Never seen it happen before, we should stay alert for impersonators.
I will inform you when I have one.Have a SHA-256?
All signed MS applications are hardcoded whitelisted in source code.I think I have found a problem in Xcitium ( not Comodo CIS ) I made a HIPS rule to forbid changes to a registry item. Tested making the rule twice from scratch and both times and it did not fire - the change went thru to the registry. First make a HIPS protected object > registry item. Then make a HIPS rule for regedit to exercise it. I am quite disappointed to see it fail, HIPS is important to my defenses. I have finished our implementation of CIS Top 18, and am trying out the RMF way : implement then assess. If it weren't for RMF's requirement to assess our controls I would not have found it.
Maybe it is due to regedit being from MS, a trusted vendor. If thats the case I couldn't use Xcitium anymore because I want to specifically deny some MS tools. I have already sourced out a similar vendor ESET, they also have HIPS and rules.
Provide clear evidence in plain English that long-standing bugs like the famous HIPS bugs have been resolved / fixed instead of generating some unreadable noise.Updated the OP to make it more useful for readers by adding:
Some important posts that contain factual evidence related to Comodo and AV exploits:
https://malwaretips.com/threads/should-comodo-users-stop-using-comodo.137607/post-1147249
https://malwaretips.com/threads/should-comodo-users-stop-using-comodo.137607/post-1145050
https://malwaretips.com/threads/should-comodo-users-stop-using-comodo.137607/post-1147260
https://malwaretips.com/threads/should-comodo-users-stop-using-comodo.137607/post-1147273
https://malwaretips.com/threads/should-comodo-users-stop-using-comodo.137607/post-1147275
https://malwaretips.com/threads/should-comodo-users-stop-using-comodo.137607/post-1144369
https://malwaretips.com/threads/should-comodo-users-stop-using-comodo.137607/post-1144520
https://malwaretips.com/threads/should-comodo-users-stop-using-comodo.137607/post-1144539
https://malwaretips.com/threads/should-comodo-users-stop-using-comodo.137607/post-1144679
https://malwaretips.com/threads/should-comodo-users-stop-using-comodo.137607/post-1144760
https://malwaretips.com/threads/should-comodo-users-stop-using-comodo.137607/post-1144836
Most critical posts in the thread were done by: @bazang, @Divergent, and @Pico.
Post corrected
Provide clear evidence in plain English that long-standing bugs like the famous HIPS bugs have been resolved / fixed instead of generating some unreadable noise.
@Andy Ful
By framing the discussion this way you cast certain users in a negative light while preserving plausible deniability.
I believe some meaning is being lost in translation here. The way you conduct yourself leaves room for plausible deniability.There is no deniability. I did not deny Pico's claims about the HIPs bug. His request is as strange as the request to find the HASH for the Comodo bypass. I think that such strange requests are the reason for prolonging this debate.
@Andy Ful
Your language makes it appear that those who disagree are the source of the problem, essentially, conform or be exposed.
You said the debate felt long and frustrating, though it was largely prolonged by your own contributions.
Who exactly appointed you to dictate what others can or cannot discuss in this forum? Were you elected? Posts highlighting unresolved CVEs and usability issues are not opinions, they are verifiable facts. Open-source research makes this information publicly accessible.Yes, if the source of the problem comes from extreme opinions. People who insist on extreme opinions should have strong evidence for that. If not, they are exposed or should agree to disagree.
Who exactly appointed you to dictate what others can or cannot discuss in this forum? Were you elected? Posts highlighting unresolved CVEs and usability issues are not opinions, they are verifiable facts. Open-source research makes this information publicly accessible.
These posts are not one-sided, you’ve also contributed to keeping the thread going, though you seem unwilling to acknowledge that. It appears that having the last word matters more to you than whether your point is actually correct.Such posts will always keep this thread alive. We already talked about CVEs and some usability issues. Yes, there is some evidence for that. Your opinions are there, and you have the right to think so.
The problem arises when you try to convince CIS users that they are doing wrong when using CIS 2025. You do not have sufficient arguments for that. For me, Comodo is unimportant. I would do the same in the case of another AV that I know well, because I tested it and exploited it.
Alice: For CIS users, CIS 2025 is probably a better solution than popular home AVs.
Bob: For Comodo critics, popular AVs are a better solution than CIS.
We can easily settle the dispute on the following statement:
It is hardly possible to prove that Alice or Bob is wrong.
The longer this thread is, the more true the above statement.
Exactly.All signed MS applications are hardcoded whitelisted in source code.
Try with HIPS set to "Paranoid mode" I think HIPS will than show a regedit Alert.
These bugs will never - EVER - be fixed because they require a source code re-write.long-standing bugs like the famous HIPS bugs have been resolved / fixed
But this is one of the fundamental reasons that the internet became so rapidly adopted by the hoomans. Everybody has a "voice" and they have to have their say. The more logic and decorum that is used and enforced, the less popular the platform becomes - and people leave. People want the flamewars and drama.rather about insisting on extreme opinions that cannot be proved.