Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Security Apps
Other security for Windows, Mac, Linux
Shadow Defender is dead now in 2023?
Message
<blockquote data-quote="bazang" data-source="post: 1099949" data-attributes="member: 114717"><p>The Shadow Defender creator and publisher has a long history of disappearing from support, making bug fixes, addressing other issues, etc due to health problems. In the past Tony (English name; I cannot remember his Chinese name) would stop any communications with the outside world for 3, 4, or 5 years. The, unannounced, he would return.</p><p></p><p>Some people speculated that it was due to the CCP monitoring Tony but that is not the case. He has serious health problems.</p><p></p><p>Back in 2021 I saw posts on Chinese security forums that Tony died from COVID.</p><p></p><p>[ATTACH=full]285221[/ATTACH]</p><p></p><p>[URL unfurl="true"]https://www.freefixer.com/library/publisher/Beijing%20YiChengWeiLai%20Culture-Tech%20Co.,%20Ltd./[/URL]</p><p></p><p></p><p>Bugs ≠ "security issues"</p><p></p><p>"God knows how many security issues" = speculation</p><p></p><p>BSODs are an annoyance and are no indication of a serious security problem.</p><p></p><p>Nobody ever pentested Shadow Defender for vulnerabilities, since Day 1.</p><p></p><p>All virtualization products are bypassable at some deep level such as firmware or lower - e.g. Ring 0. For a Ring 0 bypass all that is required is to find a vulnerability and exploit it. In the past Shadow Defender and other products (e.g. Deep Guard) did not protect against Ring 0 bootkits or rootkits. Then those vulnerabilities were patched. However, there is no way for virtualization products to protect against malicious firmware. Nation-states love exploitable firmware. The kind of threat actor that would be interested in getting onto Shadow Defender systems does not have either the inclination, the resources or the skills to R&D malicious firmware.</p><p></p><p>If you want the latest news then the person to speak with is @sdmod over at Wilders. He is the only person with whom the developer every maintained contact - albeit intermittently due to the health issues.</p></blockquote><p></p>
[QUOTE="bazang, post: 1099949, member: 114717"] The Shadow Defender creator and publisher has a long history of disappearing from support, making bug fixes, addressing other issues, etc due to health problems. In the past Tony (English name; I cannot remember his Chinese name) would stop any communications with the outside world for 3, 4, or 5 years. The, unannounced, he would return. Some people speculated that it was due to the CCP monitoring Tony but that is not the case. He has serious health problems. Back in 2021 I saw posts on Chinese security forums that Tony died from COVID. [ATTACH type="full" alt="1725056508829.png"]285221[/ATTACH] [URL unfurl="true"]https://www.freefixer.com/library/publisher/Beijing%20YiChengWeiLai%20Culture-Tech%20Co.,%20Ltd./[/URL] Bugs ≠ "security issues" "God knows how many security issues" = speculation BSODs are an annoyance and are no indication of a serious security problem. Nobody ever pentested Shadow Defender for vulnerabilities, since Day 1. All virtualization products are bypassable at some deep level such as firmware or lower - e.g. Ring 0. For a Ring 0 bypass all that is required is to find a vulnerability and exploit it. In the past Shadow Defender and other products (e.g. Deep Guard) did not protect against Ring 0 bootkits or rootkits. Then those vulnerabilities were patched. However, there is no way for virtualization products to protect against malicious firmware. Nation-states love exploitable firmware. The kind of threat actor that would be interested in getting onto Shadow Defender systems does not have either the inclination, the resources or the skills to R&D malicious firmware. If you want the latest news then the person to speak with is @sdmod over at Wilders. He is the only person with whom the developer every maintained contact - albeit intermittently due to the health issues. [/QUOTE]
Insert quotes…
Verification
Post reply
Top