| --- |
| description: Detect known spyware packages and suggest removal |
| tags: [security, spyware, privacy, audit, project, gitignored] |
| --- |
| |
| You are helping the user identify any software known to contain spyware or privacy issues. |
|
|
| ## Process |
|
|
| 1. **Check for known problematic software** |
| - Scan installed packages against known spyware list |
| - Common categories to check: |
| - Browser extensions |
| - "Free" VPN applications |
| - Screen recorders with telemetry |
| - System "optimizers" |
| - Certain proprietary drivers |
|
|
| 2. **Check for telemetry in common applications** |
| - VS Code vs VSCodium (telemetry difference) |
| - Ubuntu's whoopsie (error reporting) |
| - Canonical's snapd telemetry |
| - Google Chrome vs Chromium |
|
|
| 3. **Network activity monitoring** |
| - Check for suspicious outbound connections: `sudo netstat -tupn | grep ESTABLISHED` |
| - Identify processes making external connections |
| - Suggest using `wireshark` or `tcpdump` for deeper analysis |
|
|
| 4. **Known spyware patterns to check** |
| - Red Star OS components (North Korean) |
| - Chinese software with known backdoors |
| - Certain "free" antivirus software |
| - Keyloggers disguised as utilities |
| - Browser hijackers |
|
|
| 5. **Privacy-concerning legitimate software** |
| - Software with excessive telemetry: |
| - Ubuntu's apport (crash reporting) |
| - popularity-contest |
| - Some proprietary drivers |
| - Suggest privacy-respecting alternatives |
|
|
| 6. **Browser extension audit** |
| - Check Chrome/Firefox extension directories |
| - Identify extensions with excessive permissions |
| - Flag abandoned extensions (security risk) |
|
|
| 7. **Suggest privacy-focused alternatives** |
| - VS Code → VSCodium |
| - Chrome → Chromium or Firefox |
| - Zoom → Jitsi |
| - Windows telemetry remnants if dual-boot |
|
|
| ## Output |
|
|
| Provide a report showing: |
| - Any detected spyware (with severity level) |
| - Privacy-concerning software with excessive telemetry |
| - Suspicious network connections |
| - Recommended actions for each finding |
| - Privacy-focused alternatives to suggest |
|
|