{"id":51,"date":"2005-12-09T08:35:00","date_gmt":"2005-12-09T15:35:00","guid":{"rendered":"http:\/\/paulgillin.com\/2005\/12\/spyware-epidemic.html"},"modified":"2005-12-09T08:35:00","modified_gmt":"2005-12-09T15:35:00","slug":"spyware-epidemic","status":"publish","type":"post","link":"https:\/\/gillin.com\/blog\/2005\/12\/spyware-epidemic\/","title":{"rendered":"Spyware epidemic"},"content":{"rendered":"<p>Check out this article, <a href=\"https:\/\/www.benedelman.org\/news\/111804-1.html\">Who Profits from Security Holes?<\/a>, by Benjamin Edelman, a Harvard Ph.D. candidate who specializes in practices and economics of spyware. As a test, he used a fresh copy of Windows XP to visit a single web page (he didn&#8217;t say which) and logged what spyware was installed on his computer. At least 16 programs were installed that he could identify and probably more than his spyware detector didn&#8217;t find. There&#8217;s a link to a screen-shot video of the experiment. It&#8217;s a pretty alarming scene.<\/p>\n<p>Edelman takes aim in particular at 180 Solutions, a spyware maker that&#8217;s been openly lobbying lately to improve the image of so called &#8220;search marketing&#8221; vendors (that&#8217;s one of many euphemisms this group uses). 180 Solutions drapes itself in the cloak of legitimacy by claiming that distributes only permission-based programs. However, Edelman finds that 180 is as bad as anyone at installing spyware without the user&#8217;s permission. This guy has done his homework.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Check out this article, Who Profits from Security Holes?, by Benjamin Edelman, a Harvard Ph.D. candidate who specializes in practices and economics of spyware. As a test, he used a fresh copy of Windows XP to visit a single web &hellip; <a href=\"https:\/\/gillin.com\/blog\/2005\/12\/spyware-epidemic\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":""},"categories":[1],"tags":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/pTy95-P","_links":{"self":[{"href":"https:\/\/gillin.com\/blog\/wp-json\/wp\/v2\/posts\/51"}],"collection":[{"href":"https:\/\/gillin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gillin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gillin.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/gillin.com\/blog\/wp-json\/wp\/v2\/comments?post=51"}],"version-history":[{"count":0,"href":"https:\/\/gillin.com\/blog\/wp-json\/wp\/v2\/posts\/51\/revisions"}],"wp:attachment":[{"href":"https:\/\/gillin.com\/blog\/wp-json\/wp\/v2\/media?parent=51"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gillin.com\/blog\/wp-json\/wp\/v2\/categories?post=51"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gillin.com\/blog\/wp-json\/wp\/v2\/tags?post=51"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}