06.02.10

Gemini version available ♊︎

IDG Approaches Microsoft-Funded and Microsoft-Hired ‘Analysts’ (Without Disclosure) to Defend Windows Security

Posted in FUD, GNU/Linux, Microsoft, Security, Windows at 2:31 pm by Dr. Roy Schestowitz

IDG, IDC and Microsoft

Summary: A new example of familiar routines from IDG and IDC, which happen to be setting trends using false information

Gregg Keizer from ComputerWorld usually calls out Windows and reports rather accurately about Microsoft’s security problems. One issue the author overlooks is that Microsoft has an information lock-down on what it does with its proprietary code and it abuses this privacy to deceive everyone, even by producing bogus reports that are unfairly (if not fraudulently) demeaning to the competition. Microsoft admits lying about security, as we pointed out a few days ago.

“One issue the author overlooks is that Microsoft has an information lock-down on what it does with its proprietary code and it abuses this privacy to deceive everyone, even by producing bogus reports to are unfairly demeaning to the competition. ”Thanks to Satipera we became aware of Gregg Keizer’s new article which quotes several Microsoft sympathisers who are paid by Microsoft. One of them is Gartner and another one is Gartenberg, who is quoted all over the place despite having come from Microsoft [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11] only to attack Microsoft’s competition without any disclosure. These talking points are being summoned in response to Google's move which is a huge blow to the reputation of Windows. The financial Web sites struggled with the news, deciding somehow that Red Hat actually owns “Linux” and “Chrome O/S” is an entirely separate operating system (it is based on Ubuntu GNU/Linux). SJVN’s report is much better, but the Microsoft convention/gallery Keizer brought to IDG is a bit of an embarrassment. To quote some potions from Microsoft’s paid allies (don’t expect disclosures at IDG):

“There must be other motives besides security for such a move,” said John Pescatore, an analyst at Gartner who specializes in security issues. “As an academic exercise, yes, the ‘security-by-obscurity’ model works,” he said, referring to the concept that users are safer running Mac OS X and Linux because they have much smaller market shares than Windows, and so offer hackers a less attractive target.

[...]

“The idea that security is behind this is a little bogus,” added Michael Gartenberg, an analyst with the Altimeter Group. “Windows seems pretty good for Fortune 500 companies.”

Like Pescatore, Gartenberg sees Google’s move, if true, driven by other factors than security. “It’s an interesting excuse, but to me, it underscores the tension between Google and Microsoft,” Gartenberg said.

Michael Gartenberg says that “the idea that security is behind this is a little bogus,” but we say that Gartenberg’s credentials and reliability are bogus because he used to work for Steve Ballmer (and also for IDG, which means there is a conflict here) and Microsoft produces bogus reports about security, by its very own admission. Shame on IDG for approaching Michael Gartenberg about this subject.

IDG and IDC are pretty much the same entity and here are some new bogus numbers from IDC, coming just a month after more bogus numbers that it produced with the BSA/Microsoft [1, 2, 3, 4]. They are not real analysts, they are propagandists in suits. They are analysts for hire to ‘prove’ the required fallacy and spread it as “truth” in as many publications as possible, the latest example being this one: [hat tip: Glyn Moody]

Piracy ravages Spain

The study, carried out by IDC Research Iberia, the Spanish arm of U.S. consultancy IDC, covered the piracy of music, movies, vidgames and books.

They are trying to pass new laws, especially in Spain where they recently had some difficulties stifling sharing of legal content (along with some illegal). Those who follow copyright news probably paid attention to those stories from Spain, starting with a key verdict and then carrying on with Spanish politicians trying to change the law to accommodate Hollywood. Here we see IDC manufacturing some bogus, unfounded ammunition for the clients to lobby with (we previously explained the obvious falsehoods). So again, shame on IDG/IDC — the best propaganda money can acquire. Several days ago, someone told us in the IRC channel: “My 2 cents re: IDC/BSA .. i worked with IDC for many years ,.. and what they say about GUT FEEL is [just] that … guess work .. kids jacking out spreadsheets with *imaginative* numbers …”

In other news, SJVN also write about botnets [1, 2], delivering some shocking numbers and not always naming the culprit which is Windows (where one in two computers is said to have been hijacked).

Think you’ve got good security? Well, maybe you do. But can you say the same for your colleagues and friends? Probably not. According to RSA, EMC’s Security Division, even at Fortune 500 companies 88% of them had systems that had been accessed by infected machines and 60 percent of them had experienced stolen email account information.

In summary, what we deal with here is what Microsoft best described with the statement below.

“Analysts sell out – that’s their business model… But they are very concerned that they never look like they are selling out, so that makes them very prickly to work with.”

Microsoft, internal document [PDF]

Related posts:

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Reddit
  • email

Decor ᶃ Gemini Space

Below is a Web proxy. We recommend getting a Gemini client/browser.

Black/white/grey bullet button This post is also available in Gemini over at this address (requires a Gemini client/browser to open).

Decor ✐ Cross-references

Black/white/grey bullet button Pages that cross-reference this one, if any exist, are listed below or will be listed below over time.

Decor ▢ Respond and Discuss

Black/white/grey bullet button If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

A Single Comment

  1. twitter said,

    June 3, 2010 at 5:45 pm

    Gravatar

    Microsoft’s Fortune 500 boast rings hollow when roughly 450 of the Fortune 500 have botnet problems [thank you, GrokLaw RSS feed]. It is getting hard for Microsoft to lie about security problems that are both ubiquitous and obvious. Windows is a security black hole no matter how much money and effort the world’s richest companies thrown at it. Smaller companies do even worse. So, Microsoft advocates pull out the tired old “Microsoft Hater/Competitor” label to spin the practical advice of one of the worlds most competent tech companies. I wonder what they have to say about Intel, world+dog avoidance of Vista and Windows 7?

DecorWhat Else is New


  1. [Meme] Team UPC Congratulating Itself

    The barrage of fake news and misinformation about the UPC deliberately leaves out all the obvious and very important facts; even the EPO‘s António Campinos and Breton (Benoît Battistelli‘s buddy) participated in the lying



  2. Links 24/1/2022: pgBadger 11.7 Released, Catch-up With Patents

    Links for the day



  3. The Demonisation and Stereotyping of Coders Not Working for Big Corporations (or 'The System')

    The war on encrypted communication (or secure communications) carries on despite a lack of evidence that encryption stands in the way of crime investigations (most criminals use none of it)



  4. On the 'Peak Hacker' Series

    Hacker culture, unlike Ludditism, is ultimately a movement for justice, for equality, and for human rights through personal and collective emancipation; Dr. Farnell has done a good job explaining where we stand and his splendid series has come to a close



  5. Links 23/1/2022: First RC of Linux 5.17 and Sway 1.7 Released

    Links for the day



  6. Peak Code — Part III: After Code

    "Surveillance perimeters, smart TVs (Telescreens built to Orwell's original blueprint) watched over our living rooms. Mandatory smart everything kept us 'trustless'. Safe search, safe thoughts. We withdrew. Inside, we went quietly mad."



  7. IRC Proceedings: Saturday, January 22, 2022

    IRC logs for Saturday, January 22, 2022



  8. Links 23/1/2022: MongoDB 5.2, BuddyPress 10.0.0, and GNU Parallel 20220122

    Links for the day



  9. A Parade of Fake News About the UPC Does Not Change the General Consensus or the Simple Facts

    European Patents (EPs) from the EPO are granted in violation of the EPC; Courts are now targeted by António Campinos and the minions he associates with (mostly parasitic litigation firms and monopolists), for they want puppets for “judges” and for invalid patents to be magically rendered “valid” and “enforceable”



  10. Welcome to 2022: Intentional Lies Are 'Benefits' and 'Alternative Facts'

    A crooks-run EPO, together with the patent litigation cabal that we’ve dubbed ‘Team UPC’ (it has nothing to do with science or with innovation), is spreading tons of misinformation; the lies are designed to make the law-breaking seem OK, knowing that Benoît Battistelli and António Campinos are practically above the law, so perjury as well as gross violations of the EPC and constitutions won’t scare them (prosecution as deterrence just isn’t there, which is another inherent problem with the UPC)



