Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

How has Absolute ensured that other malware authors won't be able to piggyback off their system?

Can my malware add a hosts file entry and cause this data to be sent to my servers instead? Could I replace the Absolute software with a botnet node and still use their nigh-irremovable persistence mechanism?

Selling laptops with a pre-installed surveillance framework, however well you meant, is not acceptable. Your software's security is likely no stronger than that of the software you exploit.

Should non-technical buyers of electronic devices simply expect to be subject to malicious behavior?



This is an especially important point and should be at the top of this page. Makes me miss the karma indicators...

The problem with arbitrary surveillance isn't just that it's icky, unfair and (hopefully) illegal. It's that it is easily used by criminals.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: