Maybe.įor just the temp files removals, consider Glary Utilities as an alternative. Other tools, like Geek Uninstaller can handle almost all program removals, but the CCleaner ability to remove even the baked-in Windows Store Apps is a reason to maybe keep CC around. I almost never use the other CCleaner features. Not worth it for a little temp files cleanup and unnecessary Registry entries removals. Removing that Avast program every month involves going into Windows 10 Safe Mode and running a special Avast Removal Tool. If it definitively prevents the drive-by installation of Avast Free Antivirus, this alone would make me think seriously about using ccPortable instead of their installed version. But their continuous silence on this issue - whilst actively responding to other feedback at the same Piriform forum - implies that the above-mentioned behaviour is not a bug but an embedded feature. non-transparently testing out CCleaner on end-users). So far, the developers have kept mum on how the above hiding & un-hiding act is effected (ie. You can block the above web domains using the Windows HOSTS file or a firewall, but this is akin to a whack-a-mole exercise, since Piriform/AVAST can change the URLs at will.Īlso from v () onwards, CCleaner upon every launch auto adds (& re-adds) additional “whitelisted” cookies to keep:ģ) Furthermore, users have complained about sections of “experimental” features mysteriously appearing, disappearing & re-appearing in CCleaner’s GUI between launches, even though they have not updated CCleaner, & the file hashes of the main binaries ( CCleaner.exe, CCleaner64.exe) remain unchanged. Note:- For each version, identical CCleaner.exe & CCleaner64.exe binaries are used for the 3 respective builds from the developer: “Standard” (PUP-bundled) installer, “Slim” (no PUPs) installer, as well as the Portable ZIP archive.Īs such, if CCleaner binaries were to be again tainted at source - ala the Floxif/Nyetya backdoor trojan supply-chain hack (which Piriform, AVAST & practically all malware scanners failed to detect) - ccPortable PAF would be equally compromised as well.Ģ) As for data mining & user privacy issues, CCleaner from v (released: ) onwards is known to connect to various URLs during its runtime, such as:ĬCleaner sends info such as the user’s IP address, ISP name, GPS coordinates, city/country, timezone, CCleaner launch timestamps, views, button clicks, types of junk cleaned from system, other running apps when CCleaner is is use, etc. The wrapper happens to extract the binaries contained in the “Standard” installer build from the developer. Daraghy: “How does the use of ccPortable address the issues of data user collection and bundling that tainted cCleaner to begin with for many of us?”ġ) ccPortable PAF does NOT prevent user data mining by the recent versions of CCleaner, because the PAF wrapper does not modify the binaries obtained from source.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |