Shooting ourselves in the foot? Why we willingly killed 10% of our network

Bright Data believes in transparent and ethical practices, especially when it comes to dealing with users who make up its Residential peer network. To ensure compliance, we use advanced monitoring protocols and partner with top anti-virus companies. Sometimes, we make decisions which might seem a little crazy, like cutting out parts of our own network. That is what this post is about.
Why Bright Data cut 10% of its Software Development Toolkit (SDK) partnerships
Ofir Meir
Ofir Meir | Director of Security Partnerships

In this post we will cover:

Our expectations from SDK partners

Here is Bright Data’s ideal SDK partner app profile:

  • A high-quality application that provides real added value to its users, doing what it publicly states it does, and nothing else. 
  • Employs dedicated developers who ensure that there is a quality User Interface (UI), as well as no bugs, scanning for antivirus (AV) detections and making sure that there are no security risks (such as back doors).
  • Complies with security industry standards, such as:
  • Enabling users to opt-out at any time.
  • Employing a zero-malicious advertising policy. 
  • Including the developer’s digital signature.

What happens when they are not met? Terminated partnership examples 

One: A file sharing application 

Partner behavior: As part of a security upgrade, SDK partners were asked to sign their application with a verified digital signature. This is (a common authentication method used by software developers that adds an element of trust and security for app users). The developer in question did not agree to sign his application.

Outcome: Bright Data’s SDK team explained to the partner the benefits of signing the application, but they refused to sign it. We decided to terminate the agreement with this developer, as they were not willing to implement Bright Data’s industry-standard precautions.

Two: A media editing application 

Partner behavior: After a few months of working with Bright Data, the developer added a new advertising network, which sometimes displayed advertisements that led users to unverified websites. The partner claimed they served as a lucrative revenue stream.  

Outcome: We decided to terminate the agreement with this partner who was not willing to stop using that specific ad network.

Actions that speak louder than words 

The above are just two examples of SDK partnerships that were terminated in order to ensure Bright Data networks and products are safe and compliant with international security standards. 

Bright Data preferred terminating these 2 SDK partners, even though they provided over 10% of our Residential peer network. Terminating these partners also had a negative impact on our revenue – but we did it anyway, in order to help maintain a strong cybersecurity moat. 

Luckily for both Bright Data and its users, it should be noted that most partners are very collaborative – they follow our guidelines and see the value of working together with us on improving their app’s security.

What major antivirus engines have to say about Bright Data Network products 

In today’s peer-to-peer economy, no one cares what a company has to say about themselves – no one wants to be ‘marketed’ a product. What people do respect is when neutral third-parties vet applications. 

Here’s a sampling of leading industry software certification company findings regarding EarnApp for developer’s security/compliance track record:


After a detailed review, AppEsteem certified  Bright Data’s EarnApp, confirming it met their requirements and was in compliance with their Master Services Agreement. 

In order to complete the AppEsteem certification program, EarnApp underwent the most rigorous compliance review conducted by a team of security analysts. This audit brought about practical, constructive feedback which the EarnApp team implemented, and resulted in us further improving the SDK’s features. The following are just several examples:

One: Improved disclosures and transparency – Including more links to detailed FAQ, EULA, privacy policy, how to uninstall the app, etc.

Two: Consent screen redesign – Enabling users to know exactly what they are agreeing to, with detailed explanations of what their IP address will/will not be used for.

Three: Upgraded digital certificate – Implementing a new Extended Validation (EV) certificate as a signature, for each certified app (EarnApp as well as other SDK partners).

Four: Increasing user visibility –A tray icon appears when the SDK is running in the background.

All existing and new Bright Data SDK partners benefit from the AppEsteem program. Every new partner is now included in the program. Participation is free to the partner; it is paid for by Bright Data.  


Kaspersky detects the general type of technology used by the Bright Data SDK to collect web data, which is called proxy. Furthermore, Kaspersky correctly writes in their knowledge base:

If a user has installed such a program on his/her computer, or if it was installed by a system administrator, then it does not pose any threat.”


Here is the full list of companies that EarnApp complies with in terms of safety, and security certification:

The list is continuously updated – see the live version here.

Bright Data’s bottom line partnership commitment 

Bright Data’s Director of Security Partnerships, Ofir Meir stressed that: 

‘The Bright Data SDK is at the heart of what we do. When a user installs an app with our SDK, they put their trust in us. We, therefore, take any concern with the utmost seriousness. 

As a rule of thumb, we perform virus sanity checks twice a day, every day. This is in order to ensure that the apps’ users install with Bright’s SDK do not contain anything malicious originating from a third-party source. Any security concern is immediately addressed implementing our real-time network monitoring protocols. In the event that any Bright Data network products are being detected by an antivirus (AV) engine, it is handled on spot with the relevant vendor as a false positive detection.

We share mutual goals with our partners of being able to create additional passive revenue streams while simultaneously feeling secure, operating in an AV-alert neutral environment’. 

Interested in becoming a Bright Data SDK partner? 

Ofir Meir
Ofir Meir | Director of Security Partnerships

Ofir is the Director of Security Partnerships here at Bright Data. As a previous manager in the partner alliance group of a leading cybersecurity vendor (Check Point), he comes with broad experience in forming strategic collaborations, developing business channels, as well as driving corporate growth.

He is especially interested in the ways in which web data on-demand is helping to shape the future of technology as a whole, and cybersecurity in particular. With a special focus on creating web data collection workflows that help maintain high levels of trust, and security.

You might also be interested in

What is data aggregation

Data Aggregation – Definition, Use Cases, and Challenges

This blog post will teach you everything you need to know about data aggregation. Here, you will see what data aggregation is, where it is used, what benefits it can bring, and what obstacles it involves.
What is a data parser featured image

What Is Data Parsing? Definition, Benefits, and Challenges

In this article, you will learn everything you need to know about data parsing. In detail, you will learn what data parsing is, why it is so important, and what is the best way to approach it.
What is a web crawler featured image

What is a Web Crawler?

Web crawlers are a critical part of the infrastructure of the Internet. In this article, we will discuss: Web Crawler Definition A web crawler is a software robot that scans the internet and downloads the data it finds. Most web crawlers are operated by search engines like Google, Bing, Baidu, and DuckDuckGo. Search engines apply […]

A Hands-On Guide to Web Scraping in R

In this tutorial, we’ll go through all the steps involved in web scraping in R with rvest with the goal of extracting product reviews from one publicly accessible URL from Amazon’s website.

The Ultimate Web Scraping With C# Guide

In this tutorial, you will learn how to build a web scraper in C#. In detail, you will see how to perform an HTTP request to download the web page you want to scrape, select HTML elements from its DOM tree, and extract data from them.
Javascript and node.js web scraping guide image

Web Scraping With JavaScript and Node.JS

We will cover why frontend JavaScript isn’t the best option for web scraping and will teach you how to build a Node.js scraper from scratch.
Web scraping with JSoup

Web Scraping in Java With Jsoup: A Step-By-Step Guide

Learn to perform web scraping with Jsoup in Java to automatically extract all data from an entire website.
Static vs. Rotating Proxies

Static vs Rotating Proxies: Detailed Comparison

Proxies play an important role in enabling businesses to conduct critical web research.