Bonum Certa Men Certa

Return of Charney's Lunacy and Latest BBC Propaganda: Microsoft Will Save the World From Insecure “Computers”

Security diagram



Summary: Microsoft's Charney, whom the monopolist hired from the US DOJ (U.S. Department of Justice), is getting a lobby boost from incompetent press; a quick look at Microsoft's very distinct security failures as of late

HERE they go again. Microsoft spin is being used repeatedly to describe the cause of great trouble (Microsoft) as an heroic rescuer and what better platform to distribute this spin than the MSBBC, which a lot of people perceive as trustworthy even though it's run by many former managers of Microsoft UK. The type of spin we see here is akin to the recent Russian spin [1, 2] (Microsoft as a friends of NGOs rather than the enemy) and going back almost a couple of years we find a more similar example in Conficker. Microsoft was not only a cause but also the party which benefited financially from Conficker; in order to spin it all, Microsoft pretended that it was hunting down the 'real' culprit and offered a generous bounty. The mainstream press fell for it and then used Conficker to portray Microsoft is the defender against "computer viruses". Here is some of our old Conficker coverage:





It was only last month that we saw Microsoft claiming credit for failing in security. Are journalists really so genuinely incapable of thinking? Why is spin being put in print so often? Why is the MSBBC, which British taxpayers pay for, playing along with this PR lunacy? It takes a lot of nerve to take this latest post from Microsoft's lobbying blog (written by someone whom Microsoft hired from the government) and turn it into a widely damned article which is titled "Sick PCs should be banned from the net says Microsoft". To quote some bits:

Virus-infected computers that pose a risk to other PCs should be blocked from the net, a senior researcher at software giant Microsoft suggests.

The proposal is based on lessons from public health, said Scott Charney of the firm's trustworthy computing team.

[...]

Networks can consist of a few hundred to a few thousand Windows machines. However, some can contain millions of PCs.


It may seem like they call out Windows, but the article as a whole is just a platform for Microsoft's Charney to push forward his crazy plan of charging taxpayers to make up for Microsoft's negligence [1, 2, 3, 4, 5, 6, 7, 8, 9]. While BBC got all the flak, there are other British articles on the same subject (e.g. [1, 2]) and Pogson responded quite sarcastically:

Amen! That’s about 60% of PCs that should have GNU/Linux installed ASAP. That would really put a dent in spam and DDOS etc. We could direct out-going requests from zombies to http://goodbye-microsoft.com until they start showing better User-Agents. Would the zombie-masters start shipping false User-Agents? Sigh. Well. It was just a thought… I suppose M$ will prefer to sell a product that certifies a clean installation of their OS.


Simon Phipps was among those who slammed for the BBC for an awful article and Carlo Piana, a lawyer who favours software freedom and no software patents (yes, there are some good lawyers out there), chatted about it as follows:

Phipps: "Another lame BBC story about malware omits that it's pretty much all a Windows problem (& worse, hypes Microsoft)"

Piana: " but read: "There may be some who would say that MSFT shouldn't be on the internet until they get their own house in order"--Sophos"

Phipps: "I didn't feel that was a clear enough caveat to the general reader - just sounded snarky."

Piana: "yes, it was a poor example of journalism anyway and spinned too much in the wrong direction."

Last night in IRC, Chips B. Malroy wrote: "Let me explain why I am against this. It would impose a malware test on all computers before hooking up to the Internet, even those who do not have the security problems of Windows.

"Should we assume that the ISP's will do the 'test.' or will be be homeland security. Somebody has to scan your computer and this poses privacy problems as well. Since MS is admitting failure to protect computers (see first paragraph quoted) then MS should not be given this power."

"I have the perfect solution, just ban Windows," responded cubevector, "simple and effective :) "

"A plan from MS, after they already admit to not being able to protect users computers. Why should we trust them with this power? And you just know they will abuse it in an entirely monopolistic unethical way as well," Malroy expounded.

"[D]on't you think MS wants the power to scan your Linux computer for 'viruses' as well and shut you down too? Somehow, if MS got that power, I think they would have some sort of glitch and you and other Linux users would be banned from the internet."

cubevector replied by saying "my ISP runs Linux... kind of hard to ban Linux machines then" and Malroy ended by claiming; "We should be concerned with what MS does, they do it not as a courtesy but for a reason" (of course, they have shareholders).

"Canada Will Spend Peanuts on Cyber-Security" says this headline from Pogson, who resides in Canada just like cubevector. GNU/Linux seems to him like a good solution in this case:

If they really want to increase governmental security, they should plunk for GNU/Linux on desktop and server. The savings on licence fees will go a ways toward securing the system and that is way more than $3.5 million.


