Lots of glamour and first test - Norton detects something with IPS.
I updated my comment to reflect the software better...I don't think it is useful.Thanks for that, it does a fantastic job of ad-blocking though, no idea about what else it does? - The interface is from Windows 3, GeoBlocking does work though not sure how useful it is - Got a 30 trial so can't lose much - I too am running Norton 360- Found a thread on Wilders, has potential maybe?
View attachment 234609
Thanks I found that yesterday, the developer seems to be quite active - Thanks again
So what's your approach and what are you trying to protect against?Just noticed this forum discussion. Happy to respond to any questions you guys may have. From a high level perspective we focus on Privacy and security and rather than focus on fingerprinting like all the other tools that exist we focus on data exfiltration, so we are able to stop attacks as they happen in real time by looking at the individual packets coming from the device itself.
As someone pointed out, we have a long running discussion on Wilders that might be useful from a discussion point of view as its a quite a different a approach. You will notice that we have very few false positives as well, so while you may think it is not doing anything it is actually quite busy.
If you have specific questions I am happy to answer them.
So you are saying your software can protect against data leaks, botnets, crypto-mining and file-less malware. Your software is supposed to block an executable from being written via PowerShell?Here is a snippet of a response from Wilders:
BlackFog sits at layer 3 of the Network stack and watches all outbound traffic and watches for anomalies in behavior, this includes data leaking to known C&C servers, crypto mining sites etc. We look at how protocols are formed, what it is sending, how and where to determine if it is legitimate and block accordingly. We have about 12 different parameters (many more under development) that are used to determine legitimacy of the traffic. In addition we monitor executable location to prevent files being dropped on your machine. As pointed out this is very complex to do and it is done in real time.
We designed this to be no intrusive and minimize false positives.
We have a lot of blog articles that talk about each aspect in a lot more detail if you are interested. I would point you to the following as a starting point:
All About Data Exfiltration