Spyware in Torque Demo?
by Fred Brandli · in Technical Issues · 07/04/2006 (9:11 pm) · 10 replies
Being a Networking guy by trade I noticed that the Demo is making connections to the server trinity.garagegames.com (IP address [216.116.32.49) that server is sending info back info to the computer I am checking this product out on as well?
I cannot help but wonder why.
I cannot think of a legitimate reason to do this.
I did not agree to have my computers contact an outside server and transmit data and accept such from any server outside my LAN.
I see no mention in the EULA of agreeing to having information from my computers or LAN being transmitted to GG.
I will suspend any demo activities and will uninstall and not purchase this product until I have an answer.
I certainly hope that Torque is not installing some sort of spyware.
I also hope that such connections are not embedded in the purchased product.
Please explain.
I cannot help but wonder why.
I cannot think of a legitimate reason to do this.
I did not agree to have my computers contact an outside server and transmit data and accept such from any server outside my LAN.
I see no mention in the EULA of agreeing to having information from my computers or LAN being transmitted to GG.
I will suspend any demo activities and will uninstall and not purchase this product until I have an answer.
I certainly hope that Torque is not installing some sort of spyware.
I also hope that such connections are not embedded in the purchased product.
Please explain.
#2
07/04/2006 (9:49 pm)
It will be the RSS news feed. It does exist in the purchased version, because it's a useful feature. You can turn it off in the options, or if you're really paranoid you can just remove all the script code that implements it.
#3
It's just a harmless news ticker. Silly.
07/04/2006 (11:05 pm)
Of course it's the RSS feed. GG certainly isn't linking all the computers using it's products to a secret satellite network, waiting for the day when the numbers are great enough they can press the button and the great time of reckoning will begin. It's just a harmless news ticker. Silly.
#4
07/05/2006 (12:15 am)
Thanks Wedge, Now I paranoid! o_0
#5
Nonetheless, an RSS feed is acceptable as an explanation. I can also see the possible usefulness of the feature.
Thank you, Tom, for the prompt and concise answer with no edge, and to Wedge for the more colorfully expressed as well as kind and gentle elaboration.
07/05/2006 (9:46 pm)
As I said, I run networks for a living. So the appearance of unexpected traffic emanating from a recently installed program to an outside server and the resulting responses from that server pushed me into my traditional network security stance that was so eloquently termed "paranoid."Nonetheless, an RSS feed is acceptable as an explanation. I can also see the possible usefulness of the feature.
Thank you, Tom, for the prompt and concise answer with no edge, and to Wedge for the more colorfully expressed as well as kind and gentle elaboration.
#6
07/05/2006 (10:13 pm)
Did you check the packets to see what was being sent? That is usually the first thing that I avoided looking at back in the day because I hated looking at packet shaper data. You should have been able to capture the packet data extremely easily.
#7
This was all on my home network.
Figured I'd go straight to the source first and ask what the hey was happening before hauling out all the sniffers and other forensic crap. I get enough of that trash at work everyday as well as users who keep begging me to let them have blank passwords.
Plus it was late and the old man just wanted some ZZZZ.
So kill, uninstall, hit the restore point, shut off the PC and off to dreamland.
07/05/2006 (10:32 pm)
First "paranoid" reaction was to kill the source to minimize any possible damage. This was all on my home network.
Figured I'd go straight to the source first and ask what the hey was happening before hauling out all the sniffers and other forensic crap. I get enough of that trash at work everyday as well as users who keep begging me to let them have blank passwords.
Plus it was late and the old man just wanted some ZZZZ.
So kill, uninstall, hit the restore point, shut off the PC and off to dreamland.
#8
This was all on my home network.
Figured I'd go straight to the source first and ask what the hey was happening before hauling out all the sniffers and other forensic crap. I get enough of that trash at work everyday as well as users who keep begging me to let them have blank passwords.
Plus it was late and the old man just wanted some ZZZZ.
So kill, uninstall, hit the restore point, shut off the PC and off to dreamland.
07/05/2006 (11:09 pm)
First "paranoid" reaction was to kill the source to minimize any possible damage. This was all on my home network.
Figured I'd go straight to the source first and ask what the hey was happening before hauling out all the sniffers and other forensic crap. I get enough of that trash at work everyday as well as users who keep begging me to let them have blank passwords.
Plus it was late and the old man just wanted some ZZZZ.
So kill, uninstall, hit the restore point, shut off the PC and off to dreamland.
#9
Regardless, between the Master Server and the RSS feed, your question has been answered. You can disable or enable or extend or remove any features you like from the source.
07/06/2006 (6:59 am)
As I said, I enjoyed avoiding sorting through traffic, so I can understand you not wanting to do it. It's dog's work and bites. But I also don't understand the sudden assertion of spyware on an engine that advertises complete source code and touts networking as a strength.Regardless, between the Master Server and the RSS feed, your question has been answered. You can disable or enable or extend or remove any features you like from the source.
#10
I believe that has been established.
07/06/2006 (9:28 pm)
Regardless, between the Master Server and the RSS feed, your question has been answered. You can disable or enable or extend or remove any features you like from the source.
I believe that has been established.
But I also don't understand the sudden assertion of spyware on an engine that advertises complete source code and touts networking as a strength./QUOTE>
Even with source it can be difficult to find items that do not belong. combing through thousands of lines of code that you are not the author of is time consuming and it's easy to over look items.
Also having the Demo only I really wanted to make sure what was going on.
For the record I did not "assert" spyware existed I just asked if it did and if not what the communications were about before I purchase. Rest assured that once purchased a full sweep of all comm on my LAN especially to outside addresses will be performed even though I tend to accept the expanation. My nature as a networker demands I do that anyway.
I have all but decided to purchase anyway. It is an intriguing product.
So I think this thread is closed.
Torque Owner Cinder Games