Wow, I’m happy to see the responses generated by my query and hope they keep coming!
I’m not trying to have bullet-proof anonymity on the Internet; that’s too hard to achieve affordably. To me, computer invasion is evolving because industries that make money selling information, can employ collection methods that police investigators would have to have a search warrant to use. Since its very big business I doubt there will ever be political will to stop it, and I can’t imagine how legislated regulation could be enforced anyway. It will always be an end-user’s responsibility to protect one’s own computer.
Gordon and Ewen, the text of the UI transmitted doesn’t have to carry any personal user or system information. A packet sniffer at the registration server can collect a sender’s personal physical NIC MAC address, and motherboard manufacturer as well if its an on-board NIC, AND the sender’s IP address. So it IS transmitted in the packet wrapper layers, with the TCP payload of UI information, as part of the Internet infrastructure. Run the IP address on WHOIS and you also know the ISP and just about where the computer is. Thats a lot of information, and it seems a bit disingenuous to say that its non personal just because you don’t have the name and DNA of the person sitting at that computer at the moment. But hey, thats just the Internet as it is, right now.
Melih, I DO have concerns about drive-by downloads because that’s how I caught the rootkit that educated me so painfully and sent me toward Comodo. I appreciate your assurances about CFP v3. I’m an OLD geek systems analyst/computer application designer since vacuum-tube days and I’d love to hear from one of your tech guys about its more specific features, not trade secrets, of course.
LM, your discussion of install/uninstall/reinstall was really helpful. I assume the license file export/re-import you mentioned is of a registry key. Would you mind identifying the key, or if not a registry item, telling me the path to the file?
I’m still wanting to have my question answered. What exactly is the UI content, what exactly about my computer is it derived from, how is it later protected, what exactly are all the ways it is used, who exactly may have access to it, and why? I think I know when.