  11. From Software Eating the World to the Pentagon Eating All the Software

    “Software is eating the world,” according to Marc Andreessen (co-founder of Netscape), but the Empire Strikes Back (not the movie, the actual empire) by hijacking all code by proxy, via Microsoft, just as it grabbed a lot of the world’s communications via Skype, bypassing the world's many national telecoms; coders need to fight back rather than participate in racist (imperial) shams such as GitHub



  12. Links 22/1/2022: Skrooge 2.27.0 and Ray-Tracing Stuff

    Links for the day



  13. IRC Proceedings: Friday, January 21, 2022

    IRC logs for Friday, January 21, 2022



  14. Peak Code — Part II: Lost Source

    "Debian and Mozilla played along. They were made “Yeoman Freeholders” in return for rewriting their charters to “work closely with the new Ministry in the interests of all stakeholders” – or some-such vacuous spout… because no one remembers… after that it started."



  15. Links 22/1/2022: Ubuntu MATE 21.10 for GPD Pocket 3, MINISFORUM Preloads GNU/Linux

    Links for the day



  16. Computer Users Should be Operators, But Instead They're Being Operated by Vendors and Governments

    Computers have been turned into hostile black boxes (unlike Blackbox) that distrust the person who purchased them; moreover, from a legislative point of view, encryption (i.e. computer security) is perceived and treated by governments like a threat instead of something imperative — a necessity for society’s empowerment (privacy is about control and people in positions of unjust power want total and complete control)



  17. Peak Code — Part I: Before the Wars

    Article/series by Dr. Andy Farnell: "in the period between 1960 and 2060 people had mistaken what they called "The Internet" for a communications system, when it had in fact been an Ideal and a Battleground all along - the site of the 100 years info-war."



  18. Links 21/1/2022: RISC-V Development Board and Rust 1.58.1

    Links for the day



  19. IRC Proceedings: Thursday, January 20, 2022

    IRC logs for Thursday, January 20, 2022



  20. Gemini Lets You Control the Presentation Layer to Suit Your Own Needs

    In Gemini (or the Web as seen through Gemini clients such as Kristall) the user comes first; it's not sites/capsules that tell the user how pages are presented/rendered, as they decide only on structural/semantic aspects



  21. The Future of Techrights

    Futures are difficult to predict, but our general vision for the years ahead revolves around more community involvement and less (none or decreased) reliance on third parties, especially monopolistic corporations, mostly because they oppress the population via the network and via electronic devices



  22. [Meme] UPC for CJEU

    When you do illegal things and knowingly break the law to get started with a “legal” system you know it’ll end up in tears… or the CJEU



  23. Links 20/1/2022: 'Pluton' Pushback and Red Hat Satellite 6.10.2

    Links for the day



  24. The Web is a Corporate Misinformation/Disinformation Platform, Biased Against Communities, Facts, and Science

    Misinformation/disinformation in so-called 'news' sites is a pandemic which spreads; in the process, the founder of GNU/Linux gets defamed and GNU/Linux itself is described as the problem, not the solution to the actual problems



  25. Links 20/1/2022: McKinsey Openwashing and Stable Kernels

    Links for the day



  26. IRC Proceedings: Wednesday, January 19, 2022

    IRC logs for Wednesday, January 19, 2022



  27. Links 20/1/2022: Linuxfx 11.1 WxDesktop 11.0.3 and FreeIPMI 1.6.9 Released

    Links for the day



  28. Links 19/1/2022: XWayland 22.1 RC1 and OnlyOffice 7.0 Release

    Links for the day



  29. Links 19/1/2022: ArchLabs 2022.01.18 and KDE's 15-Minute Bug Initiative

    Links for the day



  30. When Twitter Protects Abusers and Abuse (and Twitter's Sponsors)

    Twitter is an out-of-control censorship machine and it should be treated accordingly even by those who merely "read" or "follow" Twitter accounts; Twitter is a filter, not a news/media platform or even means of communication


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts