- Dec 12, 2016
- 1,969
I agreeActually, you don't need any data for false positives, just rank security vendors by popularity as the most popular ones tend to get very few FPs. But if you want data, take a look at already made tests by AV-Test and AV-Comparatives to determine "FP-free" security vendors. Both companies regularly test antivirus software and their web protection for false positives.
If you ask me, the three-level protection would function like this.
Easy: (almost no FPs)
Medium (security providers from easy +): (few FPs)
- Microsoft SmartScreen
- Bitdefender Traffic Light
- Emsisoft Web Protection
- Quad9 Security DNS
Hard: all security vendors (large number FPs)
- Symantec Browser Protection
- Norton SafeWeb
- GDATA WebProtection
- Cloudflare Security DNS
- CleanBrowsing Security DNS
- AdGuard Security DNS
False positives shouldn't be your job anyway. It's not like you're providing the protection service, you're just forwarding URLs to security vendors for analysis and showing the user result—that's it. This is the reason why I proposed those three levels of protection. Your job is only to warn users some security providers might wrongly detect safe websites and that's it. No need to scale down on security vendors; moreover, I'd add more of them.
Beside, protection levels make your extension extremely easy to use for all kinds of users. Because, currently, those security vendors mentioned in the extension don't mean anything to huge amount of people.
Btw about medium I think cloudflare is actually more like easy and I think that medium can be the default and then users can reduce or increase false positives based on their usage as a minority will need either easy or extreme settings like" high "