Adobe修改hosts文件以检测是否安装了Creative Cloud。
Adobe modifies hosts file to detect whether Creative Cloud is installed

原始链接: https://www.osnews.com/story/144737/adobe-secretly-modifies-your-hosts-file-for-the-stupidest-reason/

Adobe Creative Cloud 在 Windows 和 macOS 上秘密修改用户的 hosts 文件来检测现有安装。Adobe 现在检查 hosts 文件中的特定条目,而不是直接查询 Creative Cloud 应用程序。 其工作原理如下:当你访问 Adobe 网站时,一个脚本会尝试通过 hosts 文件中定义的地址连接到服务器。成功的连接会确认已安装 Creative Cloud。这项更改的实施是因为 Chrome 开始阻止 Adobe 直接访问本地网络。 这种做法引起了担忧,一些人质疑这种修改是否越过了界限,类似于恶意软件行为。这种方法感觉不必要地具有侵入性,特别是考虑到它是由浏览器安全更新引起的变通方法。建议用户检查他们的 hosts 文件中是否有 Adobe 添加的条目。

最近一篇Hacker News上的帖子讨论了Adobe修改hosts文件以检测Creative Cloud安装的情况。这一做法引发了争论,用户质疑为什么Windows Defender等安全软件没有将其标记为潜在恶意行为,因为修改hosts文件通常被认为是一种可疑活动。 一些人批评这种方法过于强硬且不必要——认为它只对技术娴熟的用户来说才存在争议——而另一些人则承认Adobe需要确定桌面应用程序是否已安装,特别是对于正确处理来自浏览器的文件打开选项等功能。 一个关键问题是是否存在侵入性更小的替代方案,例如URL处理程序或直接询问用户。这场讨论凸显了功能性与用户隐私/系统安全之间的紧张关系。
相关文章

原文

If you’re using Windows or macOS and have Adobe Creative Cloud installed, you may want to take a peek at your hosts file. It turns out Adobe adds a bunch of entries into the hosts file, for a very stupid reason.

They’re using this to detect if you have Creative Cloud already installed when you visit on their website.

When you visit https://www.adobe.com/home, they load this image using JavaScript:

https://detect-ccd.creativecloud.adobe.com/cc.png

If the DNS entry in your hosts file is present, your browser will therefore connect to their server, so they know you have Creative Cloud installed, otherwise the load fails, which they detect.

They used to just hit http://localhost:<various ports>/cc.png which connected to your Creative Cloud app directly, but then Chrome started blocking Local Network Access, so they had to do this hosts file hack instead.

↫ thenickdude at Reddit

At what point does a commercial software suite become malware?

联系我们 contact @ memedata.com