EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

06.27.13

TechBytes Episode 79: Richard Stallman Speaks About Back Doors

Posted in TechBytes at 3:01 am by Dr. Roy Schestowitz

Techbytes 2013

Direct download as Ogg (00:09:50, 5.7 MB)

Summary: The second part of this interview series focuses on back doors in software

TODAY we speak about back doors and software freedom tackling this issue. Now that we know that the NSA receives notifications about zero-day flaws in Windows (long in advance, directly from Microsoft), which enables cracking PCs abroad, this is very relevant.

This is the second of several (the first part is here) and the transcript follows.


Dr. Roy S. Schestowitz: I want to try and discuss with you this whole subject of back doors. I think in the past — I know from experience — people were trying to call people like yourself “paranoid” for discussing or even entertaining the possibility that there may be back doors in proprietary software. Well, now we know that they exist. One of the things…

Richard StallmanDr. Richard M. Stallman: We know for a long time about specific back doors in specific proprietary software. It has been documented. For instance, the existence of a universal back door in Microsoft Windows was proved years ago. And the existence of a universal back door in most portable phones was proved years ago. Now, a universal back door means that they can be used to do absolutely anything. It can be used to change the software, so whatever they want to do, they could put in software which does it.

RSS: We can make an educated guess about what they think is intercepted and how, but I think that many discussions lack technical details on exactly how the NSA is doing what it does because Glenn Greenwald is not going to release the documents related to that. But some people were talking about hardware-level — even firewall- of network-level — back doors. We may know, based on the leaks for example of Klein in AT&T, they might be harvesting the data at the chokepoints.

RMS: Well, it’s not a back door. If AT&T agreed to connect its computers to surveillance of the NSA, that doesn’t involve a back door. Those computers belong to AT&T, so if AT&T has full control over them, which it should, then AT&T could also connect to the NSA. You see, these are somewhat different issues. The first issue, which Free software is part of, is that you should have control over your computer. Now, that’s violated with proprietary software if your computer is running, say, Windows, or Mac OS, or if it’s an iThing, or most kinds of Android products, then you don’t control it, some company is controlling it and making it do things that you’ll like. So the first thing is, [incomprehensible] says that the computer should have full control over it.

“I don’t think the US government should use operating systems made in China for the same reason that most governments shouldn’t use operating systems made in the US and in fact we just got proof since Microsoft is now known to be telling the NSA about bugs in Windows before it fixes them.”But that doesn’t mean that when you’re using some company’s service, if a company has full control over the computers that implement that service, which it should, that doesn’t mean the company will treat you right. That’s a separate issue. It’s wrong for [another] company to have control over these computers and if AT&T uses proprietary software, it [that other company] fully has control over AT&T’s computers and that’s wrong. However, making sure AT&T has complete control over its computers doesn’t guarantee that AT&T will treat us right.

RSS: I was thinking about a different scenario where the company that you interact with might itself backdoored in the sense that the firewalls, they might be using older hardware and might be using — maybe — back door by design, so that the NSA, for example, can quietly and silently infiltrate and capture data, for example, [from] firewalls or Intel chips for example.

RMS: It’s possible, and not just necessarily Intel chips because the Pentagon suspects that devices made by Huawei might have some back door of the Chinese government…

RSS: And the latest NDAA is actually explicitly forbidding the use of hardware made in China. That’s from the NDAA 2014. But not many speak about why this is happening, why they modified the rules. Recently, interestingly enough, a guy who was interacting with these companies — I’m not sure if you’ve heard about Shane Todd — the guy who lived in Singapore was assassinated apparently under the — basically, the guise of suicide — and there seems to be a lot of suspicion among those two camps of telecom companies and what they might be doing at the back room.

RMS: Well, it’s perfectly reasonable suspicion to me. I don’t think the US government should use operating systems made in China for the same reason that most governments shouldn’t use operating systems made in the US and in fact we just got proof since Microsoft is now known to be telling the NSA about bugs in Windows before it fixes them.

RSS: I was just going to bring this up exactly, so I was saying that the NSA recently received notifications about the zero-day holes in advance and [incomprehensible] the NSA and the CIA to just crack PCs abroad for espionage purposes.

RMS: Now, [incomprehensible] that this proves my point, which is that you have to be nuts if you were some other country and using Windows on your computers. But, you know, given that Windows has a universal back door in it, Microsoft would hardly need to tell the NSA about any bugs, it can tell the NSA about the mal-feature of the universal back door and that would be enough for the NSA to attack any computer running Windows, which unfortunately is a large fraction of them.


The next part will be published next week.

We hope you will join us for future shows and consider subscribing to the show via the RSS feed. You can also visit our archives for past shows. If you have an Identi.ca account, consider subscribing to TechBytes in order to keep up to date.

As embedded (HTML5):

Keywords: gnu fsf richardstallman

Download:

Ogg Theora

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

3 Comments

  1. David Gerard said,

    June 28, 2013 at 3:27 am

    Gravatar

    Small point of order on titles! RMS has many honorary doctorates, but holders of these don’t conventionally use the title “Doctor” in daily life; he never did get around to a Ph.D. (he was a bit busy with other stuff).

    Dr. Roy Schestowitz Reply:

    Fair point. You stated this before.

  2. David Gerard said,

    June 28, 2013 at 9:33 am

    Gravatar

    Did I? I forgot :-) I’ve just never seen RMS claim the title of “Doctor” himself.

    (trivia: in poor countries like East Timor, where higher education is very rare, a bachelor’s degree gets you called “Doctor”. Best not use this elsewhere though ;-)

    Nice article, btw, been spreading it around.

What Else is New


  1. Links 31/8/2014: Linux 3.12.27, Akademy 2014

    Links for the day



  2. Links 30/8/2014: Jailhouse 0.1, *buntu 14.10 Beta

    Links for the day



  3. Links 28/8/2014: Many New Games, CTO of Red Hat Steps Down

    Links for the day



  4. We Are Gradually Winning the Battle Against Software Patents

    The once-elusive war on software patents is finally leading to some breakthrough and even the Federal Circuit reinforces the trend of software patents' demise



  5. Free/Open Source Software (FOSS) Companies Versus FOSS Moles (VMware, Sonatype, Xamarin)

    A look at three entities which pretend to be pro-FOSS but are actually FOSS-hostile and very much determined to replace FOSS with proprietary software



  6. Links 27/8/2014: GNU/Linux in Space, China, LinuxCon

    Links for the day



  7. FUD Against Google and FOSS Security Amid Microsoft Windows Security Blunders

    In the age of widespread fraud due to Microsoft Windows with its back doors there is an attempt to shift focus to already-fixed flaws/deficiencies in competitors of Microsoft



  8. Microsoft Spin Watch: IDG Turns to More Microsoft Propaganda, Hires Microsoft Boosters

    Media in Microsoft's pocket is telling Microsoft's lies and deceives the public for Microsoft's bottom line



  9. Microsoft's Massive Tax Evasion Becomes Better Known

    A new report about Microsoft's admission that it plays dirty tricks with tax (sometimes using moles in government) is increasing awareness of Microsoft's criminal aspects



  10. Links 25/8/2014: China's Linux Revolution Imminent

    Links for the day



  11. Links 24/8/2014: GNU/Linux Specialisation and Benchmarks

    Links for the day



  12. Links 23/8/2014: GNU/Linux Growth

    Links for the day



  13. Microsoft-Funded Attacks on Android Security and Patent/Copyright

    A look back at examples of people who smear Android and are receiving (or received) money from Microsoft



  14. Blowback in Chile and Munich After Microsoft Intervention

    Microsoft's attacks on the digital sovereignty of countries involves lobbying, corruption, an attack on standards (e.g. ODF), an attack on FOSS policies, and even an attack on accurate reporting (truth itself)



  15. The End of Microsoft is Nigh

    A look back at a tough year for Microsoft and a not-so-promising future



  16. Links 22/8/2014: Linux Foundation LFCS, LFCE

    Links for the day



  17. UPS Burned by Microsoft Windows, Gives Away Massive Number of Credit Card Details

    UPS is the latest victim of Microsoft's shoddy back door with software on top of it (Windows); attempts to blame FOSS for data compromise actually divert attention from the real culprit, which is proprietary software



  18. Microsoft's Funding of ALEC and Other Systemic Corruption

    Microsoft role in writing of laws by proxy, via groups such as ALEC



  19. Microsoft is Still Preying on British Taxpayers, Playing Politics

    Some news from the UK showing how Microsoft uses politics to extract money out of taxpayers, irrespective of their preferences



  20. Microsoft's Patent Troll Intellectual Ventures is Collapsing as 20% of Staff Laid Off

    More good news regarding the demise of patents as Microsoft's leading patent proxy is collapsing more rapidly than anyone ever imagined and software patents too are collectively doubted



  21. Links 21/8/2014: Conferences of Linux Foundation, Elephone Emerges

    Links for the day



  22. Links 20/8/2014: Linux Event, GNOME Milestone

    Links for the day



  23. Corruption Watch: Microsoft Lobbying Designed to Kill Chile's Free Software Policy and Promote Microsoft With Subsidies, More Dirty Tricks Emerge in Munich

    icrosoft is systematically attacking migrations to GNU, Linux and Free software, using dirty tricks, as always



  24. Vista 8 Such a Disaster That Even Microsoft Cannot Cope With It, Vapourware Tactics Start Early

    Microsoft's Windows-powered services are failing and Windows gets bricked by Microsoft patches, whereupon we are seeing yet more of Microsoft's vapourware tactics (focusing in imaginary, non-existent versions of Windows)



  25. On BlackBerry and Other Patent Trolls

    A roundup regarding patent trolls, starting with the bigger and latest joiner, BlackBerry's new patents apparatus



  26. Links 19/8/2014: Humble Jumbo Bundle 2 Betrayal, Mercedes-Benz Runs GNU/Linux

    Links for the day



  27. BlackBerry -- Like Microsoft Nokia -- Could be the Next Patent Proxy Troll

    BlackBerry is restructuring for patent assertion (i.e. trolling) in the wake of some alliances with Microsoft



  28. After Microsoft's Soft Bribe Some Non-Technical Deputy Does Not Like Free Software, Microsoft-Linked Media Responds to This Non-News by Making Bogus Claims of Munich Leaving GNU/Linux (Updated)

    The subversive forces that have secretly been attacking Munich over its migration to GNU/Linux (Microsoft press, Gartner, and even HP) are back to doing it while China and Russia follow Munich's lead



  29. Gates Foundation CFO Quits and Debate About Revolving Doors Recalled Amid Systematic and Shrewd Bribery of Public Officials

    More officials step out of the Gates Foundation and their destination is not known yet; Gates continues to corrupt the public sector with his money so as to increase personal gain at taxpayers' expense



  30. Links 19/8/2014: GNU/Linux Raves and Alternative to Proprietary Voice Chat

    Links for the day


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts