<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: Winn on Adware Contracts	</title>
	<atom:link href="https://blog.ericgoldman.org/archives/2006/04/winn_on_adware.htm/feed" rel="self" type="application/rss+xml" />
	<link>https://blog.ericgoldman.org/archives/2006/04/winn_on_adware.htm</link>
	<description></description>
	<lastBuildDate>Mon, 31 Jul 2006 21:44:23 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>
		By: Eric Goldman		</title>
		<link>https://blog.ericgoldman.org/archives/2006/04/winn_on_adware.htm#comment-364</link>

		<dc:creator><![CDATA[Eric Goldman]]></dc:creator>
		<pubDate>Mon, 31 Jul 2006 21:44:23 +0000</pubDate>
		<guid isPermaLink="false">http://blog.ericgoldman.org/archives/2006/04/winn_on_adware.htm#comment-364</guid>

					<description><![CDATA[It reminds me a little of how cashiers will push the &quot;OK&quot; button on the ATM/credit card unit at the grocery store.  If a user doesn&#039;t consent, then they don&#039;t consent!  Eric.

]]></description>
			<content:encoded><![CDATA[<p>It reminds me a little of how cashiers will push the &#8220;OK&#8221; button on the ATM/credit card unit at the grocery store.  If a user doesn&#8217;t consent, then they don&#8217;t consent!  Eric.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Wayne Porter		</title>
		<link>https://blog.ericgoldman.org/archives/2006/04/winn_on_adware.htm#comment-363</link>

		<dc:creator><![CDATA[Wayne Porter]]></dc:creator>
		<pubDate>Thu, 04 May 2006 06:33:49 +0000</pubDate>
		<guid isPermaLink="false">http://blog.ericgoldman.org/archives/2006/04/winn_on_adware.htm#comment-363</guid>

					<description><![CDATA[Eric,

I am curious what about situations like a &quot;send keys&quot; attack which we have seen with the circumvention of 180solutions S3 technology. By all means from the adware vendors view it looks like a valid EULA acceptance, but in reality the EULA click is &quot;faked&quot; by hacking the technology.

Reference:

http://blog.spywareguide.com/2006/02/sometimes_i_hate_being_right.html

http://blog.spywareguide.com/2006/02/another_small_piece_of_the_puz.html

]]></description>
			<content:encoded><![CDATA[<p>Eric,</p>
<p>I am curious what about situations like a &#8220;send keys&#8221; attack which we have seen with the circumvention of 180solutions S3 technology. By all means from the adware vendors view it looks like a valid EULA acceptance, but in reality the EULA click is &#8220;faked&#8221; by hacking the technology.</p>
<p>Reference:</p>
<p><a href="http://blog.spywareguide.com/2006/02/sometimes_i_hate_being_right.html" rel="nofollow ugc">http://blog.spywareguide.com/2006/02/sometimes_i_hate_being_right.html</a></p>
<p><a href="http://blog.spywareguide.com/2006/02/another_small_piece_of_the_puz.html" rel="nofollow ugc">http://blog.spywareguide.com/2006/02/another_small_piece_of_the_puz.html</a></p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
