TonyW, I agree. It reflects well on Prevx that PrevxHelp has been willing to share his perspectives in this thread. Hopefully, Symantec will...
Fax, of course, you’re right. I can’t speak for others, but my intention in participating in this thread is to explore (and therefore learn...
Stap0510, from my perspective, the key underlying issue is not primarily the developer’s identity per se, but is FIPS 140-2 validation. If the...
PrevxHelp, Symantec “jumps in” when the executable is being downloaded and saved to the user’s PC -- even before the user attempts to run the...
PrevxHelp, even under this architecture in which users’ “anonymous data” is uploaded into your cloud for malware analysis, it is still possible to...
PrevxHelp, Symantec estimates that it will create 2.5 million antivirus signatures in 2009 (here). I am extremely incredulous that most (or even...
Speaking of “receptive to influence,” it is my understanding that the developers historically have had a penchant for deleting posts in the...
PrevxHelp, according to this thread (see posts #42 and #58 ), Norton Internet Security 2010 transmits only a hash of a file to their cloud (and no...
RottenBanana, while we’re temporarily “off-topic,” I admit that I too might be inclined to purchase Prevx as a supplementary anti-malware...
Fly, in my opinion, if any aspect of the protection provided by TrueCrypt is dependent upon knowledge held by the developers, then there is...
PrevxHelp, yes -- that’s the point. Given the similarity of performance, it’s difficult to argue that Prevx’s technology is a “supercar” and...
Leonid, I too can’t think of a reason why the TrueCrypt developers wish to remain anonymous -- but, I’m open to changing my perspective if a valid...
PrevxHelp, looking from the “outside in,” I need to question this statement. Even if the assertion were only half true, then we should expect to...
PrevxHelp, this review is woefully out of date, given the advances integrated into NIS10. I highly doubt it would be accurate to extrapolate...
PrevxHelp, now that we’ve established the fact that a larger userbase contributing to reputation ratings results in superior protection (all else...
PrevxHelp, yes -- you are correct. I am making the assumption that “Symantec has exactly the same implementation and protection as Prevx” as you...
PrevxHelp, I think that the “diagram” I provided may have been inadvertently misleading. I understand that Symantec may classify a sample as...
PrevxHelp, I take you at your word that the collection of “reputation variables” used by Prevx is similar to that used by Symantec. Yet, the point...
PrevxHelp, could the difference between the use of reputation information by other vendors versus Symantec be the following? While other vendors...
Macstorm, yes, I do agree -- kudos to PrevxHelp for interjecting insights into this thread. :thumb: I hope his presence continues (even if we...
Gerard, what is the rationale behind the decision of the TrueCrypt developers to remain anonymous? Note that the suggested inspection activity...
PrevxHelp, Symantec isn’t releasing details of how all of its decision engines within NIS10 integrate with one another (for obvious reasons), but...
PrevxHelp, I agree that it’s a “terrible mentality” if you are referring to market share -- because, as you imply, it would shrivel innovation....
PrevxHelp, there are two facets of “data” in this context: breadth and depth. While the depth may (?) be similar for the two companies, Symantec...
Symantec has published some information about the new SONAR 2 technology used within Norton Internet Security 2010…
Separate names with a comma.