Talk:Magic Lantern (spyware): Difference between revisions

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
Content deleted Content added
Closing requested move; moved using rmCloser
Tag: Reverted
m Reverted edits by SafariScribe (talk) to last version by YorkshireExpat
Tags: Rollback Mobile edit Mobile web edit Advanced mobile edit
Line 4: Line 4:
{{WikiProject United States|importance=low|FBI=yes|FBI-importance=Mid}}
{{WikiProject United States|importance=low|FBI=yes|FBI-importance=Mid}}
}}
}}

{{old move|date=27 April 2024|from=Magic Lantern (software)|destination=Magic Lantern (spyware)|result=moved|link=Special:Permalink/1221505117#Requested move 27 April 2024}}


== Norton taking all the blame ==
== Norton taking all the blame ==
Line 55: Line 53:
== Requested move 27 April 2024 ==
== Requested move 27 April 2024 ==


{{requested move/dated|Magic Lantern (keylogging software)|protected=Magic Lantern (software)}}
<div class="boilerplate mw-archivedtalk" style="background-color: #efe; margin: 0; padding: 0 10px 0 10px; border: 1px dotted #aaa;"><!-- Template:RM top -->
:''The following is a closed discussion of a [[Wikipedia:Requested moves|requested move]]. <span style="color:red">'''Please do not modify it.'''</span> Subsequent comments should be made in a new section on the talk page. Editors desiring to contest the closing decision should consider a [[Wikipedia:move review|move review]] after discussing it on the closer's talk page. No further edits should be made to this discussion.''

The result of the move request was: '''moved.''' Consensus met! <small>([[Wikipedia:Requested moves/Closing instructions#Non-admin closure|non-admin closure]])</small> <span style="font-family:Papyrus; color:#800080;">[[User:SafariScribe|Safari Scribe]]</span><sup style="font-family: Times New Roman; color: #006400;">[[Special:Contributions/SafariScribe|'''''Edits!''''']] [[User talk:SafariScribe|'''''Talk!''''']]</sup> 10:01, 30 April 2024 (UTC)
----


[[:Magic Lantern (software)]] → {{no redirect|Magic Lantern (spyware)}} – [[Magic Lantern (firmware)]] is also software. [[User:Pppery|* Pppery *]] [[User talk:Pppery|<sub style="color:#800000">it has begun...</sub>]] 17:13, 27 April 2024 (UTC)
[[:Magic Lantern (software)]] → {{no redirect|Magic Lantern (keylogging software)}} – [[Magic Lantern (firmware)]] is also software. [[User:Pppery|* Pppery *]] [[User talk:Pppery|<sub style="color:#800000">it has begun...</sub>]] 17:13, 27 April 2024 (UTC)


:'''Support''' per nom. I was confused, as I was aware of the camera firmware and thought this article would be about that, so the extra dab would be good. I'd also recommend a hatnote on each page. [[User:YorkshireExpat|YorkshireExpat]] ([[User talk:YorkshireExpat|talk]]) 17:35, 27 April 2024 (UTC)
:'''Support''' per nom. I was confused, as I was aware of the camera firmware and thought this article would be about that, so the extra dab would be good. I'd also recommend a hatnote on each page. [[User:YorkshireExpat|YorkshireExpat]] ([[User talk:YorkshireExpat|talk]]) 17:35, 27 April 2024 (UTC)
Line 67: Line 61:
*: Fine with me. [[User:Pppery|* Pppery *]] [[User talk:Pppery|<sub style="color:#800000">it has begun...</sub>]] 15:27, 28 April 2024 (UTC)
*: Fine with me. [[User:Pppery|* Pppery *]] [[User talk:Pppery|<sub style="color:#800000">it has begun...</sub>]] 15:27, 28 April 2024 (UTC)
*::And me. [[User:YorkshireExpat|YorkshireExpat]] ([[User talk:YorkshireExpat|talk]]) 16:55, 28 April 2024 (UTC)
*::And me. [[User:YorkshireExpat|YorkshireExpat]] ([[User talk:YorkshireExpat|talk]]) 16:55, 28 April 2024 (UTC)
<div style="padding-left: 1.6em; font-style: italic; border-top: 1px solid #a2a9b1; margin: 0.5em 0; padding-top: 0.5em">The discussion above is closed. <b style="color: #FF0000;">Please do not modify it.</b> Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.</div><!-- from [[Template:Archive bottom]] -->
</div><div style="clear:both;" class=></div>

Revision as of 10:04, 30 April 2024

Norton taking all the blame

It is not just about your AntiVirus or firewall(s). Much of it also depends on your ISP, where you internet is routed through. They can spy monitor on you too. Actually, they have far greater power than any monitoring software on your computer; they can monitor every single bit of activity on your end.

