Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I don't trust it because it is a closed source binary and there is a lack of detailed documentation of exactly what settings it changes.


You could run it in a VM and see what changes are made. Given that Jotti by and large says it is benign (very few positive results), it's probably okay. Such trojan flagging as you see here is frequently a result of binary compression or packing.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: