Talk:Magic Lantern (spyware): Difference between revisions
Line 58: | Line 58: | ||
:'''Support''' per nom. I was confused, as I was aware of the camera firmware and thought this article would be about that, so the extra dab would be good. I'd also recommend a hatnote on each page. [[User:YorkshireExpat|YorkshireExpat]] ([[User talk:YorkshireExpat|talk]]) 17:35, 27 April 2024 (UTC) |
:'''Support''' per nom. I was confused, as I was aware of the camera firmware and thought this article would be about that, so the extra dab would be good. I'd also recommend a hatnote on each page. [[User:YorkshireExpat|YorkshireExpat]] ([[User talk:YorkshireExpat|talk]]) 17:35, 27 April 2024 (UTC) |
||
*'''Support alternate move''' to [[Magic Lantern (spyware)]], a more concise term for the same thing. [[User:Zxcvbnm|ᴢxᴄᴠʙɴᴍ]] ([[User talk:Zxcvbnm|ᴛ]]) 12:13, 28 April 2024 (UTC) |
Revision as of 12:13, 28 April 2024
This article is rated Stub-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||||||||||||||||||||||||||||||||||||
|
Norton taking all the blame
It is not just about your AntiVirus or firewall(s). Much of it also depends on your ISP, where you internet is routed through. They can spy monitor on you too. Actually, they have far greater power than any monitoring software on your computer; they can monitor every single bit of activity on your end.
Read this: Norton Forums Thread
A few questions:
- Wouldn't ctrl+alt+del on a windows box show the program running, and let you shut it down? If not, why not?
- Only assuming the program runs 'honestly.' It's more than likely this software would run under a rootkit, which would hide it from Windows at all. SnoopJeDi (talk) 18:40, 19 November 2007 (UTC)
- Or if the programs runs in a virtualized enviroment or manages to hook onto another program TechOutsider (talk) 14:46, 22 December 2008 (UTC)TechOutsider
- Wouldn't your firewall notify you if this program wanted to call out? (Everyone should have a firewall, IMHO, yes, even if you're on dialup; WinME 4.90.300 for instance tries to call out occasionally, regardless of what options the user sets about updating everything manually; that's the version pre-installed on my box; no, I don't know if any patches for that have been released).
- Again, only assuming this program runs traditionally, because the firewall relies on the OS. If the latter is deceived, so is the former. Any separate hardware monitoring the network (a packet sniffer between the box being logged and the internet, for example) should be able to detect this phone-home behavior. SnoopJeDi (talk) 18:40, 19 November 2007 (UTC)
- If no to both of the above, what is the program? A plugin to, say, Systray or Windows Explorer?
- Are people using linux at less risk (they tend to be "under the hood" of their computers more)?
- Linux is just as susceptible to rootkits as Windows. There is no true innate benefit to using one over the other with regards to this, but it is true that Linux users on the average tend to be more aware of their computers and would probably pick up on this more often. SnoopJeDi (talk) 18:40, 19 November 2007 (UTC)
- You want security, dump your computer. Destroy your hard drive in the process. TechOutsider (talk) 14:46, 22 December 2008 (UTC)TechOutsider
- Are people using Macs at less risk? (any way to find out if the FBI has ported the prog to macs?)
Beau regards, a good article otherwise. I know the FBI is keeping mum about it, "of course." --Koyaanis Qatsi
- Again, the only protection any operating system would gain is the separation from being a mainstream target. Linux and Mac are often toted as free of spyware, etc., but the bulk of this is because they are seen as secondary targets, not comprising the bulk of computers. SnoopJeDi (talk) 18:40, 19 November 2007 (UTC)
Ad 1+3: Only if ML ran as an application. There are other ways. What about replacing the keyboard driver with a custom version?
- That is what many keyloggers do nowadays. TechOutsider (talk) 14:46, 22 December 2008 (UTC)TechOutsider
Ad 2: With admin rights, there are ways around these, too. Note that latest worms (e.g. "Goner") try to disable personal firewalls and virus scanners.
- Correct TechOutsider (talk) 14:46, 22 December 2008 (UTC)TechOutsider
As to whether Linux or Mac (or BeOS or FooOS) users are at less risk: Obscurity of an operating system, hardware platform, or mail program may save you, but MacOS is not nearly scarce enough that the FBI won't bother to write a version for it.
- Any OS is susceptible; if a FBI target is using Linux then they WILL design ML to work with Linux TechOutsider (talk) 14:46, 22 December 2008 (UTC)TechOutsider
As with all viruses/worms/security threats good practices may prevent problems. Linux was one of the first "home" OSs encouraging the use of a not-all-powerful account for things like reading mail — but newer Windowsii and MacOS X followed suit. Compromising an account and trojanising at least some of the tasks done from an account is certainly possible; but without admin rights modifications can be much less stealthy.
- I always use the "Guest" account on my Windows XP Computer and use the Run As command to elevate the priv. of certain programs, such as when installing software. TechOutsider (talk) 14:46, 22 December 2008 (UTC)TechOutsider
The lack of all-out virus vectors on Unix has also done its bit. --Robbe
Why remove the paragraph on the "badtrans" virus? --KQ 02:10 Sep 27, 2002 (UTC) __________________________________
Is there a list of these anti-virus companies that DO succumb to being ignoranuses about the FBI scanners and overlook them during their own scans?
SOPHOS is just one that DOES look for these types of apps, are there others?
Revelations 04:58, 8 February 2006 (UTC)
Fedware
I saw an interesting term coined by ZD-net [1] called Fedware. I wonder if it would be useful to run with this term to describe software written by the US-federal government. The concern is that Fedware may be excluded from spyware scanners. --Joewski 07:53, 18 July 2007 (UTC)
Requested move 27 April 2024
It has been proposed in this section that Magic Lantern (spyware) be renamed and moved to Magic Lantern (keylogging software). A bot will list this discussion on the requested moves current discussions subpage within an hour of this tag being placed. The discussion may be closed 7 days after being opened, if consensus has been reached (see the closing instructions). Please base arguments on article title policy, and keep discussion succinct and civil. Please use {{subst:requested move}} . Do not use {{requested move/dated}} directly. |
Magic Lantern (software) → Magic Lantern (keylogging software) – Magic Lantern (firmware) is also software. * Pppery * it has begun... 17:13, 27 April 2024 (UTC)
- Support per nom. I was confused, as I was aware of the camera firmware and thought this article would be about that, so the extra dab would be good. I'd also recommend a hatnote on each page. YorkshireExpat (talk) 17:35, 27 April 2024 (UTC)
- Support alternate move to Magic Lantern (spyware), a more concise term for the same thing. ᴢxᴄᴠʙɴᴍ (ᴛ) 12:13, 28 April 2024 (UTC)
- Stub-Class Computing articles
- Unknown-importance Computing articles
- Stub-Class software articles
- Unknown-importance software articles
- Stub-Class software articles of Unknown-importance
- All Software articles
- Automatically assessed Computing articles
- All Computing articles
- Stub-Class Computer Security articles
- Unknown-importance Computer Security articles
- Stub-Class Computer Security articles of Unknown-importance
- All Computer Security articles
- Stub-Class United States articles
- Low-importance United States articles
- Stub-Class United States articles of Low-importance
- Stub-Class FBI articles
- Mid-importance FBI articles
- WikiProject FBI articles
- WikiProject United States articles
- Requested moves with protected titles
- Requested moves