StopBadware

StopBadware is an anti-malware nonprofit organization focused on making the Web safer through the prevention, mitigation, and remediation of badware websites. It is the successor to StopBadware.org, a project started in 2006 at the Berkman Center for Internet and Society at Harvard University. It spun off to become a standalone organization, and dropped the ".org" in its name, in January 2010.[1]

StopBadware
Founded2006
FounderJohn Palfrey, Jonathan Zittrain
Type501(c)(3)
Location
Key people
Vint Cerf, Esther Dyson
Websitestopbadware.org

People

The founders of StopBadware.org were John Palfrey, then Executive Director of the Berkman Center, and Jonathan Zittrain, then at the Oxford Internet Institute.[2] Both are now Professors of Law at Harvard University and faculty co-directors of the Berkman Center.

Board members of StopBadware include Vint Cerf (Chair), Esther Dyson, Philippe Courtot, Alex Eckelberry, Michael Barrett, Brett McDowell, Eric Davis, and Maxim Weinstein, StopBadware's former executive director.[3] John Palfrey, Ari Schwartz, John Morris, Paul Mockapetris, and Mike Shaver formerly served on the Board.

Supporters

StopBadware is funded by corporate and individual donations. Some of its current partners include Google, Mozilla, PayPal, Qualys, Verisign, Verizon, and Yandex.[4] Google, GFI Software, and NSFocus participate as data providers in the organization's Badware Website Clearinghouse (see below). Previous supporters include AOL, Lenovo, Sun Microsystems, Trend Micro, and MySpace. Consumer Reports WebWatch, a now-defunct part of Consumers Union, served as an unpaid special advisor while StopBadware.org was a project at the Berkman Center.

Activities

StopBadware's current focus is on fighting "badware by working to strengthen the entire Web ecosystem." In pursuit of this some of the organization's activities include maintaining a badware website clearinghouse, acting as an independent reviewer of blacklisted sites, website owner and user education, and a "We Stop Badware" program for Web hosts.[5] In June 2012 StopBadware launched the Ads Integrity Alliance with support from founding members AOL, Facebook, Google, the Interactive Advertising Bureau (IAB), and Twitter. The Alliance is a resource for online ad platforms seeking to protect users from deceptive or harmful ads.[6] The organization receives data from its data providers and maintains a searchable clearinghouse (Badware Website Clearinghouse) of URLs blacklisted by those data providers.[7] StopBadware's independent review process gives webmasters the option to request removal from data providers' blacklists and is intended to function as "due process" for webmasters whose sites have been listed as bad.[8][9] StopBadware maintains a community forum, BadwareBusters.org,[10] which includes an online form for reporting badware URLs encountered by the community.

StopBadware also aggregates badware statistics,[11] advocates for consumer protection in public policy, and publishes advisory documents (software guidelines,[12] best practices for web hosting providers[13]) compiled with input from the organization's working groups.[14]

Defining "badware"

Originally

StopBadware.org originally, in 2006, defined "badware" as follows:

  1. If the application acts deceptively or irreversibly.
  2. If the application engages in potentially objectionable behavior without:
    • First, prominently disclosing to the user that it will engage in such behavior, in clear and non-technical language, and
    • Then, obtaining the user's affirmative consent to that aspect of the application.[15]

The original mission was to "provide tools and information that assist industry and policymakers in meeting their responsibility to protect users from badware, and that help users protect themselves."[16] StopBadware took the position that software is badware if it does certain prohibited things, despite any disclaimer in an EULA or purported consent by the user. "Silently downloading" and "Installing additional software without informing the user of the identity and purpose of that software (bundling)" are examples of such prohibited behavior. StopBadware investigated reports of improper behavior by programs, and offered vendors the opportunity to reply to their findings.

Currently

StopBadware now focuses on web-based malware and presently defines badware as "software that fundamentally disregards a user's choice about how his or her computer or network connection will be used." This includes viruses, Trojans, rootkits, botnets, spyware, scareware, and many other types of malware. A badware website is a website that helps distribute badware, either intentionally or because it has been compromised.[17]

Google and StopBadware

There is a common misconception that StopBadware blacklists websites and that Google uses this blacklist to protect their users. In fact, Google's Safe Browsing initiative uses automated systems to identify and blacklist websites.[18] This blacklist is used by Google to warn users before they visit potentially dangerous sites. The Firefox web browser and other applications also use Google's Safe Browsing API to warn their users based on the same blacklist.

