Go homepage(回首页)
Upload pictures (上传图片)
Write articles (发文字帖)

The author:(作者)
published in(发表于) 2013/11/12 12:36:44
Sogou browser certificate: 360 discredited sogou, concocting the worst scandal

Sogou browser certificate: 360 discredited sogou, concocting the worst scandal-the browser sogou, sogou, sogou disclosure privacy 360-IT information Sogou browser certificate: 360 discredited sogou, concocting the worst scandal

Recently "search dog browser privacy" event, sogou smear today released the 360 security guards search dogs and produced by the worst scandal in the history of the event as a comeback, sogou official statements of the following:



The Festival for "do not have access to, destroy" purposes, secretly tampering with the user's default browser sogou 360 settings, leaving millions of users overnight your browser sogou option. To or retaliate against rivals, 360 are free to trample on users ' rights, even coerced users his mercy, in this connection, we have seen.


However, we never expected was that this is far from the 360 company's bottom line. Starting from November 5, through careful planning and the 360 company director, Forum ID, micro-boshuijun and media manipulation and use 360 navigation, pop-ups and other means, to discredit crazy sogou browser again. Its planned comprehensive, fast, disposable financial resources of large means of murderous, called one of the worst in the history of disinformation to discredit the event. In order to compete and interest of 360 companies buy their blatant disregard the public interest, incitement to create social panic, has reached extreme proportions.


We promise, sogou browser is safe and reliable, there is no vulnerability, please feel free to use the majority of users. We are adamant to take legal means to defend the fundamental interests of the majority of users, please join hands with the search dog to resist 360 misdeeds. Denial of 360, is to reject terror!


We will prove this vulnerability event is carefully planned, 360 behind the behavior. Please support the sogou's friends to help us continue to burden of proof.


Marketing Queen aligned play 360 paid gunmen come to light


"The Arab press network" fans only 129 of the Twitter ID, why there is such an explosive effect after publication? Shortly after publishing more than one Queen why do I fast forward? And looking at the "network" the Twitter ID, weibo are all released before dribbling shit, no attention to any of the Internet news hour dog suddenly matter, not dubious? The result that afternoon, "network" related tweets have been weibo to delete in the name of false information.


Even more interesting is the evening of November 6, web2.0 researchers, e-commerce expert Liu Huafang publishing tweets says, "PR agent to find me a company paying forward sogou browser exploits Navy tweets, I simply turned", released the tweet immediately after Navy siege by 360.



? "Network" micro-blog on suspicion of "personal attacks" is deleted by weibo official



▲ Liu Huafang microblogging exposure 360 companies pay to buy the shooter


Original poster stating that forum post account was stolen


"The Arab press network" mentioned in the Twitter post cards fan Forum users, was stolen on the night of November 5 to announce that he is, this piece of information is not published, and asked everyone not to trust the ones issued by the content. Who was robbed? Why would pilfer to burst out the information? Rice is a professional forum, where anti-virus industry veterans, never pay attention to why a normal Internet Twitter account "Arab press network", suddenly in your card within ten minute meals posted just a few comments to post?



▲ Exposed loopholes in the so-called dog post turned out to be the ones to


Video evidence of the Forum were arrested for fraud and 360 so-called notary video won't hold water


Online exposure to the "search dog browser exploits video" there is more than one fatal loopholes and logical mishap. Many doubts showed how human editors, there is a video Director element: login account a red herring; video playback time cannot be synchronized with the system time, to 1:27 video in computer systems across the 2 minutes, people can't help but wonder passive video had been tampered with.



▲ To 1:27 video in computer systems through 2 minutes


And 360 so-called notarized video, nor provide any evidence for it discredited claims: account synchronization is as long as the feature on a computer with a QQ account after log in the browser and log on to the computer browser b with a QQ account, you can import the form data, and then sync to a computer, this is a normal feature account synchronization mechanism.


