Sorry, this isn't a rumor or a myth (yet). It's a question and this seemed like the best area for it:
I've searched, but I can't find a clear answer on which files get hashed and submitted to the cloud. Imagine a scenario where you receive a sensitive Word document or PDF--let's say it's the Pentagon Papers--as an email attachment. Does this file ever get hashed and submitted? If so, can Webroot be subpoenaed to reveal which accounts submitted that hash for inspection?
Solved
Privacy hypothetical
Best answer by Kit
No hash data is sent to the cloud on anything that is not constructed of operational machine code (Program Executable, or PE). Not even in cases where files are extracted from archives, compressed or not. Documents extracted from archives are examined, just like by an old AV system, and when it's determined that they are not PE, there is no data hashed, sent, or retained in any location.
Also, acquirable non-modified information on a given file hash just includes the NUMBER of computers it was seen on, the geo-located country it was first seen in, the OS version, default browser, and a few internal things like the version of the file that was hashed, version of the WSA agent it was seen by, etc. Other information is anonymized instantly, for example, if the file was seen as C:UsersKitDesktopFile.exe, that is stripped to be %desktop%file.exe.
So basically, No. Webroot cannot see or provide information on every computer that scanned a specific file hash, especially not if it's not a PE. The most we could say is how many computers scanned it.
And also, No. Webroot does not maintain a history of all files seen by a given system indefinitely or even for a minor amount of time. As a good example, when I look up my home computer's keycode on the system, I see files that were included in the most recent non-trivial (Deep) scan, but not, for example, an executable on my desktop that I deleted two days ago.
Honestly, given the number of cache files, temp files, etc, keeping a cross-linked record of every single file out of thousands of transient files per day per computer across every one of millions of computers would be prohibitive, data-wise, and would not help protect computers against threats.
Edit: And no, document hashes, even with macros or scripts, do not get submitted.
View originalAlso, acquirable non-modified information on a given file hash just includes the NUMBER of computers it was seen on, the geo-located country it was first seen in, the OS version, default browser, and a few internal things like the version of the file that was hashed, version of the WSA agent it was seen by, etc. Other information is anonymized instantly, for example, if the file was seen as C:UsersKitDesktopFile.exe, that is stripped to be %desktop%file.exe.
So basically, No. Webroot cannot see or provide information on every computer that scanned a specific file hash, especially not if it's not a PE. The most we could say is how many computers scanned it.
And also, No. Webroot does not maintain a history of all files seen by a given system indefinitely or even for a minor amount of time. As a good example, when I look up my home computer's keycode on the system, I see files that were included in the most recent non-trivial (Deep) scan, but not, for example, an executable on my desktop that I deleted two days ago.
Honestly, given the number of cache files, temp files, etc, keeping a cross-linked record of every single file out of thousands of transient files per day per computer across every one of millions of computers would be prohibitive, data-wise, and would not help protect computers against threats.
Edit: And no, document hashes, even with macros or scripts, do not get submitted.
Reply
Login to the community
No account yet? Create an account
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.