Minichan

Topic: since Windows Vista, the default User Account Control makes confirmation popups whenever you access

boof started this discussion 1 year ago #117,828

the registry, or install a software. Presumably, this makes it harder for malware to operate. Why can't Windows tell the difference between me clicking the mouse to do a thing, and something happening through software without the user doing anything to initiate it?

Anonymous B joined in and replied with this 1 year ago, 2 minutes later[^] [v] #1,296,122

How would it tell the difference?

Software can control the position of the cursor, and some malware is introduced through peripheral devices. If you plug in a USB drive, and that drive tells the computer it's the users mouse, then Windows has no way to tell which is a legitimate control from the user.

Anonymous C joined in and replied with this 1 year ago, 1 minute later, 3 minutes after the original post[^] [v] #1,296,124

Because Windows is terrible. Mac OS is so much more elegant and usable and powerful and stable and secure.

boof (OP) replied with this 1 year ago, 2 minutes later, 6 minutes after the original post[^] [v] #1,296,125

@1,296,122 (B)
maybe they should make windows be able to tell that I'm using the fucking mouse somehow. maybe in hardware? these people should have some geniuses among them

also, if malware is that sophisticated, then why doesn't it already programmatically click the confirmation popups itself?

(Edited 1 minute later.)

dw !p9hU6ckyqw joined in and replied with this 1 year ago, 48 seconds later, 6 minutes after the original post[^] [v] #1,296,126

@1,296,124 (C)
It has vastly more security popups tho

Anonymous C replied with this 1 year ago, 4 minutes later, 11 minutes after the original post[^] [v] #1,296,127

@previous (dw !p9hU6ckyqw)
Mac OS? It really does not.

Anonymous B replied with this 1 year ago, 2 minutes later, 14 minutes after the original post[^] [v] #1,296,130

@1,296,125 (boof)
> if malware is that sophisticated, then why doesn't it already programmatically click the confirmation popups itself?

You answered your own question. There are teams of security researchers at Microsoft who have figured out that this is the most effective way to stop malware.

Jorge !l6aiEdTxng joined in and replied with this 1 year ago, 8 minutes later, 22 minutes after the original post[^] [v] #1,296,132

@1,296,125 (boof)

That does happen. But you are supposed to use a password to prevent them from automatically getting onto your sudo mode.

dw !p9hU6ckyqw replied with this 1 year ago, 37 minutes later, 59 minutes after the original post[^] [v] #1,296,140

@1,296,127 (C)
It really does

dw !p9hU6ckyqw double-posted this 1 year ago, 19 seconds later, 1 hour after the original post[^] [v] #1,296,141

Unless you the app store lol

Anonymous C replied with this 1 year ago, 5 minutes later, 1 hour after the original post[^] [v] #1,296,143

@1,296,140 (dw !p9hU6ckyqw)
It really doesn't. Thanks.

dw !p9hU6ckyqw replied with this 1 year ago, 13 minutes later, 1 hour after the original post[^] [v] #1,296,144

@previous (C)
See
@1,296,141 (dw !p9hU6ckyqw)

Anonymous F joined in and replied with this 1 year ago, 38 minutes later, 1 hour after the original post[^] [v] #1,296,151

There's a setting now in Windows for making the UAC popups not take full focus and black out the rest of the screen. Which is probably more secure and should be the default since you aren't forced to click an option to keep using your computer

boof (OP) replied with this 1 year ago, 6 hours later, 8 hours after the original post[^] [v] #1,296,191

@1,296,130 (B)

> > if malware is that sophisticated, then why doesn't it already programmatically click the confirmation popups itself?
>
> You answered your own question. There are teams of security researchers at Microsoft who have figured out that this is the most effective way to stop malware.

you are not making sense. if the malware indeed knows how to mimic confirmation popup mouse clicking, then why the fuck is it supposedly having any value to stop malware?

boof (OP) double-posted this 1 year ago, 4 minutes later, 8 hours after the original post[^] [v] #1,296,193

@1,296,132 (Jorge !l6aiEdTxng)
when operating an administrator account, the password is not asked for -- the confirmation click is asked for only.

tteh !MemesToDNA joined in and replied with this 1 year ago, 2 hours later, 11 hours after the original post[^] [v] #1,296,220

Since nobody has actually answered your question: the UAC prompt opens in "secure desktop mode", where the process runs in protected memory and interaction by any running process is restricted. Only Windows services can access secure desktop mode.

As for malware moving the mouse, it would need to have attained administrator privileges already to function during the UAC prompt, to my understanding. In which case you'd already be fucked.

(Edited 1 minute later.)

Anonymous F replied with this 1 year ago, 12 minutes later, 11 hours after the original post[^] [v] #1,296,225

@previous (tteh !MemesToDNA)
Can Bonzai Buddy click UAC prompts?

tteh !MemesToDNA replied with this 1 year ago, 2 minutes later, 11 hours after the original post[^] [v] #1,296,228

@previous (F)
Bonzai Buddy can click UAC prompts, because Microsoft explicitly whitelisted him due to him being a friendly little fellow who'd never get up to no good.

Anonymous B replied with this 1 year ago, 50 minutes later, 12 hours after the original post[^] [v] #1,296,235

@1,296,220 (tteh !MemesToDNA)

> As for malware moving the mouse, it would need to have attained administrator privileges already to function during the UAC prompt, to my understanding. In which case you'd already be fucked.

A lot of common apps are required to be run as administrator, usually under the pretext of updating said software.

boof (OP) replied with this 1 year ago, 20 hours later, 1 day after the original post[^] [v] #1,296,398

maybe the fuckin red eye on the HAL 9000 can look at me constantly and know it's me, Dave really
:

Please familiarise yourself with the rules and markup syntax before posting.