Chrome just flagged this site as malware for me

Without going into your personal situation, what additional protection do the internet via proxy and TOR network give the user (you use both?!?!?!)? Is the proxy related to internet cafes and laptops? Is the TOR browser related to issues other than malware? Or are you using the TOR browser outside of the TOR network?

For Chrome users:

Click the Chrome menu Chrome menu on the browser toolbar.
Select Settings.
Click Show advanced settings and find the “Privacy” section.
Uncheck the box next to “Enable phishing and malware protection.” Note: When you turn off these warnings you also turn off other malware and uncommon download warnings.

My proxy is literally my ISP. I’m in an area with a fairly underdeveloped technology infrastructure so due to their low budget setup, and not any deliberate effort on my part, all of their customers share one common IP address to the outside world.

The TOR Browser and network prevents even my ISP from seeing what sites I visit. Not that I am engaging in crime or anything else that I would really care if they did know, but as a matter of principle I would prefer that they don’t if I have a choice about it without inconveniencing myself too much.

Monitoring and recording individual internet usage by means of tracking cookies, search logs, webserver logs and such isn’t as overtly evil as installing malware but I still don’t like it happening to me.

It is frightening to consider the dossier of information that Google and others have about each internet user, the ways they use it currently, and the ways it might be used or misused in the future. So I do what I can to leave no paper trail. A silent protest of how common and acceptable it has become for companies and governments to track individual’s internet use.

From the Tor website:

From the Startpage.com website:

The content of ads is hosted on the ad provider’s servers, not on ours, right? And when a browser opens the SDMB, it gets some code from here that causes it to query that ad provider to get the code for the ad itself, right? Shouldn’t a browser therefore block the ad provider’s servers, not ours? I guarantee you that the ad providers would clean up their own act if the major browsers started blocking them out (while still showing the content on the sites with advertising like the SDMB).

Blocking the ad provider’s servers would also block the ad content shown on SDMB. That’s where the ads come from. I don’t understand why you think these are different.

I don’t think all the ads come from a single source. Block the “bad” ad servers but not the good guys. I don’t think it has to be all ads or none. I could be wrong, but didn’t the malware diagnostics mention at least three domains?

ETA: from diagnostics page: Malicious software is hosted on 8 domain(s)

But I care. Isn’t that what’s really important.

Having turned off the warning yesterday, it is back today. If I am reading it right, it says they did find some malware on the 16th.

How is it that Google can hit the site 100,000 times but we have to wait two minutes between searches, and four if it hangs and you click twice?

Yeah, that’s my problem with Google’s list. I think it should probably block the domains/ips the malware actually originates from. They’re the actual offenders, after all.

Sometimes, Google, Baidu and Bing are exactly why a site is slow. I’ll get customers calling in and complaining about their server, and a quick look reveals one of the big search engine’s spiders is beating one of their domains to death while indexing it.

The only way Google could know which ad domains served malicious ads would be to receive every ad that’s displayed on a site (or on the entire internet, I guess). As ads can be moved in and out of rotation on a minute by minute basis, that’s not feasible. And really an instance where Google flagged a site that it’s detected malicious software going on 200 times from ads served from more than half a dozen different domains over three months isn’t one where I’d be pointing a finger at Google.

I don’t think they’re different, and I’m not sure how I gave that impression. If an ad provider provides malware ads, then that ad provider ought to be blocked, resulting in no ads from that provider being visible. Which would hurt that provider’s bottom line, which would as I said provide them with an incentive to clean up their own act.

I got the same warning others have posted. I’ve stayed away for a few days as a result, but since the last ‘incident’ in the report was 5-16, I decided to risk it. If I don’t foist my opinions on you all, who will?

Here’s how:

You can’t block the ad servers and still show the ad content from the ad servers. If that’s not what you intended to say, you need to make it more clear.

I think the content Chronos is referring to is the site content, threads etc, not the advertising content. Block the ads but let the site content remain visible, rather than blocking the whole site.

Right - it seems the technology google is using knows that its “domain.bad” that is providing the malware that is “on” SDMB pages - seems it should be able to block “domain.bad” instead.

Similar to the way adblock does it - you simply filter the results and not allow content from “domain.bad” to load in the browsers - in the old days, we used hostfiles and a list of known bad hosts to prevent.

Google’s service doesnt differentiate between the page the content is on (SDMB) and who is providing the actual malware (domain.bad) - and that also makes sense (in a way) since its impossible from a code standpoint to infer intent on the part of the SDMB.

It also may be part of the strategy - Google (and other blacklisters) - blacklist the SDMB in order to force SDMB to be more concientious in the add providors - something, of course, that Google also offers*.

Why should Google do that? If a site is willingly serving up sketchy, malware-laden ads, why should Google give it any consideration? It’s like going to a restaurant that serves up spoiled food that they get from a bad distributor: a food-critic (or a patron) is only going going to care about the fact that the restaurant is allowing bad food to go out–the distribution problems aren’t remotely the customer’s problem. Go after the distributor, sure, but also go after the people willingly taking money to pass it on.

And after the customers have been complaining for literally years that they’re getting sick from the food (and the owners telling the customers “It’s not our fault, everyone else is just the same, and you didn’t get sick from us anyway”), it’s pretty silly to complain that the health department FINALLY comes in and puts up a “Not fit for human consumption” notice.

And if you stretch the metaphor a bit further, what about the owners, who beg the health department to take down the notice and when given a second chance, use it to immediately start serving tainted food again just to see what happens, regardless of what it does to the customers?

Google is right to block the sites serving up malware.

Well, they are listing the offending domains in the details of the warning. So they know the domains in question, and the IP addresses they resolve to. So they’re pretty much already combing the sites in question. Their aim is to index the available internet, so I’m not sure what you’re getting at by saying it’s out of their scope. Google slurps down incredible amounts of data. They’re already saying they’re pulling down a large enough percentage to start blocking the SDMB based on the number of malware ads it has served indirectly, and name the domains which sent them.

On the other hand, I’ve done work with SEO folks, and they do indeed spend a lot of money to switch out domains and IP addresses in an attempt to fool the search engines, and the search engines spend a lot of money figuring out how to filter them out. I’d assume that the malware distributors would have the resources to do the same thing, if they are actually running the ad services. If they’re not running the ad service, then blocking the ad service’s IPs/domains until they scanned without an issue would probably be at least as effective as blocking the SDMB.

I wouldn’t say I’m pointing the finger at Google, other than to say they’re blocking the wrong site. It’s their free service, they can do what they want with it. I’m just not participating any more.

Right. The “site with the ads” is the SDMB, and the content on that site is the threads. The threads are clean, the ads are dirty, so let the threads through and block the ads.

There’s a difference between trying to index every site on the internet and reloading a single site over and over until you’re pretty sure you’ve seen every ad that comes up on that site. If you’re really persistent doing the latter, you can get the IP address for every server that’s hosting malicious ads that are shown on a site at a given time. But maybe between the last time you’ve checked the site and the next, a new malicious ad from a new server shows up. In the time before you’ve discovered the new server serving the malicious ad, thousands of regular users have viewed it. Meanwhile, you’ve known the site has been serving malicious ads from multiple sources the whole time. If you’re maintaining a list of bad sites, I think the responsible thing to do at that point is add the site to it until they get their act together and stop serving garbage.

I assume that there’s so much delegation between the ad service a website would contract with and the people who create the ads that the list of IPs serving malicious ads is constantly changing. I don’t have much experience with that, though.

I think it’s very reasonable for Google to reach a point where they’ve detected so much malware coming from a site that they flag the whole thing as suspicious. You can’t be sure that you’re able to detect every attempt at an exploit but you can be sure that whoever’s running the site hasn’t shown themselves to be competent when it comes to deciding what’s safe for its users.

Now, I don’t believe Google is totally benevolent in doing this. I’d guess that at least one Google employee has said to another, “…and all this will make people more likely to use our ad service.”