You’re probably all-too-familiar with “foistware.”
That’s where you decide you like product X, so you download it and install it.
But during the install process, it suddenly recommends other software, and if you aren’t careful, you end up downloading and installing that as well.
One well-known example of foistware is Adobe’s Flash Player installer, which typically urges you to install Intel’s McAfee Security Scan Plus product at the same time:
We’ll take the view for now, just to keep things simple, that an optional offer that is turned on by default can be considered “opt-in.”
We don’t really agree with that, but we’ll go with “opt-in” on the grounds that the installer doesn’t proceed until you have had a chance to review the page and (here’s where the semantics get tricky) opt out of the additional component.
Another well-reported – nay, infamous – “foistware” example from a few years ago was CNET’s bundling of a browser toolbar with the popular network security tool NMAP:
The NMAP case was made worse by the fact that CNET not only implied some sort of agreement between NMAP and the toolbar company, but also implied an agreement between CNET and NMAP to provide a modified NMAP installer in the first place.
(In fact, CNET simply rebundled NMAP because it was free software, albeit not free-for-all.)
As Gordon Lyons, the creator of NMAP, wrote with understandable angst at the time:
The problem is that users often just click through installer screens, trusting that download.com gave them the real installer and knowing that the Nmap project wouldn't put malicious code in our installer. Then the next time the user opens their browser, they find that their computer is hosed with crappy toolbars, Bing searches, Microsoft as their home page, and whatever other shenanigans the software performs! The worst thing is that users will think we (Nmap Project) did this to them!
So the first order of business is to notify the community so that nobody else falls for this scheme. Please help spread the word.
Foistware back in the news
The use of foistware as a product marketing strategy is in the spotlight again, this time thanks to BitTorrent, Inc., makers of the small-and-simple Torrent client uTorrent.
(In this context, u- is read as the Greek letter μ, pronounced “mew” in English, being the scientific abbreviation for “micro-“.)
When we tried the installation, uTorrent tried out two foistware steps.
First, we received a Special Offer for BitTorrent Users, recommending something called a “Five Knives Bundle”:
The dialog window was opted-in to the offer, but we were admittedly free to decline the offer before clicking next.
(Jumping ahead slightly, when we did decline the offer, uTorrent installed itself and honoured our request not to receive the Five Knives download.)
Next came a Recommended by BitTorrent dialog, promoting Microsoft’s Skype software.
There was a note to remind us that just clicking next would automatically install Skype “for free,” though that is perhaps an interesting choice of words considering that Skype is free anyway, and the button is actually labelled [Finish]:
Going ahead with the defaults meant that as soon as uTorrent was installed and running, it started torrenting a 418MB file entitled “Five Knives Savages Bundle”.
And it installed and launched Skype for us, leaving us with a Skype sign-up screen:
The Epic Scale connection
As we have noted above, foistware is not unusual in the software industry in general, nor for uTorrent in particular.
But there was a visible public outcry recently when the second uTorrent foistware dialog – the one that installed Skype in our example above – offered a program called Epic Scale instead:
The problem with Epic Scale is that, for all the charitable intentions it claims on its own website, it is primarily a cryptocurrency mining client.
Apaprently, it goes after Litecoin, rather than the more commonly-used and better-known Bitcoin, but the programming principles are the same.
You throw as much processing power as you can, using your CPU and your graphics card, if you have one, at grinding out cryptographic calculations (SHA-256 hashes, as it happens).
Every now and then, you produce a SHA-256 hash with a certain pattern of bits that means you might just have won a small prize: some cryptocurrency!
Except in this case, you haven’t won the prize: Epic Scale has, although it claims to donate 75% or more of the value of these earnings to charity.
But why the outcry?
How or why is this worse than installing Skype?
On the surface, it’s no different at all.
But the problem is that when cryptocurrency miners like Epic Scale’s run, they really put the digital hammer down, typically consuming more electrical power, and generating much more waste heat, than usual.
Overall, therefore, your computer runs slower, hotter and more expensively than you would expect.
The cost of your “charitable donation” may be more than you first thought.
But it’s OK!
Of course, you opted in, and you can opt out again later by uninstalling the foistware independently.
So it’s not all bad.
But should this be allowed, or should the practice of “foisting” software be prohibited?
The upside is that it allows companies like BitTorrent, Inc. (and, apparently, Adobe) to offer their own software for free, yet still recognise some revenue from affiliated marketing activity.
The downside is that it can backfire on both the foister (e.g. BitTorrent, Inc.) and the foistee (e.g. Epic Scale) if users find the combination unpalatable.
So, as long as the foister and foistee have an agreement for co-operation; as long as the foisting is made obvious; and as long as the foisted software is installed so it can be uninstalled independently, a free-market economy would surely have to agree that foistware is OK.
What to do?
If product X offers you product Y as well, read the small print.
If in doubt, simply decline the foistware: if product X cares for your business, you will not be disadvantaged by declining.
Easy as that!
Image of burning CPU courtesy of Shutterstock.
I think there are some cases where you only get the option to decline “foistware” if you choose the “Advanced” install option. I’ve gotten in the habit of never ever choosing “Typical.”
While I’d like it to go away, I can’t see a government attempt to prohibit it work without messing something legitimate up. (And would they punish CNET or accidentally raid the NMAP project?) So as long as I can keep it from installing, it’s no problem for me. I can imagine it causes headaches for those who have to administrate thousands of PCs at their business, though.
FWIW, Sophos Anti-Virus can control applications like Torrent clients using the not-on-by-default Application Control features that allow sysadmins to detect and block even legitimate apps (e.g. Solitaire :-).
In this case, that would reduce your exposure to potential claims of copyright infringement (it’s hard to regulate what happens *after* a Torrent client is activated) and of risky downloads, save bandwidth…and neatly sidestep the foistware, too.
What particularly irritates me is the practice of Oracle and Adobe including foistware in security updates. I’ve come to expect it in new product installs but, to me, it is unforgivable to include it with required security updates.
I agree, major for profit companies, and software repositories like download.com and sourceforge should not be permitted to do this, especially if it requires modifying developers original installation packages.
I also feel that it should only be allowed in an opt-in scenario, as noted above, many users simply click through the next-next-next options without reading or understanding what they are agreeing to. This is precisely the practice that malware uses to get into your system, so in my view anything that tries to install itself without my express permission and intent falls into the malware category.
Whats the golden rule, “if you didn’t go looking for it, don’t install it.” Companies that are asking for our trust cannot participate in this type of surreptitious installation.
One objection to having foistware truly opt-in is that the next-next-next culture then means you never get *any* affiliate love, which means no revenue, and so on.
A possible middle ground is to have no default setting, so that [Next] is greyed out until you have chosen either “Yes” or “No.” (You could still [Cancel] and bail altogether, of course.)
Then it really would be a choice. It would take a bit longer, but if it took so much longer as to be annoying, that would surely mean you had too many foistware options…
Don’t forget Java!
We didn’t 🙂
https://nakedsecurity.sophos.com/2013/01/23/oracle-please-stop-sneakily-foisting-third-party-toolbars-on-us-with-your-java-updates/
Just didn’t mention them here…but you’re right, Oracle and Adobe are in a similar boat here.
Ummm, you really didn’t forget Java. Oracle owns Java (following their acquisition of Sun Microsystems on January 27, 2010), so you included it in the first place.
the culture of next next next, is the problem 🙂
Not to quibble, Duck, but in American English (at least), when the undesirable alternative is pre-selected and you have to take explicit action to disable it, it is referred to as “opt-out” not “opt-in.”
They’ve engaged you in the choice and you must actively opt out of it.
See this page
http://www.charitynavigator.org/index.cfm?bay=content.view&cpid=470#D
and read the definition for Donor Privacy Policy. This is an organization which rates charities and warns you of which ones share your contact information by default, requiring you to “opt-out” to maintain privacy.
I tried to make it clear that I was being as liberal as possible in my use of “opt-in”. I agree that if a tick-box is ticked for you and can be turned off, it’s “opt-out” but to keep things simple here I was treeting it as “opt-in” if you get any chance of turning it off in advance rather than only later on.
I’ve seen a lot of installers recently where the “Foistware” is presented in such a way as to attempt to trick the user into believing they’re “Accepting” / “Declining” installation of the actual software they *wanted* to install. Only through very careful inspection of each page in the installer, and the realisation that, even though only an “Accept” / “Decline” button is available the *wanted* software installation will still proceed, are users able to bypass the installation of such junk. Highly irritating, even for those who don’t follow the “next next next culture”. Even more irritating for those of us who have to provide technical support for users who do! :S