Adware Firm Admits Error, Apologizes
180solutions, the controversial adware marketer, admitted last week that it has found a pair of sites adding its Zango software to PCs without users' consent.180solutions, the controversial adware marketer admitted last week that it was initially unable to identify the rogue affiliate that was installing its Zango software illegally, and in fact found a pair of sites adding Zango to PCs without users' consent.
"As it turns out, we didn't get Mr. Edelman's guy on Monday. The guy we got on Monday, 'Sniper84,' was also installing our software in the same unauthorized manner," wrote Ken Smith, co-founder and chief technology officer of Bellevue, Wash.-based 180.
A week-and-a-half ago, Harvard anti-spyware Ben Edelman posted information on his Web site that showed unauthorized downloads of Zango, something 180solutions had promised would be much more difficult after it required affiliates to use its S3 (Safe and Secure Search) technology. Edelman, who said he had found more than 40 instances of illegal downloads by 180solutions partners over the past two years, did not identify the rogue affiliate.
"I have concluded that 180's business model is fundamentally broken -- that 180 cannot implement technology or enforcement to assure the proper installation of its software," Edelman said then. "Accordingly, just as CDT [Center for Democracy & Technology] terminated its discussions with 180, I have resolved not to tell 180solutions which specific distributor was responsible for this installation."
"At the time, we believed this [Sniper84] was the same individual Ben Edelman had (cryptically) described," said Smith. In fact, the rogue Edelman found, dubbed "csk2000" by 180, was not shut down until the next day, Tuesday Feb. 21.
Both were identified during the course of its investigation into Edelman's charges; ads will not be posted on machines hacked by either Sniper84 or csk2000.
Like a company spokesman last week, Smith also blamed the breakdown on his company's detection and reporting mechanisms, not the S3 technology. "Our software was certainly hacked, [buy] no amount of software development will ever make any software completely bulletproof," said Smith.
"In the end, the mechanisms we have in place were able to help us find the bad guys. But, in our opinion, that process took too long, and for that we apologize."
We welcome your comments on this topic on our social media channels, or
[contact us directly] with questions about the site.

1 of 2

More Insights