back to article Adobe spies on readers: 'EVERY page you turn, EVERY book you own' leaked back to base

Adobe's Digital Editions 4 ebook reader software collects detailed information about the reading habits of its users – and sends it back to the company in a format that's easy for others to slurp. An investigation by Nate Hoffelder of The Digital Reader blog showed that ADE 4 was collecting telemetry on which pages of ebooks …

Page:

  1. Anonymous Coward
    Anonymous Coward

    Outrageous

    But, of course, they'll get away with it.

    1. Anonymous Coward
      Anonymous Coward

      Re: Outrageous

      Outrageous

      But, of course, they'll get away with it.

      I am not entirely sure a EULA/T&C is capable of overriding what amounts to illegal access of a computer (come to think of it, the convoluted way you have to dig for the T&Cs with Adobe products may very well fall foul of UK contract law so it's possible that their "agreements" are null and void to start with).

      It is none of their business what else you have on your computer, so it's quite possible that this is actually a criminal activity.

      It's a good thing for Adobe that the police is no longer really interested in doing, well, police work - this could have been rather entertaining to watch after a complaint. The ICO doesn't really have the right powers for this.

    2. Vociferous

      Re: Outrageous

      Of course they will. They're a company. The law is there to protect state and companies against citizens, not the other way around.

    3. Gray
      Devil

      Re: Outrageous

      It's an American mega-corporation ... But, of course, they'll get away with it.

  2. Anonymous Coward
    Anonymous Coward

    A Night At The Opera

    "We will not access, view, or listen to any of your content, except as reasonably necessary to perform the Services. Actions reasonably necessary to perform the Services may include (but are not limited to) (a) responding to support requests; (b) detecting, preventing, or otherwise addressing fraud, security, unlawful, or technical issues; and (c) enforcing these terms."

    Yours faithfully,

    Mr Groucho Marks.

    1. BillG
      Boffin

      Re: A Night At The Opera

      I predict Adobe will say something like:

      "This was test code that was only used during testing blah blah blah, none of the transmitted information was stored on our servers blah blah blah blah, the code is not used and no data is collected blah blah, our users are all a bunch of blah. Now shut up and go away."

    2. Elmer Phud

      Re: A Night At The Opera

      There ain't no sanity clause

  3. Brian Miller

    No, really, I read it and I have proof...

    What everybody misses with things like this is that you could fake it when given that assignment. Or else completely fill up their database with garbage. Anytime your data is sent back to someone in plain text, you should get in on the act, too. Give them more data than they had planned on receiving, not less. What would happen if everybody claimed to be reading the great classics of literature?

    1. Mark 85

      Re: No, really, I read it and I have proof...

      Not a bad idea, but go one better and get more bang for your buck. Add literature such as "The Communist Manifesto", "Mein Kampf", the Quran, the Bible, assorted writings by Mao, Trotsky, and maybe the ISIS crew. Then NSA, etc. will get involved. After a couple of weeks, go to children's books. They'll spend months looking for the connection and trying to figure out what you're up to.

      1. ZSn

        Re: No, really, I read it and I have proof...

        However, by that time they may have banged you up in Guantanamo bay/labelled you a child molester or both.

        How about sending them the EICAR test virus. It doesn't do any damage but may make their scanners have a fit?

        1. Alan J. Wylie

          Re: No, really, I read it and I have proof...

          I know about zip bombs and xml bombs, anyone know anything about json bombs?

          1. Michael Wojcik Silver badge

            Re: No, really, I read it and I have proof...

            I know about zip bombs and xml bombs, anyone know anything about json bombs?

            I don't know offhand of an easy way to create a JSON "bomb" of that sort - i.e., an amplification attack. Compression-format bombs are obvious (create a data stream that decompresses maximally), and XML bombs are based on reference compression using entities. JSON is a simple flattened data format; it doesn't incorporate references to its own contents.

            I suppose you could do something with Unicode transformation formats, if you know that the recipient will transcode into UTF-8. Then you could pick UTF-16 as the source format and send JSON strings containing characters that transcode into more than two bytes. It's a pretty weak attack.

            That said, if you know what the recipient is going to do with the JSON data, opportunities abound for misuse. Considerable care has to be taken in the parsing and handling of JSON data. The format tempts coders into simply eval'ing it (often as a "temporary" approach that becomes lingering technical debt), which means remote code execution; even when people try to parse it properly, they may not be sufficiently vigilant.

            There are likely better amplification attacks. If you have a website, fill it with hidden img or iframe elements that have http://adelogs.adobe.com as their source attribute value. Then whenever someone visits your page, their browser will pummel Adobe's server. Hidden links would make spiders do the same. Add scripting for even more attacks. And so on. Of course you shouldn't do this, as it would be unethical and might be illegal in some jurisdictions.

      2. Allan George Dyer
        Devil

        Re: No, really, I read it and I have proof...

        @Mark 85, good idea, but you don't mind if I use your user ID in the data, do you? Especially when it's page 87 of "Paedophillia and Bomb Making for Dummies".

        1. Mark 85
          Black Helicopters

          Re: No, really, I read it and I have proof...

