TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask HN: Any Lenovo engineers here part of Superfish fame?

70 pointsby skantabout 10 years ago
You can post with a throw-away account.<p>How did the decision to include Superfish materialize and what was the behind the scenes drama while this was added to the build?

6 comments

jeswinabout 10 years ago
Lenovo&#x27;s apology is the perfect example of a non-apology; they are pretending that the outrage is about an inadvertent software vulnerability and not about MITMing&#x2F;snooping on their customers.<p>From the CTO&#x27;s &quot;Open Letter&quot;: <a href="http://news.lenovo.com/article_display.cfm?article_id=1932" rel="nofollow">http:&#x2F;&#x2F;news.lenovo.com&#x2F;article_display.cfm?article_id=1932</a><p>&quot;This software frustrated some users without adding value to the experience so we were in the process of removing it from our preloads. Then, we saw published reports about a security vulnerability created by this software and have taken immediate action to remove it. Clearly this issue has caused concern among our customers, partners and those who care about Lenovo, our industry and technology in general. For this, I would like to again apologize.&quot;<p>I&#x27;d rate this as the worst consumer betrayal I have ever seen. If people did this kind of thing, they&#x27;d be in prison.
评论 #9113544 未加载
MrZipfabout 10 years ago
In a big company, this will have had <i>nothing</i> to do with engineers as they are not employed to do business deals.<p>A business specialist will have made a deal with Superfish in the name of the company. In all likelihood they won&#x27;t have an understanding exactly how Superfish works, but they are drawn to the revenue opportunity. They&#x27;ll have put a request in to the imaging team and then it&#x27;s job done.<p>They&#x27;ll be team at Lenovo now reviewing how they got into this mess and trying to ensure it does not repeat in future.
评论 #9111627 未加载
Avitasabout 10 years ago
I&#x27;m not, but I&#x27;ll grab the hook for a few seconds.<p>This is going to boil down to Lenovo getting $0.90, $2.00, some other amount per system or a one time payment. It could also be for a specific quantity of desktop&#x2F;laptop systems, sysems shipped after a specific date or within a specific time frame. There could also be a geographical component to this. There may also be other details to the financial arrangement, targetting demographics and systems affected.<p>I would guess that this did not get installed on server or workstation products, but I wouldn&#x27;t be all that surprised if the latter were.<p>I wonder how much Lenovo received and how the payments were structured.
fabulistabout 10 years ago
I think responding to this question would threaten their job security (and, as MrZipf said, the were probably not involved.)
nonubyabout 10 years ago
Following the chain, &quot;Any superfish engineers here? Do you think you could of mitigated a large amount of this PR hell (not that it makes it okay) by generating a random root-cert per install, and refusing to accept it on the WAN side of the proxy?&quot; (I guess like AV software does). What was the motive for 1 static cert?
interdriftabout 10 years ago
You don&#x27;t need to be a Lenovo engineer to tell it&#x27;s because of money and they knew it all from the start.