I dont know a lot about this subject but - I am trying out ESET Smart Security version 9 which includes the nod32 product (antimalware/virus) and I received an error regarding the addition of a new ESET root certificate in all of my browsers. I am running Windows 10. Upon some basic research it seems that in order to monitor and protect the user from malicious SSL TLS connections, a root certificate is added for ESET. I believe this allows ESET to act as a "middle man" between the connections allowing the software to inspect the web traffic for further action. I'm guessing that this is related to the "internet security" aspects of the software bundle and probably is not included in the base "Nod32" option.
My questions and thoughts are around -
- Is this common for modern day antivirus to inject its own root cert to preform MiTM?
- ESET forums seem to indicate that I can disable this feature and remove the root cert as long as I accept the loss of protection. Would this be wise?
- Is it accurate to say that since this root certificate exists, they (ESET) can see all of my web traffic in an UNencrypted format?
- In order to obtain a state of security, does this now require that one abdicates some of their privacy?
- Should I disable the feature or look for another product?
** related thread by another user: Kaspersky Antivirus "secure connection scan" as broken as Superfish?
** Since posting this question, I've contacted ESET and "complained" about the root certificate and asked for some clarification. Their only suggestions was to disable the feature in the settings and to remove the root certificate. For what it's worth, this seems to remove the majority of the functionality for the "network security" function of their products.