Glyn Moody has quickly crafted this wonderful response to Microsoft -- a blog post which he shrewdly titled "Dr Microsoft: Time to Be Struck Off" ("Doctor" because Microsoft/BBC calls some PCs "sick" rather than mention the operating system).

So, we're talking about computers "compromised with a bot": now, which ones might they be? Oh look, that would be almost exclusively Windows users. And why would that be? Because no matter how diligent users are in installing endless security updates to the Swiss cheese-like applications known as Windows, Internet Explorer and Microsoft Office, there are always more critical bugs that pop out of the proverbial digital woodwork to lay them open to attack and subversion.

[...]

For a researcher at Microsoft to attempt to avoid this inevitable conclusion by pushing the blame for this endless series of security lapses onto end users this way, and to suggest they, rather than Microsoft, should be thrown into the outer darkness. is beyond pathetic.


In other news relating to security, Slashdot is one among many Web sites that disappointingly blame Android for behaviour of applications which merely run on Android. Slashdot's own founder went with the headline "Many More Android Apps Leaking User Data" which is interesting because when it's "Windows apps" they say nothing about Windows; they usually just say something like "it's a bad app" or "malware" and assume the reader knows it's about Windows. Generally speaking, In the trade press, a Solaris bug is described as a "Solaris bug", a Linux flaw is described as a "Linux flaw", and a Windows virus is described as just a "computer virus". It's unjust as it is an unequal treatment which does not help buyers of computers understand the role of operating systems in security.

Only days ago we learned that Microsoft is issuing yet another emergency patch and the "flaw potentially affects millions of web applications and has been used in attacks already. The patch will fix the flaw in all versions of the .NET framework."

We wrote about this in [1, 2, 3, 4, 5]. It's an ASP.NET problem and here are some of the latest articles about it [1, 2, 3, 4, 5, 6, 7].

The Free software-hostile company [1, 2] known as Trend Micro is habitually mentioned in such articles right now and there are other security risks which only affect Windows even though writers neglect to say so (see [1, 2] for example). A Twitter.com flaw too turns out to be an Internet Explorer-only (and thus Windows-only) problem and few articles bothered to point this out. Here is one which did:

IE 'Twitter rolling' attack trivial to launch



[...]

An information disclosure threat in Microsoft's Internet Explorer affects all supported versions of the browser and, among other things, makes it trivial for attackers to force victims to post attacker-dictated messages on Twitter, a security researcher said this week.

The “Twitter-rolling” attack, which was first described last month, is the result of the way the browser parses CSS, or cascading style sheets, security researcher Chris Evans said. In an update posted on Wednesday, he demonstrated just how easy it is to exploit the flaw and said that “Microsoft have not stated when users of IE6, IE7, and IE8 will be afforded protection.”


How can Microsoft honestly pretend that all operating systems are equally unsecured. In recent weeks we have been hearing about Zeus affecting and infecting millions of Windows users [1, 2, 3, 4, 5] and over 80 people are now being arrested rather than the flaw/s they exploited being fixed. It does nothing to prevent other people from doing just what they did. Those arrests which are reported mostly in the UK [1, 2, 3] address the wrong issue by going after the exploiter rather than the negligent party which is responsible for making it all possible, whether by design or through negligence (it should not matter much). "Zeus Trojan Arrests Show Cybercriminals Getting More Vulnerable" says this one headline, but cybercrime should be solved by hardening software, not by calling the police. It just does not scale and it's extremely expensive (also to the public which covers these costs).

The damage can, at times, be much greater, especially if Windows flaws lead to nuclear warfare or famine. From India, where food is highly essential and less abundant than in other countries, we now learn that "Operations were shutdown for nearly 5 hours in "More" [food] retail outlets because of virus/bug/failure in Microsoft windows". The site says:

Apart from a large range of national brands, shoppers will also find a section called the Best of India, which is an assortment of unique products sourced from across India.


Well, too bad Windows flaws put that food out of reach for almost 5 hours, eh? This is the type of thing that can happen in all stores under conditions of war. It is far too risky to put one's weapons or food (human energy) in the hands of some overseas company with absolute control over the code. Bruce Schneier has finally gotten around to writing this long article about Stuxnet. He does not rule out the possibility that Stuxnet was crafted very much for a specific purpose.

Stuxnet was expensive to create. Estimates are that it took 8 to 10 people six months to write. There's also the lab setup--surely any organization that goes to all this trouble would test the thing before releasing it--and the intelligence gathering to know exactly how to target it. Additionally, zero-day exploits are valuable. They're hard to find, and they can only be used once. Whoever wrote Stuxnet was willing to spend a lot of money to ensure that whatever job it was intended to do would be done.


For more information we shared about Stuxnet, see the links below. Who is Microsoft to label PCs "sick"?



