Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Software Bug

The Pure Software Act of 2006 261

lurker412 writes "The MIT Technology Review features a proposal by Simson Garfinkel to provide honest labels on software in the same way that the Pure Food and Drug Act of 1906 forced manufacturers of foods and drugs to divulge the contents of their products. The proposal targets adware, spyware and other unsavory practices. It suggests that by requiring software manufacturers to include clear icons for each nasty behavior--rather than hide the disclosures in seldom read or understood click-through SLAs--end users will be better protected. Garfinkel specifically lists eight types of sneaky behavior, but the list is not meant to be exhaustive."
This discussion has been archived. No new comments can be posted.

The Pure Software Act of 2006

Comments Filter:
  • The 'Evil' Bit (Score:5, Interesting)

    by plover ( 150551 ) * on Friday April 09, 2004 @03:56PM (#8819273) Homepage Journal
    I can hear the software vendors right now. "Oh, sure, I'm going to label my software as 'pop-up', that'll bring in the customers, oh, yeah!" More likely, they'll fight it on the grounds of anyone who ever made or makes use of the Yes/No dialog box -- "That's a pop-up, too, make them label their software." Totally meaningless.

    Anyway, did anyone else read this and think immediately of the Evil Bit? The whole thing has got to be a joke, right?

  • Re:Erm... (Score:2, Interesting)

    by RiotXIX ( 230569 ) on Friday April 09, 2004 @04:03PM (#8819372) Journal
    maybe have icons on the installation screen next to the giant terms of Agreement document?
  • by maiden_taiwan ( 516943 ) * on Friday April 09, 2004 @04:08PM (#8819458)
    Software vendors will have no incentive to put negative labels on their products; even if it's the law, they'll find some loopholes to avoid the labels. Instead, they would have more incentive to use labels that are positive. Instead of making a vendors say, "Yes, I use spyware," it makes more sense to award well-behaved programs a positive seal of approval which means, "This software uses no spyware, is uninstallable, etc."
  • by tspilman ( 135105 ) <tom@pingz.com> on Friday April 09, 2004 @04:12PM (#8819496) Homepage
    Are the makers of porn dialers, trojans, email relays and viruses going to put a helpful icon on their software? No.

    Of course not, but the makers of legitimately well behaved products will. You look at two food cans... one has a label with ingredients and such and the other one doesn't. Which one will you eat?

    This to work would require one or more bodies like the ESRB to test products, assign the correct labeling, and go after abusers.
  • NO! (Score:5, Interesting)

    by ThisIsFred ( 705426 ) on Friday April 09, 2004 @04:18PM (#8819553) Journal
    No thanks. I have more trust for "disinterested" third parties that verify and publish on their own. A more helpful law would be one that protects the researchers (even amateur ones) from harassment (legal or otherwise). It's a slippery slope, it will not end with labeling.

    I *don't* want that to happen with software! I'd much rather retain the right, as fair use, to legally modify crap-ware, and also have the right to discuss the details of that modification with other people.
  • by brxndxn ( 461473 ) on Friday April 09, 2004 @04:25PM (#8819635)
    Ya, I use Windows XP. Even though I have a firewall and keep my patches up to date, I still get adware/spyware once in a while.

    I would get 0 adware/spyware if Microsoft wrote a little bit of security into their operating system in a few ways:

    - Record log of installed files (prompt for any files being installed in non-specified directlories.. ie: If realplayer trys to install realisawesome.dll in C:\windows\system32, WINDOWS itself prompts me.)

    - Prompt for any programs trying to start up with the computer

    - Have only one method for a program starting up with a pretty little 'startup' icon in the control panel

    - Disable IE's install on demand by default (probby most common method for spyware)

    - Allow users to disable popups without a fucking extra program (fuck developers and their incessant popups - MS gives way too much control to them and none to the end user)

    - Have Windows control the uninstall and not some crappy script written by the same company that wrote the crappy software that user wants to uninstall cause' it was crappy

    - Allow the user to enable plugins only when desired (disable flash advertisements and stuff)

    - Quit allowing programs to install a shortcut in startup, the quicklaunch bar, the desktop, every goddamn folder on the computer, favorites, and quit launching a secondary program just to launch a button that launches the main program!!!

    This is how you could fix things in Windows.. Linux is pre-fixed.

    So, you Linux nerds, why the hell aren't we trashing Microsoft in this thread? They're fixing 'security', but not the type of shit Mr. Stupid Enduser cares about.

