The slide only lists known AVs as potential targets… I guess it may be better to be on that list than to be missing (to be missing could imply there’s no need to target those, as they have already been dealt with) ;D
Anyway, I don’t see any need for “hacking” here (in the network sense)… if you want to check if a particular antivirus detects a specific virus or not, you can just install the product and scan your file. If you want to find out how it works, you can install it and spend a lot of time on reverse engineering the code; there’s no way to prevent that. Getting undetected virus samples? Come on, you crawl the web or monitor some mail servers and you’ll have plenty of them (plus, there’s sample exchange going on between antivirus companies, and law enforcement may be included, so you really don’t have to hack them all if you want the samples).
Of course I can’t rule out security issues in our, or any other product - that’s why we have the bug bounty program.
Through this general message here: http://www.badphorm.co.uk/
you can read and understand how the general situation has worsened by a great extent
over the years under the guise of “Upholding Imperial Security”.
In these respects the user position on the Interwebs has been totally and utterly eroded
and brought back to a postion of a sort of “click-cattle” exclusively there to bring in greater revenue
and being monitored to stay within the bounderies set out for them.
What you are referring to are just smoke-screens to lead away
from the right interpretation of the overall situation,
contrary to privacy and security as sides of the same medal.
polonus
P.S. A more practical tip is to use a good ad-blocker and a decent script blocker - like uBlock Origin (with particular susbscriptions) and uMatrix or NoScript and RequestPolicy extensions in Firefox.
Here an example of a destination that I certainly would block also in the light of what was reported in this thread:
uMatrix has prevented the following page from loading:
htxp://a.oix.net/services/invite?eorig=FgB4AcsoKSmw0tfPTczM0atMzMjP10vOz9UHAFvrB-Y.&tok=33Ezjb-8voik9V1LOgvdSQAB And then I would click to Go back!
Just 4 days ago Google found up a critical hole in the shadow stack of ESET AV.
This touches all the ESET Anti-Virus Products. If a Google researcher can find this, a NSA re-engineer might have stumbled upon such a weakness earlier. In that case they sat on it and did not share the security implications with the world. This is just one example of how software could have been flawed to make monitoring an easier task. So privacy in a sense is non-existent as things might look cosy, hug and snug on the front-end, but one does not know what parties have access to data you might not want to share.
The decryption is done only locally, and every computer uses a different MitM certificate, randomly generated.
So to read that decrypted data, you need to have access to the computer, on quite a low level - and if that’s the case, it doesn’t matter if the traffic is decrypted or not (it is decrypted anyway a fraction of a second later, in the requesting program, with or without Avast).
Thank you, igor, for explaining and setting our minds at ease on this one.
Avast, much better secured than for instance Bitdender is for some of their services.
After Lenovo’s Superfish debacle more and more users question security,
but Avast does not have such a flaw.