-
-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Devlooped.SponsorLink analyzer should not contain obfuscated code #9
Comments
That would make it trivial to bypass the SponsorLink check. So, this is by design at this point unless there's serious concerns raised by a large portion of users. |
What constitutes a large portion of users? The introduction of this package into Moq has spawned a significant number of concerns over that package's viability in any F/OSS or Corporate environment. |
Developers are not going to accept telemetry without transparency. |
"Trust me bro" isn't much of an assurance when it comes to running arbitrary code on the user's machine. |
@kzu I'd say serious concerns have now been raised. The vast majority of users don't even know this change has been made and would have a problem. Trust with moq is now broken as has GDPR. This is underhanded to say the least. Be one of the good guys. |
Why should it not be trivial to bypass? |
Because if it's trivial to bypass, nobody would donate and we'd be back to the same situation that sparked the desire to get funding? Yes, I'd consider serious concerns have been raised. I'm evaluating bringing the analyzer code over to this repo. I'd like to bring it with its commit history so that it's clear how it came about too. Need to brush up my git-fu :) |
This exact mindset is likely going to incentivize people further to challenge this assumption and work harder on cracking down on whatever obfuscation you've applied. Clearly you've not researched how determined reverse engineers can be against such challenges. |
I think the point is, this funding model is inherently dishonest and should be abandoned immediately. |
So you are basically using an extortion tactic. I.e. "I will not stop snooping on you and annoying you, until you start paying and then we'll call you my sponsor."
Unfortunately it looks like too little, too late. 😞 An acceptable solution could be one where the package displays an information message in IDE, asking the user to be a sponsor (without extracting and divulging any data), explaining how you can become one and how you can suppress this message or (better) showing you a link to a page where you can read how to become a sponsor and how to suppress the message. All in all, there's probably a multitude of ways to do this, without harvesting personal data without consent and without annoying people, as both of those tend to rather drive people away, instead of bringing new sponsors in. |
Any skilled .NET engineer possesses the capability to bypass through this obfuscated code. I am convinced that any motivated individual could do so, as even dead de4dot can still dismantle a portion of the obfuscation present in the DLL, also replacing some IL code is not a problem nowadays as well. However, I'm skeptical that any reputable software engineer would do it, but if they do, I doubt they would sponsor whoever uses This is not the main point tho. By obfuscating and keeping the source code closed, you create a barrier for audits, especially in highly secure environments. You are attempting to conceal the inner workings of your program, but there is no assurance that a future update of I strongly believe that projects like these libraries should prioritize transparency. The primary goal of this library should revolve around capturing developers' attention, highlighting its donation avenues, and encouraging sponsorship if feasible. This is why I'm puzzled by the idea of obfuscation – after all, those uninterested in sponsoring won't be swayed regardless. |
It's easier to send few bucks than trying to figure out how to bypass message somewhere (even trivial one). Even your obfuscated closed source solution can be bypassed after all 🤷 - this cannot justify malware-ish behaviour of this library. |
It is already trivially by-passable but just putting fake email/user in And about the obfuscation part: on one hand, people who don't want to pay, would still not want to pay and find a way to bypass. On the other hand, people ready to pay a sponsorship would like to be able to trust the package, which in this case they can't because of the leakage of PII. |
Any obfuscated analyser should be treated as virus/spyware. Will be blocking and reporting. |
Analyzer and backend is all OSS in this repo now too. Locking this thread as a consequence. |
See the title. Users need to be able to understand the code being injected into a build. This is important for transparency and trust.
The text was updated successfully, but these errors were encountered: