- Apr 28, 2015
- 9,081
If You search in Google, almost every av firm has been hacked at some point : Hacker hits Symantec and accesses passwords
The point is that it isn't uncommon for famous AV companies to be targeted by malicious people.If You search in Google, almost every av firm has been hacked at some point : Hacker hits Symantec and accesses passwords
Do you happen to know if it can/does scan malicious scripts in a webpage?Read this statement on BD forum :
Bitdefender TrafficLight monitors the HTTP traffic and sends the URL links to our labs for analysis purposes. If you access a malicious website, TrafficLight will detect it and will block it.
The content of a web page is scanned (read), but TrafficLight doesn't collect passwords, phone numbers or credit card information.
Rest assured that Bitdefender monitors data only to protect your computer against malicious attacks. You can find more information about data collection in the End User License Agreement attached to this mail.
![]()
The Bitdefender Expert Community
Join the Bitdefender Expert Community to find answers, exchange ideas and connect with other cybersec savvy people!forum.bitdefender.com
This is the same case with smartscreen I believe.Btw, if you check Fabian's comment, he never really said that Trafficlight sends every url back to them in clear text. He just said they send every url. Here's the comment: Privacy Alert - Mozilla removes all Avast Firefox extensions
I myself tested back then and it was same as now. The data was being sent encrypted. Personally I'm okay with urls being sent back to them because they're not sending any personal data and not selling users data like Avast.
Btw, if you check Fabian's comment, he never really said that Trafficlight sends every url back to them in clear text. He just said they send every url. Here's the comment: Privacy Alert - Mozilla removes all Avast Firefox extensions
I myself tested back then and it was same as now. The data was being sent encrypted. Personally I'm okay with urls being sent back to them because they're not sending any personal data and not selling users data like Avast.
The fact that both BTL and Smartscreen check full urls and have some of the best results in testing may not be a coincidence.The problem with that post is that it gave me the impression (in the first moment) that the clear text could be read by anyone. Furthermore, i saw a lot of people in this forum and others considering that BTL should not be used because it was sending clear text (meaning it was not encrypted). However when i checked, i realized that it was not exactly that. So i made THIS post to make it clear to everyone. The urls are sent in clear text indeed but through encrypted connection and under a restrict privacy policy. Not so bad as Fabian made it sound.
Hmm you're right. It's nice that you created this thread. Any confusion anyone had should be clear now.The problem with that post is that it gave me the impression (in the first moment) that the clear text could be read by anyone. Furthermore, i saw a lot of people in this forum and others considering that BTL should not be used because it was sending clear text (meaning it was not encrypted). However when i checked, i realized that it was not exactly that. So i made THIS post to make it clear to everyone. The urls are sent in clear text indeed but through encrypted connection and under a restrict privacy policy. Not so bad as Fabian made it sound.
Hmm I think so.This is the same case with smartscreen I believe.
If BdTL finds malicious things on a webpage its only blocks the bad things , not the whole webpageDo you happen to know if it can/does scan malicious scripts in a webpage?
Guess it's the comparison between products that send full URLs and those don't. And if Bitdefender actually needs to send URLs.The problem with that post is that it gave me the impression (in the first moment) that the clear text could be read by anyone. Furthermore, i saw a lot of people in this forum and others considering that BTL should not be used because it was sending clear text (meaning it was not encrypted). However when i checked, i realized that it was not exactly that. So i made THIS post to make it clear to everyone. The urls are sent in clear text indeed but through encrypted connection and under a restrict privacy policy. Not so bad as Fabian made it sound.
However in our own @Evjl's Rain 's testing it seems SafeBrowsing isn't as effective as Malwarebytes Browser Guard, WD BrowserProtection, and Trafficlight.A lot of browsers have this functionality built in, including Google Chrome. And most browsers implementing these use the second form of the Safe Browsing APIs where you download hashed prefixed packs of URLs, Overview | Safe Browsing APIs (v4) | Google Developers
As a result, instead of a single hashed URL lookup, your browser will download a large pack of definitions that encompass a lot of different URLs with the same prefix, adding a bit of extra anonymity and also resulting in fewer repeat lookups if you are visiting similar sites.
However in our own @Evjl's Rain 's testing it seems SafeBrowsing isn't as effective as Malwarebytes Browser Guard, WD BrowserProtection, and Trafficlight.
According to Fabian, he considers Malwarebytes Browser Guard to be one of the privacy-concious extensions.Just for anyone wondering, looking at the headers for Malwarebytes Browser Guard they seem to send hashes instead of full urls if I am reading the content properly. They also use TLS 1.3. I'd say if you are using Bitdefender as your AV and don't want HTTPS inspection then BD Trafficlight is a good addition, they could abuse your data anyway so you must trust them to run their AV. If you don't then MBG may be the way to go.
Just for anyone wondering, looking at the headers for Malwarebytes Browser Guard they seem to send hashes instead of full urls if I am reading the content properly. They also use TLS 1.3. I'd say if you are using Bitdefender as your AV and don't want HTTPS inspection then BD Trafficlight is a good addition, they could abuse your data anyway so you must trust them to run their AV. If you don't then MBG may be the way to go.
Indeed. However we must keep attention with browsers not fully compatible with AV, like Brave. For example, it can't be protected by kaspersky antipishing protection, but it can use BTL for that.extensions at least with Chrome, FF, or Edge may be mostly redundant.
According to Fabian, he considers Malwarebytes Browser Guard to be one of the privacy-concious extensions.
That’s interesting. I turned it on for the first time in a while and it connected to the same URL several times, but under security it listed TLS 1.3. However I didn’t check all of the connections to see the security. Also, I bet if I leave it on and go back it’ll just make the one connection like you noted to update. Definitely a lot going on under the hood. It doesn’t give me many problems browsing. I just turn off the very poor ad blocking when I’m using it.I checked and despite i run some sites, MBG only connected to one url for update. It was in clear text and used TLS 1.2.
View attachment 237506
The url was:
The "Console" tab showed that it was inspecting pages and whitelisting them, probably based on its local database. However i can't confirm that. But, if i'm correct, the requested url would be a way to update the mentioned database. Maybe, if Malwarebytes acts comparing and processing your sites/files/images/scripts with a list locally, it would explain why so many people complain about its impact in performance and loading pages. If you visit a few pages and check the console tab, you'll see that it does a LOT more process than BTL
View attachment 237504
However it's not clear if the database updated by MBG contains a whole list of sites, or only the ones you visit. It seems to be the first option, cause after the update, i loaded a few pages without any further requests from MBG. Despite that, after some digging, and exploring less known pages, MBG requested some info using hashs and TLS 1.3.
There is no way i can confirm, but i would assume that MBG works locally with a database of frequently asked pages. But if you access anything that is not usual, it will request it through TLS 1.3 using hashs. That's good. Maybe someone could help me to confirm that. Maybe @Fabian Wosar
Indeed. However we must keep attention with browsers not fully compatible with AV, like Brave. For example, it can't be protected by kaspersky antipishing protection, but it can use BTL for that.
Good to know. Unfortunately, it's heavy. =[