Question Why does Trend Micro send telemetry to data mining firms?

Status
Not open for further replies.

Slyguy

Level 44
Thread author
Verified
Jan 27, 2017
3,318
If the CIA want's in, any AV won't really do anything to help you, and might actually increase your threat surface.

That's just the way it is. Sure, there are ways to keep the CIA out, or to make things effectively impossible for them barring local L1 physical intrusion, but for all practicality, even discussing AV's and the CIA is relatively pointless conversation IMO.

I think you failed to understand that article you posted. No offense intended. That was a vault-7 dump showing CIA talking about the 'difficulty' of various security products. In the EXTREMELY unlikely event you become a direct target for intrusion, magical security products, expensive UTM's, and placebo products won't do much to help you. That's where raw network security knowledge will be required to save you. Get those vlans out, fire up the SIEM, and point all of your traffic through an APT appliance. Barring that? Ditch Windows and enjoy your Debian/Linux box...
 

Pelocha

Level 1
Verified
Apr 4, 2017
27
I'm not worried about the CIA, after all they work for us. Am I wrong? We pay them with our taxes and elect their bosses by democratic vote.

What really worries me is that a private company gets my money in an opaque way.
If so, I'd rather infect myself with Wannacry than keep trusting them.
We pay these companies to defend ourselves against unscrupulous people.

It's going to be worse the remedy than the disease.
 
  • Like
Reactions: SumTingWong

Pelocha

Level 1
Verified
Apr 4, 2017
27
Change it, Trend Micro is doing business with CIA with this ones :
  • Comodo
  • Avast
  • F-Secure
  • Zemana Antilogger
  • Zone Alarm
  • Symantec
  • Rising
  • Panda Security
  • Norton
  • Malwarebytes Anti-Malware
  • EMET (Enhanced Mitigation Experience Toolkit)
  • Microsoft Security Essentials
  • McAfee
  • Kaspersky
  • GDATA
  • ESET
  • ClamAV
  • Bitdefender
  • Avira
  • AVG
My advice use Emsisoft, good privacy , good protection, good bb
From your list, at least AVAST, AVG and Panda, sell your information to third parties, for example browsing habits and who knows what else.
I don't say it, they say it in their privacy policy.
Gdata blocked my license after a couple of clean Windows installations. Support says he can't help me. Very good product but discarded with this licensing policy.
I use Trendmicro after many years of trial and error with other products. It is the only one that meets all the requirements that I expect from an antivirus. (I just wish they had a real firewall)

I've tried several times Emsisoft and I don't like it.
The behavior blocker seems very primitive but effective.
This makes it useless with non-advanced users.
Any company is able to put on the market something similar. A good behavior blocker, it blocks only harmful actions and has no false positives.
SONAR, GDATA, Trendmicro are an example to follow.
The rest of the product without decent firewall and Bitdefender's definitions seem like a joke to me.
 

HarborFront

Level 66
Verified
Top Poster
Content Creator
Oct 9, 2016
5,563
From your list, at least AVAST, AVG and Panda, sell your information to third parties, for example browsing habits and who knows what else.
I don't say it, they say it in their privacy policy.
Gdata blocked my license after a couple of clean Windows installations. Support says he can't help me. Very good product but discarded with this licensing policy.
I use Trendmicro after many years of trial and error with other products. It is the only one that meets all the requirements that I expect from an antivirus. (I just wish they had a real firewall)

I've tried several times Emsisoft and I don't like it.
The behavior blocker seems very primitive but effective.
This makes it useless with non-advanced users.
Any company is able to put on the market something similar. A good behavior blocker, it blocks only harmful actions and has no false positives.
SONAR, GDATA, Trendmicro are an example to follow.
The rest of the product without decent firewall and Bitdefender's definitions seem like a joke to me.
So, Gdata is also a joke to you since it uses BD engine too?
 
  • Like
Reactions: Weebarra

Pelocha

Level 1
Verified
Apr 4, 2017
27
So, Gdata is also a joke to you since it uses BD engine too?
The only part of an antivirus is not its definitions. Remember that Gdata uses its own definitions in addition to Bitdefender.

I have not expressed well to what degree the definitions of Bitdefender seem bad. English is not my native language. But compared to Kaspersky are nothing of any other world. Also those of Norton or Trendmicro seem better to me. The problem is that Emsisoft uses a very primitive behavior blocker, without firewall and mediocre definitions accompanying all this with constant questions that the program should be able to answer without my help.

The signatures of an antivirus, except those created in a dynamic way by machine learning, are the least important part. The companies share the definitions and in a couple of days they all detect the same.
 
Last edited:

HarborFront

Level 66
Verified
Top Poster
Content Creator
Oct 9, 2016
5,563
The only part of an antivirus is not its definitions. Remember that Gdata uses its own definitions in addition to Bitdefender.

