Ramblings of an old Doc
How to find out if you've got its Root Certificate
Published on February 23, 2015 By DrJBHL In Personal Computing

 

More good news.

Thanks to kryo, I went PrivDog hunting and lo and behold it fell into my lap - thanks to gHacks.

PrivDog will install a self signed root certificate on your system enabling mitm attacks.

So, here's the link with how to find if it's on your system...seems certain Comodo products shipped with it.

Anyway, the test site for Superfish was giving "false positives"...and PrivDog seems to be the reason.

The latest version of Comodo Dragon ships with PrivDog, but doesn't install a Root Certificate.

PrivDog is an "Ad switcher" like Superfish.

You should uninstall PrivDog, and the software it comes with and check for the root certificate this way:

  • Tap on the Windows-key, type mmc.exe and hit enter.
  • Go to File -> Add/Remove Snap-in
  • Pick Certificates, click Add
  • Pick Computer Account, click Next
  • Pick Local Computer, click Finish
  • Click OK
  • Look under Trusted Root Certification Authorities -> Certificates

Source:

http://www.ghacks.net/2015/02/23/privdog-is-superfish-all-over-again/?_m=3n%2e0038%2e1528%2ehj0ao01hy5%2e1l02

 


Comments
on Feb 23, 2015

and to think i used to use comodo..

adblockplus doens't fiddle with certificates... right? (why replace ads with other ads instead of just blocking them??? for free?)

 

here's the weird thing.. kaspersky safe money sort of does man in the middle certificate too.. it installs a cert to scan https to check for dodgy stuff..

on Feb 23, 2015

How will the root certificate be identifiable, doc?  Will it include the term PrivDog or Comodo in the entry?