Home Open Sauce ESET spreading FUD about torrent files, clients

Author's Opinion

The views in this column are those of the author and do not necessarily reflect the views of iTWire.

Have your say and comment below.

Anti-virus companies — or cyber security companies as they like to call themselves these days — are known for spreading fear, uncertainty and doubt among computer users due to the poor level of education among them.

After this kind of exercise, the user is offered the universal panacea – some product or information from the company that is spreading the misinformation.

But ESET has taken this to a new level by issuing a blanket warning to users to view torrent files and clients as a threat.

The warning came from the company's so-called security evangelist Ondrej Kubovič, who used extremely patchy data to try and scare the bejesus out of computer users.

Like all such attempts at FUD, his treatise ended with a claim that ESET was the one true source whereby users could obtain "knowledge" to protect themselves. "If you want to stay informed and protect yourself by building up your knowledge, read the latest pieces by ESET researchers on WeLiveSecurity," he wrote.


Kubovič used the case of Transmission — a BitTorrent client that was breached in March and August 2016 with malware implanted and aimed at macOS users — to push his barrow.

But to use this one instance to dissuade people from downloading BitTorrent clients en masse is nothing short of scaremongering. There are dozens, if not more, BitTorrent clients which enjoy much wider usage, with uTorrent being one good example.

Kubovič then used the old furphy which is resorted to by those who lobby on behalf of the copyright industry – torrents are mostly illegal files and downloading them is Not The Right Thing To Do™.

But then he failed to mention that hundreds of thousands of perfectly legitimate files are also offered as torrents – for instance, this writer regularly downloads images of various GNU/Linux distributions using a BitTorrent client because it is the more community-friendly thing to do, rather than using a direct HTTP link and hogging all the bandwidth available.

What about files that are used to spread Windows malware – .doc files, .xls files, .exe files, and so on? Kubovič did not appear to have recollection of any of these dangers.

Now it is true that many files which are offered through torrent sites contain malware, adware, trojans, and many other delights which are mostly aimed at unsuspecting Windows users.

But Kubovič did not mention any operating system as opening one to danger; like many others in his industry he probably does not want to anger Microsoft, the reason why most people write malware, and the company many people have dubbed the Typhoid Mary of the Internet.

Given the number of online threats to users these days, especially those who persist in using Windows, anti-virus firms should be adopting a more responsible attitude rather than spreading gross generalisations about this file format or that.

Shame on ESET for stooping to such tactics.


With 4 keynotes + 33 talks + 10 in-depth workshops from world-class speakers, YOW! is your chance to learn more about the latest software trends, practices and technologies and interact with many of the people who created them.

Speakers this year include Anita Sengupta (Rocket Scientist and Sr. VP Engineering at Hyperloop One), Brendan Gregg (Sr. Performance Architect Netflix), Jessica Kerr (Developer, Speaker, Writer and Lead Engineer at Atomist) and Kent Beck (Author Extreme Programming, Test Driven Development).

YOW! 2018 is a great place to network with the best and brightest software developers in Australia. You’ll be amazed by the great ideas (and perhaps great talent) you’ll take back to the office!

Register now for YOW! Conference

· Sydney 29-30 November
· Brisbane 3-4 December
· Melbourne 6-7 December

Register now for YOW! Workshops

· Sydney 27-28 November
· Melbourne 4-5 December



Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips


Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the sitecame into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.


Popular News




Sponsored News