Everyone Wants to 'Own' Your PC

Started by TehBorken, May 04 06 08:51

Previous topic - Next topic

TehBorken

 When technology serves its owners, it is liberating. When it is designed to serve others, over the owner's objection, it is oppressive. There's a battle raging on your computer right now -- one that pits you against worms and viruses, Trojans, spyware, automatic update features and digital rights management technologies. It's the battle to determine who owns your computer.  You own your computer, of course. You bought it. You paid for it. But how much control do you really have over what happens on your machine? Technically you might have bought the hardware and software, but you have less control over what it's doing behind the scenes.[/p] Using the hacker sense of the term, your computer is "owned" by other people.[/p] It used to be that only malicious hackers were trying to own your computers. Whether through worms, viruses, Trojans or other means, they would try to install some kind of remote-control program onto your system. Then they'd use your computers to sniff passwords, make fraudulent bank transactions, send spam, initiate phishing attacks and so on. Estimates are that somewhere between hundreds of thousands and millions of computers are members of remotely controlled "bot" networks. Owned.[/p] Now, things are not so simple. There are all sorts of interests vying for control of your computer. There are media companies that want to control what you can do with the music and videos they sell you. There are companies that use software as a conduit to collect marketing information, deliver advertising or do whatever it is their real owners require. And there are software companies that are trying to make money by pleasing not only their customers, but other companies they ally themselves with. All these companies want to own your computer.[/p] Some examples:[/p]  [ul][li]Entertainment software: In October 2005, it emerged that [a href="http://www.wired.com/news/politics/privacy/0,69601-0.html"]Sony had distributed a rootkit[/a] with several music CDs -- the same kind of software that crackers use to own people's computers. This rootkit secretly installed itself when the music CD was played on a computer. Its purpose was to prevent people from doing things with the music that Sony didn't approve of: It was a DRM system. If the exact same piece of software had been installed secretly by a hacker, this would have been an illegal act. But Sony believed that it had legitimate reasons for wanting to own its customers' machines.  [/li][li]Antivirus: You might have expected your antivirus software to detect Sony's rootkit. After all, that's why you bought it. But initially, the security programs sold by Symantec and others did not detect it, because Sony had asked them not to. You might have thought that the software you bought was working for you, but you would have been wrong.  [/li][li]Internet services: Hotmail allows you to blacklist certain e-mail addresses, so that mail from them automatically goes into your spam trap. Have you ever tried blocking all that incessant marketing e-mail from Microsoft? You can't.  [/li][li]Application software: Internet Explorer users might have expected the program to incorporate easy-to-use cookie handling and pop-up blockers. After all, other browsers do, and users have found them useful in defending against internet annoyances. But Microsoft isn't just selling software to you; it sells internet advertising as well. It isn't in the company's best interest to offer users features that would adversely affect its business partners.[/li][li]Spyware: Spyware is nothing but someone else trying to own your computer. These programs eavesdrop on your behavior and report back to their real owners -- sometimes without your knowledge or consent -- about your behavior.  [/li][li]Internet security: It recently [a href="http://www.zdnet.com.au/news/security/soa/Vista_firewall_shackled_due_to_customer_demand_Microsoft/0,2000061744,39252954,00.htm"]came out[/a] that the firewall in Microsoft Vista will ship with half its protections turned off. Microsoft claims that large enterprise users demanded this default configuration, but that makes no sense. It's far more likely that Microsoft just doesn't want adware -- and DRM spyware -- blocked by default.  [/li][li]Update: Automatic update features are another way software companies try to own your computer. While they can be useful for improving security, they also require you to trust your software vendor not to disable your computer for nonpayment, breach of contract or other presumed infractions.[/li][/ul] Adware, software-as-a-service and Google Desktop search are all examples of some other company trying to own your computer. And [a href="http://www.schneier.com/crypto-gram-0208.html#1"]Trusted Computing[/a] will only make the problem worse.[/p] There is an inherent insecurity to technologies that try to own people's computers: They allow individuals other than the computers' legitimate owners to enforce policy on those machines. These systems invite attackers to assume the role of the third party and turn a user's device against him.[/p] Remember the Sony story: The most insecure feature in that DRM system was a cloaking mechanism that gave the rootkit control over whether you could see it executing or spot its files on your hard disk. By taking ownership away from you, it reduced your security.[/p] If left to grow, these external control systems will fundamentally change your relationship with your computer. They will make your computer much less useful by letting corporations limit what you can do with it. They will make your computer much less reliable because you will no longer have control of what is running on your machine, what it does, and how the various software components interact. At the extreme, they will transform your computer into a glorified boob tube.[/p] You can fight back against this trend by only using software that respects your boundaries. Boycott companies that don't honestly serve their customers, that don't disclose their alliances, that treat users like marketing assets. Use open-source software -- software created and owned by users, with no hidden agendas, no secret alliances and no back-room marketing deals.[/p] Just because computers were a liberating force in the past doesn't mean they will be in the future. There is enormous political and economic power behind the idea that you shouldn't truly own your computer or your software, despite having paid for it.[/p] - - -[/p]  [em]Bruce Schneier is the CTO of Counterpane Internet Security and the author of[/em] [a href="http://www.schneier.com/bf.html"]Beyond Fear: Thinking Sensibly About Security in an Uncertain World[/a]. [em]You can contact him through [a href="http://www.schneier.com/"]his website[/a].

[a href="http://www.wired.com/news/columns/0,70802-0.html?tw=rss.index"]http://www.wired.com/news/columns/0,70802-0.html?tw=rss.index[/a]
[/em]
The real trouble with reality is that there's no background music.

tenkani

Good stuff!!!

  I'm paranoid about these things. I run Zone Alarm Suite, Spybot Search & Destroy, Adaware and Protowall to keep people from owning my computer.

  I also regularly investigate my running processes and google them. It's really easy, and I've found that neuber.com usually has an entry for pretty much everything I have running.

  I also use hijack this to kick those sneaky bastards in the nuts.

  FIGHT THE POWER!
For thou art with me; thy cream and thy sugar they comfort me
Thou preparest a carafe before me in the presence of Juan Valdez
Thou anointest my day with pep; my mug runneth over
Surely richness and taste shall follow me all the days of my life
And I will dwell in the house of coffee forever.