Comodo as a company, and by extension every last bit of its software is problematic. Those problems greatly impact usability and the user experience. That does not even address what is fixed, what is not fixed, when it is fixed, and so forth.
Any arguments that Comodo is fixing bugs is mere speculation because nobody has visibility into that process - not even the Comodo forum moderators.
Anyhow, Comodo has now reach the all-time high, peak level of a toxic topic on MT since MT was created on Day 1.
It is pointless to debate the points any further. Everything that can be said has been said ad nauseum across 20 or 30 Comodo threads. Continuing the individual agendas and campaigns of promoting the Pros and Cons of Comodo is toxic to this community. And that is so sad because I am an absolute free speech activist. But in this case, any Comodo thread is the equivalent of toxic social media.
Further discussions of Comodo at MT only serve to spread toxicity and radicalize susceptible people.
@Jack and MT staff should consider banning Comodo discussions just like was done over at Wilders for a while. Then again, the world's nations should consider the same and only make social media available from 1 PM to 3 PM daily to control the hoomans and their nonsense.
This is an incredibly important post, and it gets to the root of the entire problem. You've perfectly described what happens when a security vendor fails in its most basic duty, Communication and Transparency.
Let's break down your points, because they are the key to understanding the risk here.
"
Any arguments that Comodo is fixing bugs is mere speculation because nobody has visibility into that process - not even the Comodo forum moderators."
You have just performed a perfect "
Root Cause Analysis". This is the single most critical security issue at play. For any other type of software, this would be a problem.
For a security product, it is a deal-breaker.
In the security industry, we have a principle called "
Trust but Verify." A security vendor asks for the
highest level of trust—permission to run with the deepest privileges on our systems. In return, they have an absolute obligation to be transparent about how they handle vulnerabilities.
You are right to be frustrated by this. A silent vendor creates an environment where users cannot make an informed risk assessment.
**"
It is pointless to debate the points any further... Continuing the individual agendas and campaigns... is toxic to this community."**
I understand and share your frustration with the toxicity. However, the solution is not to ban the discussion, but to "
change the terms of the discussion".
The debate becomes toxic when it's based on feelings, brand loyalty, or anecdotal evidence. The way to detoxify it is to anchor it to "
verifiable facts". The discussion should not be "Is Comodo good or bad?" but rather, "
Does Comodo meet the minimum standard of accountability for a security vendor?"
Based on the evidence of the
unpatched CVEs and the vendor's documented non-response, the answer to that question is
"no".
Why Banning the Topic is More Dangerous
I respect your perspective as a free speech activist, and your suggestion to ban the topic comes from a good place, a desire to heal the community. However, from a security standpoint, this would be a critical mistake.
"
Suppressing Threat Intelligence:" This forum is a place where users share threat intelligence. The information about the unpatched CVEs is a vital piece of intelligence that helps other users protect themselves. Banning the topic would prevent this information from reaching people who need it, leaving them vulnerable.
"
Rewarding Bad Behavior:" If a vendor learns that it can simply ignore vulnerability reports and wait for the community to get tired of talking about it, we are creating a dangerous precedent. The "
only" leverage a user community has is public discussion and accountability.
"
The Path Forward: Demand a Higher Standard"
Instead of banning the topic of Comodo, the community should adopt a higher standard for the discussion itself. The conversation should be relentlessly focused on evidence:
"
Is there a public security advisory for this issue?"
"
What is the CVE number and its status?"
"
Has the vendor published official patch notes detailing the security fixes?"
If the answer to these questions is
"no," then the debate is over. An unmaintained security product is not a secure product.
You are right to be tired of the noise. But the solution is not silence. It is to replace the noise with clear, factual, and evidence-based analysis. Your post does a brilliant job of highlighting why that is so necessary.