Jump to content

sendkeys

Members
  • Posts

    2
  • Joined

  • Last visited

Everything posted by sendkeys

  1. Sure, it would cost you some time to log traffic and then decrypt it all, but if there's anything which is easy to do on computers these days, it's parsing log-files using easily adaptable scripts. You might want to look into the following story to get an idea on how easy things of such nature are: http://www.securityfocus.com/infocus/1814 If uTorrent would store stuff for a month and then send it only once, you can still see it storing to and reading from disk, even if the position on disk is uncommon and unnoticeable. This is also not hard to detect, decrypt or reveal. What do you think bugtraq or similar groups are doing 24/7 ? Remember what happened to SONY when their rootkit CDs got revealed. Do you think Ludde aspires risking his reputation like that? ;-) Yes you could find if something is spyware but again it's not as easy as you make it sound. Watching logs setting up private networks just to monitor a program isn't something all but a couple people might do. Again if the system was setup so it was only "call-in/backdoor" so bots could use mininova type searches it would be very hard other then checking the code.Even if they found something as long as the system was setup to change no one would even trust you. Let just say utorrent added in spyware.(NOT SAYING IT WILL) It's main goal would be to get as much information as it can for as long as it can. Not stay around for the next 10 years. People doing this know sooner or later they will be black listed. But you just come up with new program couple weeks later. Or have your other programs in the works. How many p2p programs have you seen come around then gone the next week over the last couple years? Nothing new. As for Ludde hurting his own name... Maybe I'm just a bad person but if someone gave me say half-million bucks to sell utorrent I would. It's not making hem any money. Food ,school, family ect comes before a lot of people I don't really know.. What they do with the software after I'm gone, is none of my business. Again so I don't get flamed I'm not anti-utorrent I will keep using the program until the time I see not too or something better comes along. Thankyou everyone for the hard work
  2. If you do this for a living then you should know it would be very hard it is to tell. Im NOT saying utorrent does this but calling home one time a month using a list of 12 ip's, only when connecting to a torrent using the same torrent ports making it look like any other torrent Then calling the data a hash error so you can't even count the packats in. ver out. How would you know? or more risky, calling home every time after the call home it receives a new ip to call next time. or calling home only after a peer connects to you sending you ip to connect to. I main heck you can't just look at a packet and see a log of "where you been and who you connected to". Just make it look like any other torrent packet.Add on extra data encoded in a real packet.Heck with encryption don't even hide it , Just a couple ways off the top of my head. To make it very very hard but yes not impossible to check.It's not like other companies that are so stupid to call home as soon as you open the program. Someone really smart could come up with something really good. So anyone here want to setup a ring of computers block all data going in and out of them monitor all connections over a months time to see if it calls home? Heck not even talking about "calling in" now that would be impossible to check watching packets. Only checking the code could tell you that. No matter what im still using utorrent as i have more trust for it then any adobe/norton/ms ect software *edit* p.s i really don't use this forum so i will not be able to reply.
×
×
  • Create New...