New top story on Hacker News: Ask HN: Why does Zoom Desktop examine all processes and arguments?

Ask HN: Why does Zoom Desktop examine all processes and arguments?
90 by neolog | 34 comments on Hacker News.
Looking at syscalls, I see Zoom desktop reads all processes and arguments. [pid 3844872] stat("/proc/1", {st_mode=S_IFDIR|0555, st_size=0, ...}) = 0 [pid 3844872] openat(AT_FDCWD, "/proc/1/stat", O_RDONLY) = 4 [pid 3844872] openat(AT_FDCWD, "/proc/1/cmdline", O_RDONLY) = 4 [pid 3844872] readlink("/proc/1/exe", 0x20c0520, 1024) = -1 EACCES (Permission denied) [pid 3844872] stat("/proc/2", {st_mode=S_IFDIR|0555, st_size=0, ...}) = 0 [pid 3844872] openat(AT_FDCWD, "/proc/2/stat", O_RDONLY) = 4 [pid 3844872] openat(AT_FDCWD, "/proc/2/cmdline", O_RDONLY) = 4 [pid 3844872] stat("/proc/3", {st_mode=S_IFDIR|0555, st_size=0, ...}) = 0 [pid 3844872] openat(AT_FDCWD, "/proc/3/stat", O_RDONLY) = 4 [pid 3844872] openat(AT_FDCWD, "/proc/3/cmdline", O_RDONLY) = 4 ... Why would it do that? Is there any way to prevent it?

No comments:

Post a Comment