- What is Outfoxed?
- A Third Phase of Internet Search
- Comparison to Existing Systems
- Socially aware surfing and shopping
- Three Magic Ingredients
- Keeping your network clean
- Small World Networks
- Calculating Levels of Trust
- Tagging and Folksonomy
- What Outfoxed is Not
Files & Processes
Outfoxed can give reports on anything that can be uniquely identified. (To be precise, anything that can be specified by a URI.) Of course it's easy to change the name of files, but there exist algorithms that can generate a unique "fingerprint" for any file. Should the file change --even by a single bit-- then the fingerprint will be different. (Examples of these algorithms are MD5 and SHA-1.) These fingerprints can be used in a URI, which can then be reported.
For example, a software publisher can make a list containing the fingerprints of their products even though their software is actually distributed through a system of mirrors or via Bittorrent. If you download the file, Outfoxed checks the file's fingerprint and looks for reports in your informer network. If the publisher is one of your informers, then you'll know right away that you have the right version and that it hasn't been tampered with.
Outfoxed also adds functionality to local file browsing, allowing you to check the validity or add reports about any file on your system.
Have you ever looked at the Windows Task Manager and wondered what LTSMMSG.exe or ctmmon.exe were? Maybe spyware, or maybe some critical component of the operating system? This information can be found with a few online searches, but Outfoxed automates the process and makes it easy--even for my mom.
This feature is no replacement for good anti-virus and anti-spyware software, but it gives a good overview. It is also a good argument for why trust should be integrated at the OS level. (Described here)