TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Windows SSL Interception Gone Wild

263 pointsby mkjonesover 10 years ago

12 comments

jgwestover 10 years ago
I think it&#x27;s interesting that this BADWARE install was found more or less accidentally... apparently by some tech dude noticing that his bank login presented a Silverfish-issued CA cert.<p>Shouldn&#x27;t the possiblity have been forseen and addressed beforehand?<p>Perhaps by...<p>(1) Anti-virus &#x2F; anti-malware makers. Does this software not notify the user when strange CA certs are put into a system&#x27;s root certificate storage? I understand that certain businesses do this for traffic monitoring... so it might be legit... but still, no user notification?<p>(2) Microsoft. Do their license terms really allow OEMs to install MiTM proxies and screw around with the root certs? Microsoft could do a good thing here by disallowing this sort of malfeasance... or is there some problem I&#x27;m not seeing with such an action?<p>If this were done in, say, OS X (unrealistic, of course), it would be found out and the whole tech world would know about it in a jiffy. John Siracusa would be howling at the Internet moon within a couple of hours...
评论 #9085098 未加载
评论 #9084693 未加载
评论 #9084582 未加载
评论 #9084660 未加载
ademarreover 10 years ago
Is it just me, or is the Superfish fiasco being covered disproportionately against the other big security story this week, the NSA&#x2F;GCHQ SIM heist?<p><a href="https://news.ycombinator.com/item?id=9076351" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=9076351</a>
评论 #9084559 未加载
评论 #9084956 未加载
评论 #9084507 未加载
lognover 10 years ago
Browser plugins can read SSL pages no problem. So why did Superfish not just present itself like a browser plugin? Then it&#x27;s just normal bloatware and probably pulls in the same profit. Some people might uninstall it is the only reason I can think why they didn&#x27;t go this route. They could have pre-bundled Chrome and FF to avoid having users ok the plugin installation.
评论 #9084690 未加载
评论 #9084596 未加载
评论 #9085727 未加载
nissehulthover 10 years ago
&quot;We&#x27;ve observed more than a dozen other software applications using the Komodia library&quot; is the scary part.
评论 #9085268 未加载
评论 #9085092 未加载
reedlodenover 10 years ago
Ah, so this is why Facebook tries to load Flash on almost every page... Allows them to gather data like this. Always wondered why Flash was &quot;needed&quot;.<p>(another reason to put Flash behind click-to-play and&#x2F;or push for HTML5 video)
评论 #9084367 未加载
评论 #9084385 未加载
评论 #9084497 未加载
wslhover 10 years ago
But this problem is not only about CA certs. If the application sits in the same computer it can intercept the SSL libs used in the application (wininet for IE, and the Firefox and Chrome used libs) to watch and modify SSL connections.<p>This can be done without any proxy or certificate installation.
robbinttover 10 years ago
I recently bought one of these and didn&#x27;t even boot it into windows before ripping out the drive and tossing in a linux installation on my SSD. Never been more grateful to be technologically competent. Also, I am wiping that drive.
评论 #9085054 未加载
评论 #9085735 未加载
robbinttover 10 years ago
Holy shit, I bought a lenovo Z50-70, ripped out my drive, and put in a linux drive. I&#x27;ve never been happier to have some semblance of control over these things.
评论 #9085392 未加载
aosmithover 10 years ago
And this is why I run linux...
评论 #9084562 未加载
larvaetronover 10 years ago
&gt; Superfish uses a third party library from a company named Komodia to modify the Windows networking stack<p>This is the second article I&#x27;ve read that states this - Superfish does no such thing.
评论 #9084345 未加载
评论 #9084402 未加载
评论 #9084338 未加载
评论 #9084341 未加载
ams6110over 10 years ago
<i>we see several reasons to be concerned about this practice in the case of Superfish and others. Chief among those is privacy—the Superfish software can see all of the computer user&#x27;s activity, including banking, email and Facebook traffic.</i><p>Never mind that Facebook sees all the computer user&#x27;s Facebook traffic, and cross-indexes it with every other bit of data gleaned from their vast graph and uses it for profit.
评论 #9084527 未加载
nuggetover 10 years ago
Just to be clear, Facebook and Google hate any software that allows users to modify content within their walled gardens (whether that&#x27;s an adblock, ad injector, or other). These companies want a totally controllable user experience in order to maximize their own user metrics and monetization.<p>My fear is that these companies will use this Superfish debacle to attack and restrict the ability for users to download legitimate software which leverages these technologies. As users and developers, we want to retain this ability.<p>Adware sucks, and there are dozens of anti-virus companies who should be all over anyone who tries to pull this crap. The problem here is not with MITM, SSL packet inspection or modification. The problem here is that Lenovo allowed themselves to be turned into a distribution channel for a poorly implemented, spammy piece of adware for a few extra pennies.
评论 #9084350 未加载
评论 #9084950 未加载
评论 #9084309 未加载
评论 #9084373 未加载
评论 #9085099 未加载