Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Lenovo pre-installs PCs with HTTPS hijacking adware

    Scheduled Pinned Locked Moved Off-Topic & Non-Support Discussion
    39 Posts 11 Posters 5.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P
      phil.davis
      last edited by

      And it would be good if this class action scared other companies into removing some of the pre-installed crapware from their distributions:
      http://www.law360.com/articles/623675/lenovo-hit-with-class-suit-over-pcs-preloaded-spyware

      Maybe it is time to get serious about jumping from the Windows ship?

      As the Greek philosopher Isosceles used to say, "There are 3 sides to every triangle."
      If I helped you, then help someone else - buy someone a gift from the INF catalog http://secure.inf.org/gifts/usd/

      1 Reply Last reply Reply Quote 0
      • K
        kejianshi
        last edited by

        I would have expected that you would already have jumped ship for the most part.

        You seem like such a smart guy.

        1 Reply Last reply Reply Quote 0
        • M
          mikeisfly
          last edited by

          @phil.davis:

          Maybe it is time to get serious about jumping from the Windows ship?

          Yeah because you can't do this in FreeBSD or Linux? Why would you blame Microsoft for a Lenovo issue? Seems like the Chinese have learned something from us, greed!

          1 Reply Last reply Reply Quote 0
          • K
            kejianshi
            last edited by

            I think Microsoft is a known offender by now.  Too many complicated holes for it to be an accident.

            1 Reply Last reply Reply Quote 0
            • S
              Supermule Banned
              last edited by

              So is Google, Linkedin, Facebook and all the other almost free shot on the interwebs….

              Get off, live your life and give a fuck!

              1 Reply Last reply Reply Quote 0
              • M
                mikeisfly
                last edited by

                The real problem is the CA trust model, when we live in a world where you can trust no one. But then you have to trust someone other wise you might as well live on a deserted Island.

                1 Reply Last reply Reply Quote 0
                • K
                  kejianshi
                  last edited by

                  I can agree with that - It is an issue.

                  1 Reply Last reply Reply Quote 0
                  • D
                    doktornotor Banned
                    last edited by

                    @mikeisfly:

                    But then you have to trust someone other wise you might as well live on a deserted Island.

                    I'd rather trust myself than funding the CAs bullshit business.

                    1 Reply Last reply Reply Quote 0
                    • K
                      kejianshi
                      last edited by

                      Same here

                      1 Reply Last reply Reply Quote 0
                      • D
                        doktornotor Banned
                        last edited by

                        Superfish replaced with McAfee.

                        ;D ;D ;D ;D ;D

                        P.S. How To Uninstall McAfee Antivirus - featuring John McAfee himself

                        1 Reply Last reply Reply Quote 0
                        • K
                          kejianshi
                          last edited by

                          Which is worse…  McAfee or viruses....  Damn its a tough call...

                          1 Reply Last reply Reply Quote 0
                          • ?
                            Guest
                            last edited by

                            I think this article has a good view of the problem.
                            http://www.computerworld.com/article/2894233/web-browsers-are-also-to-blame-for-lenovos-superfish-fiasco.html

                            1 Reply Last reply Reply Quote 0
                            • D
                              doktornotor Banned
                              last edited by

                              @Phishfry:

                              I think this article has a good view of the problem.
                              http://www.computerworld.com/article/2894233/web-browsers-are-also-to-blame-for-lenovos-superfish-fiasco.html

                              Nah. The browsers need to implement TLSA/DANE. Noone will ponder which CA is supposed to sign which certificate for whom; the server owner should tell the client behind the scenes. The average Joe does not understand the details and does not care.  CAs should provide enhanced validation and that's it. This BS about "oh baaad boy, you are using self-signed certificate/your own CA -> lets nag the shit out of anyone trying to use HTTPS with your website" needs to end.

                              1 Reply Last reply Reply Quote 0
                              • K
                                kejianshi
                                last edited by

                                Its designed to bilk people for as much money as possible…

                                1 Reply Last reply Reply Quote 0
                                • ?
                                  Guest
                                  last edited by

                                  He makes good points about how differently certs look across the different browser landscapes, I thought. He didn't have to use the Nerd word so many times.

                                  edit:fixed typo

                                  1 Reply Last reply Reply Quote 0
                                  • D
                                    doktornotor Banned
                                    last edited by

                                    The BFU's understanding: Green lock == good. Anything else == bad. Cannot see this ever changing. (Frankly, when calling to some banks' helplines, I often have hard time getting someone on phone who knows what certificate fingerprint is. :()

                                    1 Reply Last reply Reply Quote 0
                                    • K
                                      kejianshi
                                      last edited by

                                      The military and government here also uses self signed certs…  Its actually the way to go.

                                      1 Reply Last reply Reply Quote 0
                                      • ?
                                        Guest
                                        last edited by

                                        I  never realized why my browser complained on first hookup to fresh pfsenses install. Then i learned about the CA tab. But only recently because i followed an openvpn setup guide. I had no idea what it was for. Maybe if you said- it is like Microsoft wallet -I would go ahaa. Now i am self signed.

                                        1 Reply Last reply Reply Quote 0
                                        • K
                                          kejianshi
                                          last edited by

                                          Certs are a racket and the most a browser should say about certs its that "the website you are visiting isn't covered by your list of trusted roots".

                                          Thats all it should say.  The bullshit "You aren't safe here!  Be afraid!  Run away!" messages are just stupid.

                                          1 Reply Last reply Reply Quote 0
                                          • H
                                            Harvy66
                                            last edited by

                                            @doktornotor:

                                            @Phishfry:

                                            I think this article has a good view of the problem.
                                            http://www.computerworld.com/article/2894233/web-browsers-are-also-to-blame-for-lenovos-superfish-fiasco.html

                                            Nah. The browsers need to implement TLSA/DANE. Noone will ponder which CA is supposed to sign which certificate for whom; the server owner should tell the client behind the scenes. The average Joe does not understand the details and does not care.  CAs should provide enhanced validation and that's it. This BS about "oh baaad boy, you are using self-signed certificate/your own CA -> lets nag the shit out of anyone trying to use HTTPS with your website" needs to end.

                                            DNSSEC has the same issue as HTTPS when it comes to validation when your cert store has been compromised. Not having the notion of a "CA" makes certs nearly useless except that you know it's the same cert, but you have no way of knowing how much to trust the cert. A web of trust CA that can "route around problems" would be ideal, but it needs to be turn-key simple for the average user.

                                            Without a CA, all a cert can say is "I am me", but you're still left wondering who "me" is. With a CA, there's at least a bit more of hurdle to falsifying who "me" is, or at least pretending to be someone else where someone else is popular, like Google.

                                            With the whole HTTPS everywhere and certs are free movement, we need a better way to indicate to the user what class of cert the remote device has. Is it a free anonymous cert or a well vetted high class cert that requires proper identification from the CA, like your real name, a home address, proof of residence, a copy of your license, etc.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.