I have not expressed well to what degree the definitions of Bitdefender seem bad. English is not my native language. But compared to Kaspersky are nothing of any other world. Also those of Norton or Trendmicro seem better to me. The problem is that Emsisoft uses a very primitive behavior blocker, without firewall and mediocre definitions accompanying all this with constant questions that the program should be able to answer without my help.

In Gdata, Gdata engine/definitions vs BD engine/definitions which is better? If BD engine/definitions is better than Gdata must be a joke, right?

I know you can choose which engine to use in Gdata, however, if Gdata uses its own engine/definitions only would it be a great AV?
 
  • Like
Reactions: Weebarra

Pelocha

Level 1
Verified
Apr 4, 2017
27
In Gdata, Gdata engine/definitions vs BD engine/definitions which is better? If BD engine/definitions is better than Gdata must be a joke, right?

I know you can choose which engine to use in Gdata, however, if Gdata uses its own engine/definitions only would it be a great AV?
To not overlap signatures, Gdata removes from its definitions what Bitdefender is adding to theirs.
 

Pelocha

Level 1
Verified
Apr 4, 2017
27
In Gdata, Gdata engine/definitions vs BD engine/definitions which is better? If BD engine/definitions is better than Gdata must be a joke, right?

I know you can choose which engine to use in Gdata, however, if Gdata uses its own engine/definitions only would it be a great AV?
I think you know better than I do. I don't know where this conversation is going.
I just wanted to know if Trendmicro is selling my browsing habits or my privacy in general.
 
  • Like
Reactions: Weebarra
D

Deleted Member 3a5v73x

Gdata blocked my license after a couple of clean Windows installations. Support says he can't help me. Very good product but discarded with this licensing policy.
Because it was still bound to old PC, you didn't uninstall G Data before doing "clean win instalation", or you used it too many times, in that case, support does answer and help reseting it, my lic also got blocked but what I did was, register trial, update program/modules and enter old credentials and it worked without need to contact support.
FAQ: License questions

Multi-user licenses
You can use multi-user licenses to operate the G DATA software on the licensed number of computers. You will receive online access data
after installation on the first computer and running the Internet update. When you install your software on the next computer, just enter
the user name and password you were given when registering on the G DATA UpdateServer. Repeat this procedure on every other
computer.
Please use the access data (user name and password) assigned to you when you first registered for Internet updates for all PCs. Please
proceed as follows:
1 Start the G DATA Software.
2 Go to the SecurityCenter and click on Update virus signatures.
3 In the window that now opens, please enter the access data that was sent to you by email. If you then click on OK, your computer
will be licensed.

Licence renewal
A few days before your licence expires, an information window appears in the task bar. If you click this, a dialogue window opens in
which you can extend your licence easily in a few steps. Just click on the Buy now button, complete your data and your virus protection
will be guaranteed again immediately. You will then receive the invoice in the next few days via email as a PDF.
Note: This dialog only appears at the end of the first year. Thereafter your G DATA license will be automatically extended every
year. You can cancel this extension service at any time without giving reasons.

Changing computers
You can use your existing access data to use your G DATA product on a new or different computer. Just install the software and enter the
access data. The update server will set up a connection to the new computer in this case. If your G DATA software is still on your old
computer, the license must be transferred from the old computer to the new one.
Note: The number of licence transfers is limited – when the limit is reached the licence is completely blocked, so that no more
updates of any kind can be downloaded.
 

Mahesh Sudula

Level 17
Verified
Top Poster
Well-known
Sep 3, 2017
831
To not overlap signatures, Gdata removes from its definitions what Bitdefender is adding to theirs.
G data doesn't remove its definitions even though there is an overlap from Bit defender as well. This is done in emsisoft to reduce Cpu burden . In other words Dual engines in G data does their job independently and update signatures accordingly irrespective of its detection engine.To say further all these signatures (Engine B) are automatically processed 24/7 on VM ray machine that's completely virtualised and connected to G data (Microsoft Azure Cloud) ..hand by hand Analysts does their job as well.So its impossible to remove its own signatures before / after Bit defender detects it. You can confirm the same in Mt hub tests as well as Web blocking.
Information above is according to my tests as well as confirmation of my findings from Ralf Benzumler (Head -G DATA Security Labs).

No (Software) / AV is perfect in terms of privacy and sniffing.. though a few are better. If u want to be free from sniffing and data collection :
just remove ethernet cables and disconnect wifi and switch off your laptop :D
 
  • Like
Reactions: amico81

Mahesh Sudula

Level 17
Verified
Top Poster
Well-known
Sep 3, 2017
831
The only part of an antivirus is not its definitions. Remember that Gdata uses its own definitions in addition to Bitdefender.

I have not expressed well to what degree the definitions of Bitdefender seem bad. English is not my native language. But compared to Kaspersky are nothing of any other world. Also those of Norton or Trendmicro seem better to me. The problem is that Emsisoft uses a very primitive behavior blocker, without firewall and mediocre definitions accompanying all this with constant questions that the program should be able to answer without my help.

