• orclev@lemmy.world
        link
        fedilink
        English
        arrow-up
        24
        arrow-down
        2
        ·
        9 months ago

        Replaced it with Eset not long after that because even back then it was going downhill fast. Then I ditched Eset about a decade ago because Windows Defender had finally reached a point where it was pretty much as good as anything else.

        • floofloof@lemmy.caOP
          link
          fedilink
          English
          arrow-up
          5
          ·
          9 months ago

          At this point I suspect sticking with Windows Defender (if you have to use Windows) may be the most sensible way to reduce your attack surface. At least it’s just one company you know is already spying on you. Who knows which other antivirus companies these days are spying for profit.

      • pearsaltchocolatebar
        link
        fedilink
        English
        arrow-up
        7
        ·
        9 months ago

        No, it definitely wasn’t the only good one 15 years ago. Maybe 20-25 years, but there were good options out there. MBAM hadn’t gone to a shitty sub model yet, and G Data and Bitdefender were around.

        • fuzzyspudkiss@midwest.social
          link
          fedilink
          English
          arrow-up
          11
          ·
          9 months ago

          That’s not true, there were several free antiviruses that were considered good back then. I’d say quality free antivirus were more popular in the mid-00s to late 00s than they are now after Windows defender got usable.

  • doublejay1999@lemmy.world
    link
    fedilink
    English
    arrow-up
    49
    arrow-down
    1
    ·
    edit-2
    9 months ago

    “Data about the websites a person visits isn’t just another corporate asset open to unfettered commercial exploitation,” Fair writes.

    Fair.

    Disclosure: Condé Nast, Ars Technica’s parent company, received data from Jumpshot before its closure.

    Nice.

  • rottingleaf@lemmy.zip
    link
    fedilink
    English
    arrow-up
    18
    arrow-down
    1
    ·
    9 months ago

    And with all that the general majority speaks of FOSS as of something dubious, because these well-known companies won’t scam them.

  • AutoTL;DR@lemmings.worldB
    link
    fedilink
    English
    arrow-up
    8
    ·
    9 months ago

    This is the best summary I could come up with:


    All of that language was offered up while Avast was collecting users’ browser information from 2014 to 2020, then selling it to more than 100 other companies through a since-shuttered entity known as Jumpshot, according to the Federal Trade Commission.

    While we disagree with the FTC’s allegations and characterization of the facts, we are pleased to resolve this matter and look forward to continuing to serve our millions of customers around the world," the statement reads.

    The FTC’s complaint (PDF) notes that after Avast acquired then-antivirus competitor Jumpshot in early 2014, it rebranded the company as an analytics seller.

    For example, a sample of just 100 entries out of trillions retained by Respondents showed visits by consumers to the following pages: an academic paper on a study of symptoms of breast cancer; Sen. Elizabeth Warren’s presidential candidacy announcement; a CLE course on tax exemptions; government jobs in Fort Meade, Maryland with a salary greater than $100,000; a link (then broken) to the mid-point of a FAFSA (financial aid) application; directions on Google Maps from one location to another; a Spanish-language children’s YouTube video; a link to a French dating website, including a unique member ID; and cosplay erotica.

    In a blog post accompanying its announcement, FTC Senior Attorney Lesley Fair writes that, in addition to the dual nature of Avast’s privacy products and Jumpshot’s extensive tracking, the FTC is increasingly viewing browsing data as “highly sensitive information that demands the utmost care.”

    “Data about the websites a person visits isn’t just another corporate asset open to unfettered commercial exploitation,” Fair writes.


    The original article contains 810 words, the summary contains 261 words. Saved 68%. I’m a bot and I’m open source!