Lenovo’s Superfish has generated a lot of criticism throughout the Internet and amongst security experts jointly. The company utilized a piece of adware that ultimately would allow access by the company to ultimately gage ads toward the user. That being said, this gap or hole in security that Superfish creates really just questions the legitimacy of Lenovo and makes users wonder if their trust has been misplaced. It wouldn’t be a stretch to imagine that Lenovo would be using this information for bad, instead of the good that they claim.

They argue that their Superfish is innocent and that it is only there to give the company some visual cues as to what its users want, like, and enjoy. However, looking at how the Superfish functions, it becomes clear that this isn’t the case. And even in a best case scenario where poor intentions are non-existent, it’s an incredibly shady practice to take part in.

Superfish Root Certificate

The major security concern that users have with Lenovo is the fact that a third-party could easily jump into the mix and take control through that hole, which Lenovo has willingly created. Ultimately, that puts the consumer in the position of either accepting the fact that Lenovo or someone, could have access to their computer – or be put in the incredibly uncomfortable position of deciding what to do with the information that is on their computers. Many have pointed out that it would be easy, and not a stretch in the slightest, for Lenovo, simply to abuse the power that they have given themselves.

The biggest concern is having traffic get intercepted by attackers or those looking to seek out information. They would be able to do this by using the Superfish and at the end of the day; consumers have to be of the mindset that it could’ve happened already. Ultimately, it puts users in a very difficult spot – and it puts Lenovo themselves in even worse of a position. They have to figure out how they will rebound from losing a significant piece of trust, as this has become a