<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="http://fileformats.archiveteam.org/skins/common/feed.css?303"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>http://fileformats.archiveteam.org/index.php?action=history&amp;feed=atom&amp;title=Superfish</id>
		<title>Superfish - Revision history</title>
		<link rel="self" type="application/atom+xml" href="http://fileformats.archiveteam.org/index.php?action=history&amp;feed=atom&amp;title=Superfish"/>
		<link rel="alternate" type="text/html" href="http://fileformats.archiveteam.org/index.php?title=Superfish&amp;action=history"/>
		<updated>2026-05-04T14:03:17Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.19.2</generator>

	<entry>
		<id>http://fileformats.archiveteam.org/index.php?title=Superfish&amp;diff=21146&amp;oldid=prev</id>
		<title>Dan Tobias at 05:13, 4 March 2015</title>
		<link rel="alternate" type="text/html" href="http://fileformats.archiveteam.org/index.php?title=Superfish&amp;diff=21146&amp;oldid=prev"/>
				<updated>2015-03-04T05:13:23Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class='diff diff-contentalign-left'&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
			&lt;tr valign='top'&gt;
			&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;← Older revision&lt;/td&gt;
			&lt;td colspan='2' style=&quot;background-color: white; color:black;&quot;&gt;Revision as of 05:13, 4 March 2015&lt;/td&gt;
			&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 3:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 3:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;|subcat=Security&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;|subcat=Security&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;}}&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;background: #ffa; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;'''Superfish''' is a program that was formerly factory-installed on Lenovo computers, designed to inject extra ads into the users' web browsing experience (to &amp;quot;enhance consumer experience&amp;quot; by suggesting related products, or so was claimed). It turned out that it put its own self-signed secure certificate in place to interject itself even in SSL-based secure web transactions, creating an enormous security hole for its users which could be exploited by hackers even if Superfish itself didn't abuse the information about users it could obtain. Superfish used a library from a company called &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Kommodo&lt;/del&gt;, which uncreatively used '&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;kommodo&lt;/del&gt;' as the internal password for unlocking its certificate data.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;background: #cfc; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;'''Superfish''' is a program that was formerly factory-installed on Lenovo computers, designed to inject extra ads into the users' web browsing experience (to &amp;quot;enhance consumer experience&amp;quot; by suggesting related products, or so was claimed). It turned out that it put its own self-signed secure certificate in place to interject itself even in SSL-based secure web transactions, creating an enormous security hole for its users which could be exploited by hackers even if Superfish itself didn't abuse the information about users it could obtain. Superfish used a library from a company called &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Kommodia&lt;/ins&gt;, which uncreatively used '&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;kommodia&lt;/ins&gt;' as the internal password for unlocking its certificate data.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;== Links ==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background: #eee; color:black; font-size: smaller;&quot;&gt;&lt;div&gt;== Links ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Dan Tobias</name></author>	</entry>

	<entry>
		<id>http://fileformats.archiveteam.org/index.php?title=Superfish&amp;diff=21145&amp;oldid=prev</id>
		<title>Dan Tobias: Created page with &quot;{{FormatInfo |formattype=electronic |subcat=Security }} '''Superfish''' is a program that was formerly factory-installed on Lenovo computers, designed to inject extra ads into...&quot;</title>
		<link rel="alternate" type="text/html" href="http://fileformats.archiveteam.org/index.php?title=Superfish&amp;diff=21145&amp;oldid=prev"/>
				<updated>2015-03-04T05:12:23Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;quot;{{FormatInfo |formattype=electronic |subcat=Security }} &amp;#039;&amp;#039;&amp;#039;Superfish&amp;#039;&amp;#039;&amp;#039; is a program that was formerly factory-installed on Lenovo computers, designed to inject extra ads into...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{FormatInfo&lt;br /&gt;
|formattype=electronic&lt;br /&gt;
|subcat=Security&lt;br /&gt;
}}&lt;br /&gt;
'''Superfish''' is a program that was formerly factory-installed on Lenovo computers, designed to inject extra ads into the users' web browsing experience (to &amp;quot;enhance consumer experience&amp;quot; by suggesting related products, or so was claimed). It turned out that it put its own self-signed secure certificate in place to interject itself even in SSL-based secure web transactions, creating an enormous security hole for its users which could be exploited by hackers even if Superfish itself didn't abuse the information about users it could obtain. Superfish used a library from a company called Kommodo, which uncreatively used 'kommodo' as the internal password for unlocking its certificate data.&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
* [https://m.facebook.com/notes/protect-the-graph/windows-ssl-interception-gone-wild/1570074729899339 Windows SSL Interception Gone Wild]&lt;br /&gt;
* [http://www.tripwire.com/state-of-security/security-data-protection/superfish-lenovo-adware-faq/ What You Need to Know About Superfish, The Man-in-the-Middle Adware Installed on Lenovo PCs]&lt;br /&gt;
* [http://www.slate.com/articles/technology/bitwise/2015/02/lenovo_superfish_scandal_why_it_s_one_of_the_worst_consumer_computing_screw.html You Had One Job, Lenovo]&lt;br /&gt;
* [http://blog.erratasec.com/2015/02/extracting-superfish-certificate.html Extracting the SuperFish Certificate]&lt;br /&gt;
* [https://mcgath.wordpress.com/2015/02/23/lenovo/ Blog discussion]&lt;br /&gt;
* [https://forums.lenovo.com/t5/Security-Malware/Potentially-Unwanted-Program-Superfish-VisualDiscovery/m-p/1860408/highlight/true Lenovo Community discussion]&lt;br /&gt;
* [https://web.archive.org/web/20150220024518/http://www.komodia.com/ad-injection-sdk/ Kommodia: Why you need ad injection SDK] (Internet Archive copy)&lt;br /&gt;
* [http://web.archive.org/web/20150219191531/http://news.lenovo.com/article_display.cfm?article_id=1929 Lenovo Statement on Superfish] (2015-02-19 Internet Archive copy)&lt;br /&gt;
* [http://web.archive.org/web/20150220180448/http://news.lenovo.com/article_display.cfm?article_id=1929 Lenovo Statement on Superfish] (2015-02-20 Internet Archive copy)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Malware]]&lt;/div&gt;</summary>
		<author><name>Dan Tobias</name></author>	</entry>

	</feed>