Using a large number of Navy, ID number for same day registration


Who is in uniform motion? Events after the burst, 360 security guards first weibo to remind people, then 360 micro-collective move forward in a short time, then 360 security guards started popups require users to stop using search dogs. 360 in its website related news, Luo many users are listed in the news until the sogou browser security vulnerabilities, but all of these users are unable, a vest, and released revelation micro-Borg are very similar. Points to the last page of these micro-blogging, that is, when they opened Twitter's first tweet, total 12 accounts are on September 19, 2013-21st or open 16:00-17:00 's microblog.



▲ Large Twitter whistleblowers are registered on the same day the Navy vest


360 did not produce any evidence, a large number of users authenticated does not reproduce the 360 so-called loophole


So far, all the sources of information, only the cards fan Forum post (post on the forums have confirmed your account stolen, posts are not themselves) as well as 360 lame video. Lots of sogou browser users and journalists have also been tested, failed to reproduce the 360, the so-called loopholes.



Xie Xiaoping ▲ reporters failed to reproduce the "loophole"



? User test fails to reproduce "loophole"


360 companies think, the first time the busy attacking rivals rather than conform to safety regulations


User Internet security protection are 3,601 direct promotional purposes, but what is the code of practice in the security industry? When it comes to possible vulnerabilities, the first time was to notify the relevant manufacturers and technicians identify vulnerabilities of authenticity, after being ascertained or bug fixes the problem, to the public, this is to avoid being more vicious exploitation, loss of user control to a minimum.


360? Rice forum posts since the advent of, which did not get in touch with search dogs, identify the nature of the problem cases, has been posted on the Twitter announcement, to all network users to play Windows, released in video format, and spread the so-called loopholes in the details. In this regard, the cloud platform and "not in favour of the manufacturers to release details before repair", the safety principles, as a security vendor 360 does not know it? Such a serious breach of the safety rules and practice regardless of the interests of users, the purpose of which is obvious – the fight against its rival sogou.


(

搜狗浏览器自证:360抹黑搜狗,炮制最恶劣造谣 - 搜狗浏览器,搜狗,搜狗泄露隐私,360 - IT资讯
搜狗浏览器自证:360抹黑搜狗,炮制最恶劣造谣

针对近日的“搜狗浏览器泄露隐私”事件,搜狗今日对外发布《360 安全卫士抹黑搜狗,炮制史上最恶劣造谣事件》作为回击,以下为搜狗官方声明:



中秋节期间,出于“得不到,就毁掉”的目的,360偷偷篡改搜狗用户默认浏览器设置,致使数百万搜狗用户一夜之间丧失自己的浏览器选择权。为了打击报复竞争对手,360可以随意践踏用户的权益,甚至胁迫用户任其摆布,这一点,我们见识到了。


然而,让我们万万没想到的是,这远非360公司的底线。从11月5日开始,360公司经过精心的策划和导演,先后操纵论坛ID、微博水军及传媒,并动用360导航、弹窗等手段,对搜狗浏览器再次进行了疯狂抹黑。其谋划之周全,行动之迅速,动用资源之庞大,手段之凶残,堪称史上最恶劣的造谣抹黑事件。为了竞争和利益,360公司公然置公众利益于不顾,煽动制造社会恐慌,已到登峰造极的地步。


我们承诺,搜狗浏览器安全可靠,并无所谓漏洞,请广大用户放心使用。我们更态度坚决地采取法律途径,捍卫广大用户的根本利益,请与搜狗携手抵制360恶行。拒绝360,就是拒绝白色恐怖!


我们将证明这次漏洞事件完全是360精心策划、幕后操纵的行为。请支持搜狗的网友协助我们继续举证。


营销大号齐上阵,360花钱买枪手被曝光


“阿波通网络”这个粉丝只有129的微博ID,发布消息后为何会有如此爆炸性的效果?发布后短时间内多个大号为何会迅速转发?而纵观“阿波通网络”这个微博ID,之前发布的微博都是各种口水段子,丝毫没有关注过互联网的任何新闻,突然长篇大论向搜狗发难,岂不令人怀疑?结果当天下午,“阿波通网络”的相关微博已经被新浪微博以不实信息的名义删除。


