What’s Related?” Everything But Your Privacy. Facts regarding the operation of Pharmatrak’s service are iden. Interhack provided forensic analysis to plaintiffs’ counsel in the Pharmatrak privacy litigation. Its system works much like the Coremetrics system Interhack analyzed in 2000, with two critical differences. 3 INTERHACK PROPRIETARY: PUBLIC/5/5 2.2 Pharmatrak Pharmatrak was a company that provided a Web site tracking and reporting service to pharmaceutical companies. 2It should be observed that these systems might or might not ultimately be considered “spyware” by a legal definition this is a technical, not a legal white paper. Detailed analysis and discussion is available in the Interhack Research Technical Report, “PCFriendly Enables DVD Backchannels”.
Note that in our second option-using the InterActual Player-only meant using newer software designed to give the user a greater number of options for protecting privacy-default behavior was still invasive. Privacy problems with Web-based content provided by the DVD producers (as opposed to InterActual Technologies) will not be addressed in this case, making this solution incomplete. By using systems that are not vulnerable to the kinds of attacks that spyware-particularly the nasty variety not discussed here-one will gain a measure of protection the vulnerabilities in ActiveX, for example, that enable such problems are simply not present in othe. 4.1 Host-Based Solutions The host-based solution will provide several valuable options. 4 Strategies for Effective Mitigation There are two primary methods to deal with spyware: the first is to look to the host (computer that could have spyware installed) and the second is to look at the network. Those systems are designed to make media publishers able to trust your system as a playback device that is under their control 4 INTERHACK PROPRIETARY: PUBLIC/5/5 these can actually break your security policy. Note that when we talk about trust in this context, we’re not using the same term that is used by some computer manufacturers now, in particular the Trusted Computing Group alliance and related efforts that have been known by such names as NGSCB, Longhorn, and Pallidum.
components- software-is being subverted to allow the spyware provider to observe the user’s behavior surreptitiously.