Author's Opinion

The views in this column are those of the author and do not necessarily reflect the views of iTWire.

Have your say and comment below.

Sunday, 08 March 2015 21:25

uTorrent demonstrates value of open source software


Can you trust the software on your computer does what it states, and nothing else? uTorrent has proven the value of open source software by mistreating the trust of its users.

uTorrent is a closed-source, proprietary bitTorrent client. It has been popular since its inception because it offered many features in a tiny package. It was not bloated or slow like previously popular clients such as Azureus, or its successor, Vuze.

Yet, uTorrent was never fully trusted by select private Torrent sites. As a closed source system there was no guarantee privacy was fully respected. Often the latest version of uTorrent was banned from use with private trackers until it had been fully tested and investigated, meaning many uTorrent users had to remain on older versions to continue using these private trackers.

The latest release of uTorrent — version 3.4.2 — has demonstrated, like Lenovo with SuperFish, that companies are prepared to install harmful products on your computer in exchange for cash. Specifically, uTorrent bundled a bitcoin miner called Epic Scale. This application is installed with uTorrent and harvests your CPU cycles, slowing down your computer and consuming power.

Some debate has occurred over whether uTorrent could be installed without Epic Scale. Some users state they did not receive any warning about it despite opting out of other bundled applications (labelled "offers"). Some state the installer advised about this product but would not proceed if the user opted out, making it mandatory.

uTorrent's developers state there is no silent install happening and that users are accepting the offer during install.

Some consider uTorrent has backflipped and did make Epic Scale a silent and mandatory part of the installation but quickly released a revised installer which permitted opting out after Internet backlash began.

There is controversy over how easy Epic Scale is to uninstall. Some users state it does not show in the "Programs and Features" control panel and required anti-adware software to remove it. Epic Scale itself assets the application can be uninstalled, but conceded the uninstaller leaves behind registry keys.

Whatever is true or not true, what is undeniable is that trust has been eroded. With that comes speculation about what else may be inside the source code of an app that simply cannot be audited and compiled by others.

Unlike the Linux kernel, unlike the Deluge torrent client (now growing in popularity as a result), unlike many popular tools such as 7-Zip, mRemoteNG and Filezilla, users just cannot have confidence and certainty uTorrent does not contain any other surprises.

While the "open source" aspect of "open source software" is only one part of the free and open source software movement it is an important one, and uTorrent 3.4.2 reinforces that message.



Recently iTWire remodelled and relaunched how we approach "Sponsored Content" and this is now referred to as "Promotional News and Content”.

This repositioning of our promotional stories has come about due to customer focus groups and their feedback from PR firms, bloggers and advertising firms.

Your Promotional story will be prominently displayed on the Home Page.

We will also provide you with a second post that will be displayed on every page on the right hand side for at least 6 weeks and also it will appear for 4 weeks in the newsletter every day that goes to 75,000 readers twice daily.


talentCRU FREE WEBINAR INVITE - Cybersecurity in COVID-19 times and beyond

With the mass transition to remote working, our businesses are becoming highly dependent on the Internet.

So, it’s no surprise that we’ve seen an increase in cyberattacks.

However, what’s more concerning is that just 51% of technology professionals are highly confident that their cybersecurity teams are able to detect and respond to these threats.

Join us for this free online roundtable where our experts discuss key cybersecurity issues IT leaders are facing during the pandemic, and the challenges that will likely emerge in the coming years.


David M Williams

David has been computing since 1984 where he instantly gravitated to the family Commodore 64. He completed a Bachelor of Computer Science degree from 1990 to 1992, commencing full-time employment as a systems analyst at the end of that year. David subsequently worked as a UNIX Systems Manager, Asia-Pacific technical specialist for an international software company, Business Analyst, IT Manager, and other roles. David has been the Chief Information Officer for national public companies since 2007, delivering IT knowledge and business acumen, seeking to transform the industries within which he works. David is also involved in the user group community, the Australian Computer Society technical advisory boards, and education.




Recent Comments