Recent Techrights' Posts

Comparing U.E.F.I. to B.I.O.S. (Bloat and Insecurity to K.I.S.S.)
By Sami Tikkanen
New 'Slides' From Stallman Support (stallmansupport.org) Site
"In celebration of RMS's birthday, we've been playing a bit. We extracted some quotes from the various articles, comments, letters, writings, etc. and put them in the form of a slideshow in the home page."
Thailand: GNU/Linux Up to 6% of Desktops/Laptops, According to statCounter
Desktop Operating System Market Share Thailand
António Campinos is Still 'The Fucking President' (in His Own Words) After a Fake 'Election' in 2022 (He Bribed All the Voters to Keep His Seat)
António Campinos and the Administrative Council, whose delegates he clearly bribed with EPO budget in exchange for votes
Adrian von Bidder, homeworking & Debian unexplained deaths
Reprinted with permission from Daniel Pocock
Sainsbury’s Epic Downtime Seems to be Microsoft's Fault and Might Even Constitute a Data Breach (Legal Liability)
one of Britain's largest groceries (and beyond) chains
 
People Don't Just Kill Themselves (Same for Other Animals)
And recent reports about Boeing whistleblower John Barnett
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Monday, March 18, 2024
IRC logs for Monday, March 18, 2024
Suicide Cluster Cover-up tactics & Debian exposed
Reprinted with permission from Daniel Pocock
Gemini Links 19/03/2024: A Society That Lost Focus and Abandoning Social Control Media
Links for the day
Matthias Kirschner, FSFE: Plagiarism & Child labour in YH4F
Reprinted with permission from Daniel Pocock
Linux Foundation Boasting About Being Connected to Bill Gates
Examples of boasting about the association
Alexandre Oliva's Article on Monstering Cults
"I'm told an earlier draft version of this post got published elsewhere. Please consider this IMHO improved version instead."
[Meme] 'Russian' Elections in Munich (Bavaria, Germany)
fake elections
Sainsbury's to Techrights: Yes, Our Web Site Broke Down, But We Cannot Say Which Part or Why
Windows TCO?
Plagiarism: Axel Beckert (ETH Zurich) & Debian Developer list hacking
Reprinted with permission from Daniel Pocock
Links 18/03/2024: Putin Cements Power
Links for the day
Flashback 2003: Debian has always had a toxic culture
Reprinted with permission from Daniel Pocock
[Meme] You Know You're Winning the Argument When...
EPO management starts cursing at everybody (which is what's happening)
Catspaw With Attitude
The posts "they" complain about merely point out the facts about this harassment and doxing
'Clown Computing' Businesses Are Waning and the Same Will Happen to 'G.A.I.' Businesses (the 'Hey Hi' Fame)
decrease in "HEY HI" (AI) hype
Free Software Needs Watchdogs, Too
Gentle lapdogs prevent self-regulation and transparency
Matthias Kirschner, FSFE analogous to identity fraud
Reprinted with permission from Daniel Pocock
Gemini Links 18/03/2024: LLM Inference and Can We Survive Technology?
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Sunday, March 17, 2024
IRC logs for Sunday, March 17, 2024
Links 17/03/2024: Microsoft Windows Shoves Ads Into Third-Party Software, More Countries Explore TikTok Ban
Links for the day
Molly Russell suicide & Debian Frans Pop, Lucy Wayland, social media deaths
Reprinted with permission from Daniel Pocock
Our Plans for Spring
Later this year we turn 18 and a few months from now our IRC community turns 16
Open Invention Network (OIN) Fails to Explain If Linux is Safe From Microsoft's Software Patent Royalties (Charges)
Keith Bergelt has not replied to queries on this very important matter
RedHat.com, Brought to You by Microsoft Staff
This is totally normal, right?
USPTO Corruption: People Who Don't Use Microsoft Will Be Penalised ~$400 for Each Patent Filing
Not joking!
The Hobbyists of Mozilla, Where the CEO is a Bigger Liability Than All Liabilities Combined
the hobbyist in chief earns much more than colleagues, to say the least; the number quadrupled in a matter of years
Jim Zemlin Says Linux Foundation Should Combat Fraud Together With the Gates Foundation. Maybe They Should Start With Jim's Wife.
There's a class action lawsuit for securities fraud
Not About Linux at All!
nobody bothers with the site anymore; it's marketing, and now even Linux
Links 17/03/2024: Abuses Against Human Rights, Tesla Settlement (and Crash)
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Saturday, March 16, 2024
IRC logs for Saturday, March 16, 2024
Under Taliban, GNU/Linux Share Nearly Doubled in Afghanistan, Windows Sank From About 90% to 68.5%
Suffice to say, we're not meaning to imply Taliban is "good"
Debian aggression: woman asked about her profession
Reprinted with permission from Daniel Pocock
Gemini Links 17/03/2024: Winter Can't Hurt Us Anymore and Playstation Plus
Links for the day