Read this: Norton Forums Thread

A few questions:

  1. Wouldn't ctrl+alt+del on a windows box show the program running, and let you shut it down? If not, why not?
Only assuming the program runs 'honestly.' It's more than likely this software would run under a rootkit, which would hide it from Windows at all. SnoopJeDi (talk) 18:40, 19 November 2007 (UTC)[reply]
Or if the programs runs in a virtualized enviroment or manages to hook onto another program TechOutsider (talk) 14:46, 22 December 2008 (UTC)TechOutsider[reply]
  1. Wouldn't your firewall notify you if this program wanted to call out? (Everyone should have a firewall, IMHO, yes, even if you're on dialup; WinME 4.90.300 for instance tries to call out occasionally, regardless of what options the user sets about updating everything manually; that's the version pre-installed on my box; no, I don't know if any patches for that have been released).
Again, only assuming this program runs traditionally, because the firewall relies on the OS. If the latter is deceived, so is the former. Any separate hardware monitoring the network (a packet sniffer between the box being logged and the internet, for example) should be able to detect this phone-home behavior. SnoopJeDi (talk) 18:40, 19 November 2007 (UTC)[reply]
  1. If no to both of the above, what is the program? A plugin to, say, Systray or Windows Explorer?
  2. Are people using linux at less risk (they tend to be "under the hood" of their computers more)?
Linux is just as susceptible to rootkits as Windows. There is no true innate benefit to using one over the other with regards to this, but it is true that Linux users on the average tend to be more aware of their computers and would probably pick up on this more often. SnoopJeDi (talk) 18:40, 19 November 2007 (UTC)[reply]
You want security, dump your computer. Destroy your hard drive in the process. TechOutsider (talk) 14:46, 22 December 2008 (UTC)TechOutsider[reply]
  1. Are people using Macs at less risk? (any way to find out if the FBI has ported the prog to macs?)

Beau regards, a good article otherwise. I know the FBI is keeping mum about it, "of course." --Koyaanis Qatsi

Again, the only protection any operating system would gain is the separation from being a mainstream target. Linux and Mac are often toted as free of spyware, etc., but the bulk of this is because they are seen as secondary targets, not comprising the bulk of computers. SnoopJeDi (talk) 18:40, 19 November 2007 (UTC)[reply]

Ad 1+3: Only if ML ran as an application. There are other ways. What about replacing the keyboard driver with a custom version?

That is what many keyloggers do nowadays. TechOutsider (talk) 14:46, 22 December 2008 (UTC)TechOutsider[reply]

Ad 2: With admin rights, there are ways around these, too. Note that latest worms (e.g. "Goner") try to disable personal firewalls and virus scanners.

Correct TechOutsider (talk) 14:46, 22 December 2008 (UTC)TechOutsider[reply]

As to whether Linux or Mac (or BeOS or FooOS) users are at less risk: Obscurity of an operating system, hardware platform, or mail program may save you, but MacOS is not nearly scarce enough that the FBI won't bother to write a version for it.

Any OS is susceptible; if a FBI target is using Linux then they WILL design ML to work with Linux TechOutsider (talk) 14:46, 22 December 2008 (UTC)TechOutsider[reply]

As with all viruses/worms/security threats good practices may prevent problems. Linux was one of the first "home" OSs encouraging the use of a not-all-powerful account for things like reading mail — but newer Windowsii and MacOS X followed suit. Compromising an account and trojanising at least some of the tasks done from an account is certainly possible; but without admin rights modifications can be much less stealthy.

I always use the "Guest" account on my Windows XP Computer and use the Run As command to elevate the priv. of certain programs, such as when installing software. TechOutsider (talk) 14:46, 22 December 2008 (UTC)TechOutsider[reply]

The lack of all-out virus vectors on Unix has also done its bit. --Robbe


Why remove the paragraph on the "badtrans" virus? --KQ 02:10 Sep 27, 2002 (UTC) __________________________________

Is there a list of these anti-virus companies that DO succumb to being ignoranuses about the FBI scanners and overlook them during their own scans?

SOPHOS is just one that DOES look for these types of apps, are there others?

Revelations 04:58, 8 February 2006 (UTC)[reply]

Fedware

I saw an interesting term coined by ZD-net [1] called Fedware. I wonder if it would be useful to run with this term to describe software written by the US-federal government. The concern is that Fedware may be excluded from spyware scanners. --Joewski 07:53, 18 July 2007 (UTC)[reply]

Requested move 27 April 2024

Magic Lantern (software)Magic Lantern (keylogging software)Magic Lantern (firmware) is also software. * Pppery * it has begun... 17:13, 27 April 2024 (UTC)[reply]

Support per nom. I was confused, as I was aware of the camera firmware and thought this article would be about that, so the extra dab would be good. I'd also recommend a hatnote on each page. YorkshireExpat (talk) 17:35, 27 April 2024 (UTC)[reply]