- Local time
- 6:41 PM
- Posts
- 752
- OS
- Windows 11
Check this out:
This is a risk that would never go away. Open source or not.
This is the reason why I block apps from connecting to the internet, unless an internet connection is required for core functionality. This isn't the first time something like this has happened. There has been quite a few instances in the past where similar instances have occurred. This is not just limited to apps, but also browser extensions.
Open source and/ or free apps come with their own set of potential concerns. I don't see the motivation of the developer in offering something for free.
Broadly speaking, the following scenarios are possible:
1. Developer becomes greedy/ rogue.
2. Developer sells the product/ service to another entity that has questionable motives.
3. Man in the middle attacks.
4. The project itself had malafide intentions right from the start. First make a product popular for maximum reach, and then exploit it's fanbase.
BOTTOMLINE: Don't blindly trust a product or its makers just because it is popular. A little bit of caution always helps.
Audacity Open Source Audio Editor Has Become Spyware - SlashGear
Audacity, one of the open source world's most popular pieces of software, now includes a very invasive privacy policy.
www.slashgear.com
This is a risk that would never go away. Open source or not.
This is the reason why I block apps from connecting to the internet, unless an internet connection is required for core functionality. This isn't the first time something like this has happened. There has been quite a few instances in the past where similar instances have occurred. This is not just limited to apps, but also browser extensions.
Open source and/ or free apps come with their own set of potential concerns. I don't see the motivation of the developer in offering something for free.
Broadly speaking, the following scenarios are possible:
1. Developer becomes greedy/ rogue.
2. Developer sells the product/ service to another entity that has questionable motives.
3. Man in the middle attacks.
4. The project itself had malafide intentions right from the start. First make a product popular for maximum reach, and then exploit it's fanbase.
BOTTOMLINE: Don't blindly trust a product or its makers just because it is popular. A little bit of caution always helps.
My Computer
System One
-
- OS
- Windows 11
- Computer type
- Laptop
- Manufacturer/Model
- HP Envy dv7
- CPU
- Intel Core i7 3630QM
- Motherboard
- HP
- Memory
- 16 GB
- Graphics Card(s)
- Intel HD Graphics 4000 & Nvidia GeForce GT 635M
- Sound Card
- IDT High Definition
- Screen Resolution
- 1080p
- Hard Drives
- 1 TB Crucial MX500 on bay 1.
1 TB Seagate HDD on bay 2.
- Antivirus
- Windows Defender