing about this technology is that the <strong>antivirus vendor can track ALL your visited websites<\/strong>. Even worse: some vendors can read encrypted data\u00a0that you enter on\u00a0online banking websites or other private communication\u00a0channels. These massive database servers are of course protected at the highest level, but history shows us that data is never 100% safe. Just think for a second about what would happen if that antivirus vendor lost control over their servers for any reason, and what would happen if your surfing habits were shared with criminals.<\/p>\n<h3>2) Cloud based\u00a0file scanning<\/h3>\n<p>A few years ago, any software company who didn\u2019t join the \u201ccloud\u201d hype was considered lame and old-school. There is no doubt that cloud computing\u2014which means shifting heavy computing jobs from the local PC to a server \u2018somewhere\u2019\u2014can be a very useful thing to speed things up. Since the early days of antivirus software, file scanning\u00a0is typically done on the local computer. Antivirus vendors create a database of fingerprints\/signatures of viruses and other threats, then send that collection of unique markers to the antivirus software on your computer where it compares all local files with each of those signatures.<\/p>\n<p><a class=\"fancybox\" href=\"http:\/\/blog.emsisoft.com\/wp-content\/uploads\/2015\/06\/11863156_s.jpg\" rel=\"fancybox\"><img loading=\"lazy\" decoding=\"async\" class=\"  wp-image-17193 alignleft\" src=\"http:\/\/blog.emsisoft.com\/wp-content\/uploads\/2015\/06\/11863156_s.jpg\" alt=\"11863156_s\" width=\"313\" height=\"276\" \/><\/a>Cloud scanning sort of reverses that process. It creates signatures of all potentially suspicious files on your hard disk and uploads them to cloud servers where these signatures are scanned against a large database of known threats. Signatures\u00a0are typically short sequences of letters and numbers, so they don\u2019t allow any antivirus vendor to restore your file content. Though they know which programs you run on your PC if the same pattern was seen before and other meta data can be linked to the data set.<\/p>\n<p>Many antivirus vendors go one step further: They don\u2019t just upload a unique file identifier, they upload the whole file so it can be analyzed on a cloud server. For program files that typically doesn\u2019t mean any danger, but has any antivirus vendor ever published their rules for selecting files that are to be uploaded? You are forced to blindly trust that\u00a0they don\u2019t send any of your private data files.<\/p>\n<h3>3) Collecting the computer\u2019s meta data<\/h3>\n<p>Sometimes, collecting meta data about a computer can even be more helpful\u00a0than collecting data files. Meta data describes all sorts of information such as\u00a0computer name, user logon name, IP address, country, operating system, running programs, their version numbers, hardware components or similar. Collecting and combining\u00a0these data points allows someone to sketch a quite precise picture of each computer and derive a certain level\u00a0of exposure to online threats.<\/p>\n<p>But that data also reveals a lot about the person sitting in front of the PC. Combining data\u00a0can tell which software you have\u00a0used for how long. Where you live, what your areas of interest are, your age group, how much you spend on hardware, etc.<\/p>\n<p><a href=\"http:\/\/www.av-comparatives.org\/\" target=\"_blank\">AV-Comparatives<\/a>, a well respected security software testing organization, conducted an analysis of <a href=\"http:\/\/www.av-comparatives.org\/wp-content\/uploads\/2014\/04\/avc_datasending_2014_en.pdf\" target=\"_blank\">Data Transmission in Internet Security Products<\/a> in 2014. A quick overview of their findings:<\/p>\n<ul>\n<li>8 out of 21 antivirus submit\u00a0hardware information, and 5 didn\u2019t disclose that information.<\/li>\n<li>6 out of 21 submit\u00a0information about running programs, and 4 didn\u2019t disclose that.<\/li>\n<li>18 out of 21 submit website addresses (malicious and non-malicious).<\/li>\n<li>5 out of 21 submit \u201csuspicious\u201d non-executable files (such as documents), and 7 didn\u2019t disclose that.<\/li>\n<li>6 out of 21 don\u2019t allow their users to opt-out of sending files.<\/li>\n<\/ul>\n<p>AV-Comparatives recommends reading the privacy policy and EULA of vendors carefully, so that users can make an informed decision.\u00a0They state: \u201cUsers should also\u00a0avoid being lured into using free products that require submitting personal data (data mining is a business model too, as well as the inclusion of third-party toolbars which collect information on their own).\u201d<\/p>\n<h2>Antivirus vendors\u00a0that trade user data<\/h2>\n<p><a class=\"fancybox\" href=\"http:\/\/blog.emsisoft.com\/wp-content\/uploads\/2015\/04\/9203452_s.jpg\" rel=\"fancybox\"><img loading=\"lazy\" decoding=\"async\" class=\"  wp-image-16116 alignright\" src=\"http:\/\/blog.emsisoft.com\/wp-content\/uploads\/2015\/04\/9203452_s.jpg\" alt=\"9203452_s\" width=\"282\" height=\"212\" \/><\/a>Users who run Avast\u2019s security software\u00a0should be aware that their surfing habits are tracked by a company called Jumpshot who creates statistics based on visited websites, as Avast recently\u00a0<a href=\"https:\/\/blog.avast.com\/2015\/05\/29\/avast-data-drives-new-analytics-engine\/\" target=\"_blank\">announced<\/a>.