          Too late. The NSA hacks have your post and on this.....

      3. Anonymous Coward
        Anonymous Coward

        Re: No, really, I read it and I have proof...

        well, from that selection it's plain what you're up to

        p.s. did you mention the ISIS, formerly known as...?

    2. Anonymous Coward
      Thumb Up

      Re: No, really, I read it and I have proof...

      Great idea, but I'm minded to keep it simple and just send back :

      " FUCK OFF YOU CHEEKY FUCKERS"

      1. Anonymous Coward
        Anonymous Coward

        Re: No, really, I read it and I have proof...

        Editing your hosts file might be more effective. I believe 127.0.0.1 is a good address for this stuff.

        1. P. Lee

          Re: No, really, I read it and I have proof...

          Free proprietary software. If you're not paying for it, guess what the product is!

          > Editing your hosts file might be more effective.

          "Meh"

          /me goes back to reading in okular.

      2. Anonymous Coward
        Anonymous Coward

        Re: No, really, I read it and I have proof...

        @JustKos

        Actually, you know, that's almost worth a script + cron to randomly generate garbage with chucklesome data in it. especially moving from the last page to the first page backwards in timestamps, also.

        Anon, just in case I do it and shove it onto pastebin this weekend...

    3. Eddy Ito

      Re: No, really, I read it and I have proof...

      That was exactly my first thought, if they want data well by all means send them data until their little spy server keels over and there is absolutely nothing they can do about it. Sure they might say they experienced a DDOS attack but how can they prove you and a billion of your closest friends aren't flipping through every page of every book ever written as fast as you possibly can, simultaneously of course? It kind of gives new meaning to the term 'book club'.

      1. MarkSitkowski

        Re: No, really, I read it and I have proof...

        Actually, you don't need e-books or Adobe.

        Sent in clear, you say? To an address quoted in the article?

        Ten lines of 'C' embedded in a tight loop will send them data like they never saw before, at the maximum rate that ADSL is capable of. I, personally, would recommend sending binary files, in the hope that they have carelessly-written analysis software, reading all this data.

        Maybe that's just the romantic in me...

    4. tempemeaty

      Re: No, really, I read it and I have proof...

      I got one to send them, "Orwell 1984"

      1. DropBear

        Re: No, really, I read it and I have proof...

        As much as I keep that book in high regard, recent developments caused it being referred to so bloody often that it pretty much lost all its meaning by now. It's not the book's fault, but its "punch" has been diluted worse than the proverbial "wolf!" outcry (except of course we really DO have that many "wolves" around, sadly).

  4. channel extended
    Joke

    Copyright enforcement?

    Obviously, collecting all of this data is to help enforce copyright. If I have done nothing wrong I have nothing to hide?

    The fact that this data will likely be sold to advertisers, for a profit, is just GOOD business.

    1. I ain't Spartacus Gold badge
      FAIL

      Re: Copyright enforcement?

      Are Adobe competent enough to be able to monetise all the lovely data they're picking up?

      I wouldn't mind all that, if the software wasn't the most unutterable piece of shit I've ever had the misfortune to deal with. Actually that's unfair, I'm sure I've dealt with worse, maybe.

      You can't change the text size on their reader. Amazing! I was setting it up for an aquaintance's wife who has macular degeneration. Sadly she's also got arthritis, so a tablet's not really suitable either. And they'd already got a laptop before I could persuade them to get something else. But they wanted library service books, so have to use Digital Editions.

      Except you can't read in fucking digital editions becauase your only option is 12 pt type. I don't think it did voice either, but anyway that's no good - as artificially read text is a real aquired taste.

      So next option was to use some competent reading software on said laptop. But no. You can authorise the copyright so you can read on other devices, but not on the PC itself. Horrible pile of crap. Maybe it's improved since. I'd have just broken the encryption, it's apparently easy enough, but that wasn't a process an IT illiterate couple in their late 70s were going to be capable of.

  5. James 51

    I thought this kind of spyware was suppose to be the argument against pirated software. Adobe keep making the pirate's arguments for them. Hope the EU smack the around. Worth complaining to the data commissioner about?

    1. Anonymous Coward
      Anonymous Coward

      Worth complaining to the data commissioner about?

      In your dreams, sir, The ICO is a civil service bureaucrat rather than a policeman for a specific reason. And the penalties are limited to legit-SME frighteners for the same reason.

    2. Anonymous Coward
      Anonymous Coward

      Worth complaining to the data commissioner about?

      Nah, the ICO doesn't have the right powers for this, too soft. As far as I can tell, they are accessing parts of your computer entirely without your permission. What else you read is none of their business and they're not law enforcement either so this is as far as I can tell a straight up criminal offence of a worse nature than the Sony rootkit.

      They need to be properly prosecuted for this. Otherwise, if they are allowed to do it you cannot convict a hacker either.

      1. Voland's right hand Silver badge

        The UK ICO does not

        The UK one does not and the politicos will ensure that it never will (even if this means alignment to common goals with Belarus with regards to human rights).

        However, I would not be so sure about the German, Austrian and/or Scandinavian equivalents of an ICO... Hmm... Those may be worth writing a letter to (if you can manage the apropriate teutonic or viking speak).

  6. John McCallum

    Adobe and eBooks

    Ahh but Adobe did sell eBooks it was run for them by Overland or some such biz bought a couple of them myself they only turned of the servers about a year or so ago.

  7. Erik4872

    Surprised this still happens

    One thing software companies should realize by now is that anything they release is going to have the debugger run over it, have its network data transmission scrutinized, etc. by someone, and the results will be blogged about. I'm assuming this is just some developer testing feature that got left on...software companies wouldn't send this kind of data in cleartext.

    One would think that if a software company wanted to collect analytics in a way that violated the terms and conditions, it would at least be encrypted and set to be dribbled out at random intervals or embedded in the DRM requests to make detection more difficult.

    1. Anonymous Coward
      Anonymous Coward

      Re: Surprised this still happens

      "I'm assuming this is just some developer testing feature that got left on"

      I'm not assuming that, I'm assuming that it was done on purpose and they didn't think they'd get found out.

      I'm more willing to accept the plain text bit was a mistake, but not the phoning home.

    2. Chairo

      Re: Surprised this still happens

      I'm assuming this is just some developer testing feature that got left on

      Sure, with two servers, connected to the internet that receive user data of a million readers. These just happened to be set up by accident and no-one noticed...

      (Where is the irony icon?)

    3. nijam Silver badge

      Re: Surprised this still happens

      ... and I'm assuming that (a) they're too stupid to write good software; (b) too stupid to understand they're breaking the law; and (c) too stupid to hide (a) and (b).

      Actually, (a) is an observation, not an assumption.

  8. phil dude
    FAIL

    okular...ghostview...

    A few opensource ways of avoiding Adobe.

    Okular is very nice. Ghostview is much older, but maybe more familiar.

    P.

    1. Intractable Potsherd

      Re: okular...ghostview...

      Do either of those avoid the requirement to initially open an Adobe DRMed ebook bought from Kobo in the Adobe reader on first reading? It is a constant irritation that I have to do that prior to stripping the DRM via the Apprentice Alf plugin for Calibre and turning the file into an epub. I'd much rather have nothing to do with Adobe at all.

  9. choleric

    Really?

    At one and the same time I roll my eyes utterly unsurprised...

    And yet I also simply cannot believe that a major internet company can still commit such a faux pas.

    1. Triggerfish

      Re: Really?

      Its only a faux pas to us when they are caught, whereas its seemingly the norm for companies these days to do this sort of crap.

      1. Anonymous Coward
        Anonymous Coward

        Re: Really?

        it's faux pas because they sent it in the clear. If it were encrypted, who'd find out what they're sending? And even if somebody did, they'd say: "Look, we did encrypt it to "protect your privacy, okey?!"

  10. This post has been deleted by its author

  11. BongoJoe

    192.150.16.235

    One for the firewall, methinks.

    1. Infernoz Bronze badge
      Big Brother

      Re: 192.150.16.235

      Just added to my fibre router CSM >> URL Content Filter (URL blacklist) as adelogs.adobe.com; that way they can't sneak past by changing the IP address or by using load balancer.

      All the worst URLs get blocked at my router, so that all my devices are protected.

      1. BongoJoe

        Re: 192.150.16.235

        Thanks for that; that's gone into the every enlarging HOSTS file.

    2. Alan J. Wylie

      Re: 192.150.16.235

      and another: 193.104.215.0/24

      $ host adelogs.adobe.com

      adelogs.adobe.com is an alias for adelogs.wip4.adobe.com.

      adelogs.wip4.adobe.com has address 193.104.215.99

      $ whois 193.104.215.99

      inetnum: 193.104.215.0 - 193.104.215.255

      netname: ADOBE-NET

      descr: Adobe Systems Software Ireland Ltd.

      country: IE

  12. Anonymous Coward
    Anonymous Coward

    Software terms and conditions

    > It's also a possible breach of the software's terms and conditions, which state:

    Dear Adobe,

    Thank-you for confirming that you do not consider the terms and conditions distributed with your software to be binding on yourselves. I, for my part, do not consider them to be binding on myself. Having reached agreement on this happy state, I intend to use your software without further payment and to disseminate it as I see fit.

    Yours etc.

  13. yoganmahew

    Never mind all that privacy stuff, do all these companies think we are made of bandwidth?!

  14. Mark Allen
    WTF?

    Copyright

    What about the copyright on the eBooks themselves? Surely this is Adobe stealing copies of the books and transmitting a copy to their own server without the permission of the original author?

  15. Vociferous

    Plaintext over http?

    So one could easily open a connection and pump over a couple of gigs of junk?

    Haha I wonder if their buffers overflow easily.

    1. Dan 55 Silver badge

      Re: Plaintext over http?

      Of course they do, that's why Flash and Reader get updates every two weeks.

      1. P. Lee

        Re: Plaintext over http?

        > Of course they do, that's why Flash and Reader get updates every two weeks.

        My pet theory is that the updates are there to keep the product at the front of people's minds. That makes them important in enterprise thinking and mindshare.

Page:

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like