The signatures of an antivirus, except those created in a dynamic way by machine learning, are the least important part. The companies share the definitions and in a couple of days they all detect the same.
Each AV company share the samples itself ith other vendors before it reach the analysts or they have a common source like VIRUSTOTAL which is checked by all AV vendors multiple times a day for new hashes. Some even sit beside it 24/7 365 days a year to scan and update their Databases (BLINDLY) faster than ever (Off-topic)
So there is no independency during journey of samples but REAL INDEPENDENCY comes into scene whether they are analyzing the sample in the labs or blindly adding signatures as a proof from other TOP AV vendors:notworthy::LOL:..>95% of the vendors follow it including some highly over rated AV (s) .
 
  • Like
Reactions: Pelocha
D

Deleted Member 3a5v73x

95% of the vendors follow it including some highly over rated AV (s) .
Which AV vendors "copy" others and "blindly" add sigs without analyzing them first? Are you talking about X vendors who use e.g Bitdefender engine, and as a result F-Secure in your definition copy Emsisoft, so multiple vendors in VT shows up with same Bitdefender signature? Not really sure what you are saying. :D
 
Last edited by a moderator:
  • Like
Reactions: Weebarra

Mahesh Sudula

Level 17
Verified
Top Poster
Well-known
Sep 3, 2017
831
Which AV vendors "copy" others and "blindly" add sigs without analyzing them first? Are you talking about X vendors who use e.g Bitdefender engine, and as a result F-Secure in your definition copy Emsisoft, so multiple vendors in VT shows up with same Bitdefender signature? Not really sure what you are saying. :D
VirusTotal, a service owned by Google that allows anyone to upload suspicious files, aggregates data and shares information with security firms. The service aims to help internet hygiene by flagging up instances where security vendors have not yet detected particular malware samples.
To answer..its not about Bit defender..or its dependent Vendors (F secure , Emsisoft or G data ..)-- Have their own technologies beside 3rd party
VIRUS TOTAL -- Dr web tested rivals and results are same .
Viral virus bunfight: Dr Web tested rivals like Kaspersky Lab
The point is not Dr Web/ Kaspersky..but moscow vendor long ago before even kaspersky said that 95% of the vendors scan on the hashes and update DB with same FP'S as well..and walked out from VIRUS BULLETIN stating this(y)(y):)
Proof: One prominent AV vendor (in MT) in my test detected DR.WEB website as a PHISHING website for 3 months.
reason is they simply copied from the Live feed Phishing list and blindly updated to their DB:confused:
When i shared the details in MT..it was removed right away..Do you think it is a FALSE POSITIVE and leave it:rolleyes:
That how now the business is.. PITY
 
  • Like
Reactions: Syafiq

Pelocha

Level 1
Verified
Apr 4, 2017
27
G data doesn't remove its definitions even though there is an overlap from Bit defender as well. This is done in emsisoft to reduce Cpu burden . In other words Dual engines in G data does their job independently and update signatures accordingly irrespective of its detection engine.To say further all these signatures (Engine B) are automatically processed 24/7 on VM ray machine that's completely virtualised and connected to G data (Microsoft Azure Cloud) ..hand by hand Analysts does their job as well.So its impossible to remove its own signatures before / after Bit defender detects it. You can confirm the same in Mt hub tests as well as Web blocking.
Information above is according to my tests as well as confirmation of my findings from Ralf Benzumler (Head -G DATA Security Labs).

No (Software) / AV is perfect in terms of privacy and sniffing.. though a few are better. If u want to be free from sniffing and data collection :
just remove ethernet cables and disconnect wifi and switch off your laptop :D
Captura.JPG
 

Pelocha

Level 1
Verified
Apr 4, 2017
27
It is dedicated to paper work.. 90% of the G data static detections would be same in combo with 2 engines..
Have a look at its tests in MT or Youtube.
It may be so. But back to the question of whether Gdata is a joke because they use the definitions of Bitdefender, I still say no. Gdata has other powerful modules that are more important than the signatures. What's more, the signatures of all antivirus are a joke if they are not accompanied by other modules. We have all seen real Malware not detected for weeks in VirusTotal by almost any antivirus signature and this is easily blocked by the pro active modules of several companies.
 

Mahesh Sudula

Level 17
Verified
Top Poster
Well-known
Sep 3, 2017
831
It may be so. But back to the question of whether Gdata is a joke because they use the definitions of Bitdefender, I still say no. Gdata has other powerful modules that are more important than the signatures. What's more, the signatures of all antivirus are a joke if they are not accompanied by other modules. We have all seen real Malware not detected for weeks in VirusTotal by almost any antivirus signature and this is easily blocked by the pro active modules of several companies.
Q is not about G data or F secure about how blind the av vendors working on..
Regarding G data - OFF TOPIC
Myself a G DATA user for 6 yrs:cool::love:
 
  • Like
Reactions: Pelocha
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top