  • More evil bits .... (Score:5, Interesting)

    by Frater 219 ( 1455 ) on Friday April 09, 2004 @04:44PM (#8819881) Journal
    It ain't a joke. Honest software makers will indeed likely support it, since it allows them to make clear how their software differs from crapware. I'd go for a few more labels, though, intended to illustrate the intent of the software, so you get what you are paying for.
    • A portcullis. This software filters or alters the content of files or incoming Internet traffic. Web pages you see, for instance, might not represent the exact transmissions of the Web server or the intent of the author. Appropriate to anti-virus software, porn-filtering censorware, privacy software [privoxy.org] ... and adware that replaces ad banners with other ad banners.
    • A police badge. This software runs by default under elevated or superuser ("root" or "Administrator") privilege. (Simply requiring superuser privilege to install the software doesn't count. Creating a dummy user with most of the privileges of the superuser does, though.) Therefore a bug in this software, including a security vulnerability, can affect anything on your computer -- not just the files owned by the user actively using it.
    • A cable plugged into a wall socket. This software accepts incoming network connections in the default configuration. If you do not intend this software to accept traffic from the Internet, you will need to change the configuration or have a firewall.
    • A computer with an arrow through the monitor. This software is designed to be remotely disabled by the publisher under certain circumstances (such as breach of license or expiration of subscription). The fact that it is installed and working today does not imply that it will continue to work without future intervention.
    • A closed mouth with a finger making the "shush" gesture. This software's license forbids or encumbers the publication of reviews without the permission of the publisher. Reviews you may have read of this software may have been selected by the publisher to represent it in an unfairly positive light.
    • A pair of handcuffs. Documents or other files you produce using this software are encumbered by its license, patents, or other proprietary rights of the publisher. Appropriate for a word processor whose file format is patented, or a compiler whose license forbids you to use it to write software that competes with the publisher's other software.
  • by Minna Kirai ( 624281 ) on Friday April 09, 2004 @04:45PM (#8819896)
    Like many people, Garkfinkel is proposing a legislative solution to something that'd be better handled technically.

    (Legislative solutions are suboptimal/dangerous for many reasons. They are over-broad, in that they apply even to consenting adults who wish to engage in the behavior without meddlesome government oversight; cf prostitution. And they're too-narrow, in that they can by necessity only apply within the country's legal jurisdiction, whereas software distribution is an international operation)

    Turn now to the second page the Pure Software [technologyreview.com] proposal. The list of potential warning-labels it suggests is: Hook, Dial, Modify, Monitor, Popup, Remote Control, Self-Updates, and Stuck.

    All of those things are basically technical features which a well-designed operating system could prohibit programs from using, without permission. The root of the problem is that even after 30+ years of software publication, most programs are still just completely arbitrary lists of instructions: once they're executing, they do whatever they do, and nothing can stop them.

    The big exception there is that most OSes, at least, restrict programs on a per-user basis. A program cannot read or edit files to which the executing user has no permission. That's an important step, but one that Unix has had firmly in place since the 80s. As time passes, we need to go further: program priviledges should be restricted not just at the per-user level, but also at finer granularity.

    When I download and install a program, I don't want just the option of "run it or don't". I should be able to run it, but without it being able to read any files except those it came with. Or being allowed to read files, but only if I pick them from a system-supplied dialog box. Or read any files, but not write to them, except in a directory I've chosen (and that it can't override). Or write files, but only in specific approved formats (such as those which can't possibly contain executable code). Similar kinds of restrictions suggest themselves for GUI and network areas (including the important points of "phone home" and "data tainting")

    To a small extent, Java frameworks (like "Web Start") have attempted to do this, with a list of features the user can individually permit a program to execute. Microsoft .Net also makes overtures in this direction. It will be a challenge for OS vendors to allow users to have this amount of control, without overwhelming them with so many choices they'll give up and just give full permissions to everythig (in the pattern of "I always run as administrator, because it's the only way to get stuff done"). But those challenges can be surmounted with skilled interface design.

    The best way to prevent software from doing something is to use software that prevents it from doing it. (As Lawrence Lessig said, the best and most effective laws for code are more code [amazon.com])
  • by Lord Kano ( 13027 ) on Friday April 09, 2004 @04:56PM (#8820045) Homepage Journal
    the Pure Food and Drug Act of 1906 forced manufacturers of foods and drugs to divulge the contents of their products.

    What's to stop someone from saying "This product may contain one or more of the following; ad-ware, spy-ware, automatic updates, and a chance to win $1,000,000"

    That last item would be enough to entice most people to buy it anyway.

    LK
  • by RockyMountain ( 12635 ) on Friday April 09, 2004 @05:21PM (#8820373) Homepage
    I like the idea in principle, but see plenty of problems in it's practical impelementation.

    As described, the proposed law would hard-code the concept of using icons to disclose this information. What about fundamentally non-graphical programs (drivers, daemons)? What about overall non-graphical environments (servers, embedded)?

    I fear this scheme would further what is already an increasing problem: that everybody wants to attach a GUI to every program, even if it's totally inappropriate (e.g. printer drivers). The proliferation of spurious GUI interfaces leads to the proliferation of inappropriate design choices in exception reporting (pop-ups instead of log files), configuration methods, etc.

    I'm not anti-GUI, by the way. I'm anti-inappropriate-GUI, and I fear hard-coding icon requirements into every piece of software makes this trend even worse. Immagine if every .deb or .rpm package in your Linux system had a spurious GUI component, just to comply with a well-intentioned but poorly-considered law!

    On the other hand, I would definitely like to see these icons displayed on the labels of software packages and disks, or on the web pages that software is downloaded from.

    Oh, and something the article didn't mention, but I'd propose this ammendment to the act: Make it hard to add any additional icons (i.e. to make the program behavior worse) in upgrades. If any icons are added, the vendor must either (1) continue to support the old version for future bug fixes, security patches, etc., or (2) refund the purchase price to buyers who choose not to continue using the product. (Obviously, there'd have to be a time limit, but long enough to prevent the use of "incrimental-spyware" as a bait-and-switch technique.)
  • Re:The 'Evil' Bit (Score:2, Interesting)

    by Poison_kitty ( 670218 ) on Friday April 09, 2004 @06:59PM (#8821288)
    It suggests that by requiring software manufacturers to include clear icons for each nasty behavior

    Surely though, things like winrar that add funtionality to menus and suchlike would also give grounds for labeling under the "changes operating system" catagory? My point being that not all of the things each catagory describes are harmful to you or your computer, and such vague descriptions as these labels carry could mislead joe-public as to the program's intent.
    Another point being, how would each program be labeled if it could only be downloaded from say, an ftp, where there were no visual descriptions outside of the program itself?

    On another note though, I think this could work to everybody's advantage IF such creases were ironed out.

  • Re:The 'Evil' Bit (Score:3, Interesting)

    by fredmosby ( 545378 ) on Friday April 09, 2004 @07:53PM (#8821653)
    Wouldn't that mean that most open source software wouldn't get verified?
  • Re:No... (Score:4, Interesting)

    by ThisIsFred ( 705426 ) on Saturday April 10, 2004 @11:01AM (#8824589) Journal
    Lets say Netscape was THE browser to have. Do you think anyone would be bothering to write IE exploits?

    Your argument is based on the premise that IE and Netscape are the same in terms of design. Netscape/Mozilla can't be "hijacked" in the same manner because it doesn't use Windows' registry classes to determine what to do with a downloaded file, and it isn't integrated with the Explorer shell. A Netscape browser window instance can't be silently started (without a "head"), and a new filetype can't be opened without the user knowing, or taking action. Likewise, Sun Java and Javascript is limited to things done inside the browser, it doesn't have access to the rest of the operating system.

    But disabling IE is not the answer. I predict within a few weeks of you doing this you are undoing it for some higher ranking manager. Then his buddy will find out, and so on. Soon you are supporting not 1 browser but 2. HAVE FUN with your crippling!

    Obviously, I can't completely remove it, that would break Windows. I want to use it as a tool for running Windows Update, but I will have to make exceptions for certain trusted sites. It won't be my undoing because my superiors are well aware of the problems that malware causes, and would be happier without pop-ups and system instability. I'm not doing this in secret. I've explained to them the reasons, the effects, and the exceptions where some may have to use IE.

    Make the people who are making your job misserable RESPONSABLE for their actions.

    I can't go Stalin on my network users. Where there are standard configurations, we use DeepFreeze to restore the computers to the original configuration. Unfortunately, we can't use this everywhere, because it is to inflexible for the users with non-standard configurations.

Make sure your code does nothing gracefully.

Working...