Care to elaborate what happened? Did your system or files get compromised?
@RSE9 :
if you are a little aware about cyber military defense from a kind of expression of liberty that was describe above,
understand that, is not about being compromised directly, user 89910,
it's about to have the possibility for somebody like me (a alerted consumer with responsibilities) to communicate with another lambda consumer on the world wide web, from sharing some information to my known insecure collaborators who are using any third party security software they do not the same work as i do daily, as a watcher.
why it matter ?
for example from this security solution (that i was just saying in the beginning there is a big bug and reply to me : "that the owner don't understand what i said" ),
has inside a trust security API key from MICROSOFT to unlock the windows kernel OS (from a driver host svc) and command it without any consent of users, in total silence.
&
because we, consumers :
don't have a trusted installer control only the super administrator,
are only the owners of the license of the OS, not the OS it self,
- with a remote functionality (from silent domain names systems queries), every software like this can be used for what we call snooping,
We don't want that our communication can be snooped in any sort of queries, with the people with who we are speaking with, because we have no right to say to them, you should use this...
Even our queries are just in a database with no eyes drops officially, they are always eyes drop, this is how we make unfair business !
protocol n°1 :
*don't let somebody snoop, to make the business fair.
protocol n°2 :
*every legitimate security software need to have a secure protocol to transmit the data
inside a database with no user interaction from the backed side (duty of the developer)
and who can only be transferable from the client side (right for the client)
protocol n°3 :
*if you want to distribute your software for commercial purpose
use a root signed certificate inside all the sub-software, to distribute your software globally
consequences for the future :
"
What I’m trying to say for every one who is reading me, is that even though a system hasn’t been directly compromised, it can still be vulnerable due to the negligence of other users I communicate with. If these users don’t have the same security practices as I do, it can expose our communication to risks, even if I’m taking all the necessary steps to secure my own data. For example, if someone uses security tools that aren’t as reliable, or if there’s a vulnerability in their system, it can affect the integrity of our communication and allow malicious actors to intercept the information. It’s not just about individual protection, but also about how our collective actions regarding security can impact the privacy of everyone involved, and we all want trust in our business for legitimate interest that express our personalities, that's all"