The confusion is likely due to the close relationship between Google and StopBadware. Google links to StopBadware from their interstitial warning pages.[19] The link directs users to StopBadware's educational content about badware;[20] it also points webmasters to StopBadware's independent review process so site owners can request removal from Google's blacklist.[8] StopBadware's Badware Website Clearinghouse also lists websites blacklisted by Google.

Google uses automated systems to search for websites that distribute badware, and issues warnings about websites on which malicious activity is detected.[21] When a user tries to access one of these sites, that user is redirected to an interstitial page wherein Google warns the user of the detected malicious activity.[22] Google attempts to notify site owners when blacklisting a website.[23]

gollark: IIRC some Amlogic/Rockchip ones can even use mainline Linux.
gollark: They don't have very good IO, is the problem. Random TV boxes are better and can sometimes run less horrible firmware.
gollark: Well, they might be useful if you want random small-screen devices for controlling/monitoring things.
gollark: However, the "trusted" bit of the name is a misnomer, in that it's "trusted" by arbitrary companies of some kind and not the user themselves.
gollark: It has some nice-for-users features like that you can, say, make your disk's contents unreadable if you take it out and stick it in another computer (without also having the TPM to do things to).

See also

References

  1. Miller, Mary Helen (January 28, 2010). "StopBadware Spins Off From Harvard U. to Be a Stand-Alone Nonprofit Group". The Chronicle of Higher Education. Retrieved January 13, 2011.
  2. Hines, Matthew (January 30, 2010). "StopBadware Researchers Graduate from Harvard". eWeek Security Watch. Retrieved January 13, 2011.
  3. "Board of Directors". StopBadware. Retrieved January 19, 2013.
  4. "Supporting Organizations". StopBadware. Retrieved January 19, 2013.
  5. "What We Do". StopBadware. Retrieved January 19, 2013.
  6. "Ads Integrity Alliance". StopBadware. Retrieved January 19, 2013.
  7. "Badware Website Clearinghouse". StopBadware. Retrieved January 19, 2013.
  8. Mills, Elinor (February 2, 2009). "StopBadware.org, the place to appeal a Google malware warning". CNET Security News. Retrieved January 13, 2011.
  9. "Request a Review". StopBadware. Retrieved January 19, 2013.
  10. "About". BadwareBusters.org. Archived from the original on January 1, 2011. Retrieved January 13, 2011.
  11. "AS Report – Top 50 by Number of Reported URLs". StopBadware. Retrieved January 19, 2013.
  12. "Guidelines". StopBadware. Retrieved January 19, 2013.
  13. "Web Hosting Best Practices". StopBadware. Retrieved January 19, 2013.
  14. "Working Groups". StopBadware. Archived from the original on November 28, 2010. Retrieved January 13, 2011.
  15. "Stop Badware Software Guidelines". April 7, 2006. Archived from the original on April 7, 2006.CS1 maint: unfit url (link)
  16. "Main Page". StopBadware. Retrieved January 13, 2011.
  17. "What is Badware". StopBadware. Retrieved January 19, 2013.
  18. Ballard, Lucas (October 12, 2009). "Show Me the Malware!". CNET Security News. Retrieved January 13, 2011.
  19. "What is the Google Safe Browsing Blacklist?". SerpGuard website. Retrieved January 13, 2011.
  20. "Suspicious results and strange behavior: Results labeled 'This site may harm your computer". Google Web Search Help results. Retrieved January 13, 2011.
  21. Provos, Niels; McNamee, Dean; Mavrommatis, Panayiotis; Wang, Ke; Modadugu, Nagendra (April 2007). "The Ghost in the Browser: Analysis of Web-based Malware" (PDF). Encyclopedia of Things. USENIX. Retrieved January 13, 2011.
  22. Gabe, Glenn (April 22, 2009). "Yes, You're An Attack Site That Contains Malware, Now Here's What To Do About It". Search Engine Journal. Retrieved January 13, 2011.
  23. "About malware and hacked sites". Google Webmaster Tools Help results. Retrieved January 13, 2011.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.