\u00a0These might be impressive and interesting statistics, but keep in mind that once data is sent to countries with different legislation, there is little control left on what really happens with all the information. Avast\u2019s installer also preserves the right to submit usage data without specifying further what that means.<\/p>\n<h2>Alternative ways to protect\u00a0that don\u2019t compromise\u00a0privacy<\/h2>\n<p>Some good news for all of you who have been told that there are no alternatives to collect data in order to keep you safe from malware: there are alternatives. They may require a bit more effort in programming and may be a little less convenient for software vendors, but they are proven to be just as efficient as\u00a0methods that impact your privacy.<\/p>\n<h3>Blocking website domains instead of website addresses<\/h3>\n<p>Instead of blocking individual website addresses, Emsisoft Anti-Malware and Emsisoft Internet Security use a locally stored blacklist with bad domain names. Most malware today is spread by hacked web servers. If\u00a0a specific server is hacked, we don\u2019t\u00a0trust any website on that server anymore until it is clean again. So we simply block access to the whole server, which\u00a0reduces the amount of data to be stored in a blacklist-file significantly, effectively allowing us to avoid cloud based scanning and do the checks locally on your computer only. Updates of that file are provided every 15 minutes. Tests confirm that this approach often beats cloud based scans.<\/p>\n<h3>Avoiding\u00a0file uploads for cloud scanning<\/h3>\n<p>Emsisoft products never upload any files to our servers without asking you first. Any scans that require information to be obtained from a server rely on a minimum amount of data. In most cases, only a MD5 hash (32 letter checksum sequence) is required to verify if a program is safe or not. User documents are never uploaded at all.<\/p>\n<h3>Minimizing meta data collection<\/h3>\n<p>AV-Comparatives confirmed in <a href=\"http:\/\/blog.emsisoft.com\/2014\/06\/17\/emsisoft-quite-possibly-the-most-privacy-conscious-anti-malware-around\/\" target=\"_blank\">their report<\/a>\u00a0that Emsisoft is one of the most privacy conscious antivirus vendors around. Our products avoid sending any information that may be used to create detailed user profiles.<\/p>\n<h2>Privacy options we provide our users<\/h2>\n<p>With the recent release of our version 10\u00a0protection product series, we are once again one step ahead of our competitors in terms of privacy. You can find all\u00a0settings that may have an impact on your privacy in a newly formed Privacy settings dialog. There you can choose whether you want to allow us to create statistics based on detected malware, or configure your participation in the <a href=\"http:\/\/www.isthisfilesafe.com\/\" target=\"_blank\">Emsisoft Anti-Malware Network<\/a>, which helps\u00a0to improve\u00a0the malware detection quality for all users. Options for disabling SSL in server communication and creating crash reports are included too.<\/p>\n<p><a class=\"fancybox\" title=\"Emsisoft Anti-Malware Privacy Settings\" href=\"http:\/\/blog.emsisoft.com\/wp-content\/uploads\/2015\/06\/150427-version-10-privacy.png\" rel=\"fancybox\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-17202\" src=\"http:\/\/blog.emsisoft.com\/wp-content\/uploads\/2015\/06\/150427-version-10-privacy-730x492.png\" alt=\"150427-version-10-privacy\" width=\"500\" height=\"337\" \/><\/a><\/p>\n<p>During installation of our software you are asked whether you are fine with sharing some of your data or not. We don\u2019t force you to participate at all and we don\u2019t even set\u00a0a default option for these things\u2014 it\u2019s totally up to you.<\/p>\n<h2>Conclusion: Privacy\u00a0doesn\u2019t need to be given up on<\/h2>\n<p>Emsisoft is the living proof that privacy doesn\u2019t need to be traded for security. There are ways to provide the same, if not a better level of protection, without harming your privacy.<\/p><\/blockquote>\n<p><span style=\"text-decoration: underline;\"><strong><a href=\"http:\/\/goo.gl\/KVh2jH\" target=\"_blank\">Read the original blog post here<\/a>.<\/strong><\/span><\/p>\n<p><span style=\"text-decoration: underline;\"><strong><a href=\"http:\/\/thundercloud.net\/emsisoft\/\" target=\"_blank\">Get Emsisoft for $10 off from Cloudeight &#8211; more details here.<\/a><\/strong><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We found the following article by Emsisoft very interesting. We&#8217;ve seen evidence that some free antivirus programs like AVG and Avast are edging dangerously close to becoming spyware and PUPs. This is extremely disturbing because the essence of security is the expectation or privacy and trust.\u00a0 We are publishing the following Emsisoft article with the permission of our\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/can-you-trust-your-antivirus-software\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1655,1433,1670,1656,1654,10],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/9691"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=9691"}],"version-history":[{"count":1,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/9691\/revisions"}],"predecessor-version":[{"id":9692,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/9691\/revisions\/9692"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=9691"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=9691"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=9691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}