更有意思的是,11月6日晚间,web2.0研究者、电子商务专家柳华芳发布微博说,“某公司的代理公关找我付费转发搜狗浏览器漏洞的水军微博,被我直接拒绝了”,该条微博发布后立即被360的水军围攻。



▲“阿波通网络”的微博因涉嫌“人身攻击”被新浪微博官方删除



▲柳华芳微博曝光360公司付费买枪手


原始发帖人现身,声明论坛账号系被盗用发帖


“阿波通网络”微博中所提到的卡饭论坛发帖用户于11月5日晚间宣布自己是被盗号,该条信息不是自己发布的,并请大家不要相信该盗号者所发的内容。是谁盗了号?为何要盗号来爆出该条信息?卡饭是一家杀毒行业资深人士聚居的专业论坛,为什么一个平时从来不关注互联网的微博账号“阿波通网络”,却突然在卡饭发帖短短数十分钟内浏览到了帖子?



▲曝光所谓搜狗漏洞的帖子原来是盗号者所为


论坛视频证据涉嫌作假,360所谓公证视频经不起推敲


网上所曝出的“搜狗浏览器漏洞视频”存在多个致命漏洞和逻辑硬伤。诸多疑点显示该视频存在多处人为编辑、导演元素:登陆账号真实性存疑;视频播放时间与电脑系统时间无法同步,视频1:27至1:28在电脑系统中穿越了2分钟,让人不得不怀疑视频被动了手脚。



▲视频1:27至1:28在电脑系统中穿越了2分钟


而360所谓经过公证的视频,也不能为它的抹黑说法提供任何证明:只要通过账号同步功能,在A电脑上用某个QQ账号登录浏览器后,同时在B电脑浏览器上登录同一个QQ账号,即可导入表单数据,再同步到A电脑上,这是账号同步机制正常的功能特性。


动用大批水军,ID多为同一天注册


是谁在整齐划一地动作呢?事件爆出后,360安全卫士首先发布了微博提醒用户,然后360官微在短时间内集体出动转发,继而360安全卫士启动弹窗要求用户停止使用搜狗。360也在其网站发布相关新闻,新闻中罗列出了众多用户爆出的搜狗浏览器安全漏洞问题,但这些用户莫衷一是都是马甲号,并且发布的爆料微博格式也极为相似。而点到这些微博的最后一页,也就是他们开通微博的时候发的第一条微博,共12个账号竟然都是2013年9月19日—21日期间的0:00或16:00—17:00开通的微博。



▲大量微博举报者都是同一天注册水军马甲


360没有出示任何实证,大量网友已验证并不能重现360所谓漏洞


目前为止,所有的信息来源,只有卡饭论坛的帖子(论坛发帖者已证实账号被盗,帖子并非自己所发)以及360漏洞百出的视频。大量的搜狗浏览器用户和媒体记者也进行了测试,未能重现360所谓的漏洞。



▲记者谢筱萍未能重现“漏洞”



▲网友测试未能重现“漏洞”


360公司心怀鬼胎,第一时间忙着攻击对手而非遵循安全规范


保护用户上网安全是360一直宣传的宗旨,但安全行业的行业规则是什么?当遇到疑似漏洞问题,第一时间是要通知相关厂商技术人员确认漏洞的真实性,待问题查清或漏洞修补后,才向社会公开,这是为了避免被更多恶意利用、将用户损失控制在最小范围。


而360呢?在卡饭论坛帖子出现之后,其在未与搜狗取得联系、确认问题性质的情况下,先后通过在微博发布公告、向全网用户弹窗、发布视频的方式,公然散布所谓漏洞的细节。对此,乌云平台也表示并“不赞成厂商修复前公布细节”,这个安全原则,作为安全厂商的360不会不知道吧?这种严重违反安全行业规则和不顾用户利益的做法,其目的已经昭然若揭——打击其竞争对手搜狗。


)


If you have any requirements, please contact webmaster。(如果有什么要求,请联系站长)





QQ:154298438
QQ:417480759