EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

06.27.13

TechBytes Episode 79: Richard Stallman Speaks About Back Doors

Posted in TechBytes at 3:01 am by Dr. Roy Schestowitz

Techbytes 2013

Direct download as Ogg (00:09:50, 5.7 MB)

Summary: The second part of this interview series focuses on back doors in software

TODAY we speak about back doors and software freedom tackling this issue. Now that we know that the NSA receives notifications about zero-day flaws in Windows (long in advance, directly from Microsoft), which enables cracking PCs abroad, this is very relevant.

This is the second of several (the first part is here) and the transcript follows.


Dr. Roy S. Schestowitz: I want to try and discuss with you this whole subject of back doors. I think in the past — I know from experience — people were trying to call people like yourself “paranoid” for discussing or even entertaining the possibility that there may be back doors in proprietary software. Well, now we know that they exist. One of the things…

Richard StallmanDr. Richard M. Stallman: We know for a long time about specific back doors in specific proprietary software. It has been documented. For instance, the existence of a universal back door in Microsoft Windows was proved years ago. And the existence of a universal back door in most portable phones was proved years ago. Now, a universal back door means that they can be used to do absolutely anything. It can be used to change the software, so whatever they want to do, they could put in software which does it.

RSS: We can make an educated guess about what they think is intercepted and how, but I think that many discussions lack technical details on exactly how the NSA is doing what it does because Glenn Greenwald is not going to release the documents related to that. But some people were talking about hardware-level — even firewall- of network-level — back doors. We may know, based on the leaks for example of Klein in AT&T, they might be harvesting the data at the chokepoints.

RMS: Well, it’s not a back door. If AT&T agreed to connect its computers to surveillance of the NSA, that doesn’t involve a back door. Those computers belong to AT&T, so if AT&T has full control over them, which it should, then AT&T could also connect to the NSA. You see, these are somewhat different issues. The first issue, which Free software is part of, is that you should have control over your computer. Now, that’s violated with proprietary software if your computer is running, say, Windows, or Mac OS, or if it’s an iThing, or most kinds of Android products, then you don’t control it, some company is controlling it and making it do things that you’ll like. So the first thing is, [incomprehensible] says that the computer should have full control over it.

“I don’t think the US government should use operating systems made in China for the same reason that most governments shouldn’t use operating systems made in the US and in fact we just got proof since Microsoft is now known to be telling the NSA about bugs in Windows before it fixes them.”But that doesn’t mean that when you’re using some company’s service, if a company has full control over the computers that implement that service, which it should, that doesn’t mean the company will treat you right. That’s a separate issue. It’s wrong for [another] company to have control over these computers and if AT&T uses proprietary software, it [that other company] fully has control over AT&T’s computers and that’s wrong. However, making sure AT&T has complete control over its computers doesn’t guarantee that AT&T will treat us right.

RSS: I was thinking about a different scenario where the company that you interact with might itself backdoored in the sense that the firewalls, they might be using older hardware and might be using — maybe — back door by design, so that the NSA, for example, can quietly and silently infiltrate and capture data, for example, [from] firewalls or Intel chips for example.

RMS: It’s possible, and not just necessarily Intel chips because the Pentagon suspects that devices made by Huawei might have some back door of the Chinese government…

RSS: And the latest NDAA is actually explicitly forbidding the use of hardware made in China. That’s from the NDAA 2014. But not many speak about why this is happening, why they modified the rules. Recently, interestingly enough, a guy who was interacting with these companies — I’m not sure if you’ve heard about Shane Todd — the guy who lived in Singapore was assassinated apparently under the — basically, the guise of suicide — and there seems to be a lot of suspicion among those two camps of telecom companies and what they might be doing at the back room.

RMS: Well, it’s perfectly reasonable suspicion to me. I don’t think the US government should use operating systems made in China for the same reason that most governments shouldn’t use operating systems made in the US and in fact we just got proof since Microsoft is now known to be telling the NSA about bugs in Windows before it fixes them.

RSS: I was just going to bring this up exactly, so I was saying that the NSA recently received notifications about the zero-day holes in advance and [incomprehensible] the NSA and the CIA to just crack PCs abroad for espionage purposes.

RMS: Now, [incomprehensible] that this proves my point, which is that you have to be nuts if you were some other country and using Windows on your computers. But, you know, given that Windows has a universal back door in it, Microsoft would hardly need to tell the NSA about any bugs, it can tell the NSA about the mal-feature of the universal back door and that would be enough for the NSA to attack any computer running Windows, which unfortunately is a large fraction of them.


The next part will be published next week.

We hope you will join us for future shows and consider subscribing to the show via the RSS feed. You can also visit our archives for past shows. If you have an Identi.ca account, consider subscribing to TechBytes in order to keep up to date.

As embedded (HTML5):

Keywords: gnu fsf richardstallman

Download:

Ogg Theora

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Reddit
  • email
  • Slashdot

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

3 Comments

  1. David Gerard said,

    June 28, 2013 at 3:27 am

    Gravatar

    Small point of order on titles! RMS has many honorary doctorates, but holders of these don’t conventionally use the title “Doctor” in daily life; he never did get around to a Ph.D. (he was a bit busy with other stuff).

    Dr. Roy Schestowitz Reply:

    Fair point. You stated this before.

  2. David Gerard said,

    June 28, 2013 at 9:33 am

    Gravatar

    Did I? I forgot :-) I’ve just never seen RMS claim the title of “Doctor” himself.

    (trivia: in poor countries like East Timor, where higher education is very rare, a bachelor’s degree gets you called “Doctor”. Best not use this elsewhere though ;-)

    Nice article, btw, been spreading it around.

What Else is New


  1. The National Center for Missing and Exploited Children (NCMEC) Identified Some of the Children in the Pornographic 'Stash' of Bill Gates' Engineer

    Today we carefully and responsibly disclose just 9 pages (out of about 2700 pages) with slightly redacted samples and a handful of exemptions to show what Bill Gates' engineer was amassing, including identified kids (known to NCMEC)



  2. A Red Hat Response to Factual Information About Red Hat

    So far we've seen only Red Hat employees blasting our articles about Red Hat/IBM and the responses lack any substance, just name-calling (so we must be on the right track; there's no refutation so far)



  3. Always Look for Stories the Media is Suppressing and Hiding

    Based upon closer scrutiny of the Jones case (engineer of Bill Gates arrested for pedophilia at the Gates mansion), the sentence he received is incredibly negligible or close to nothing (for possession and sharing/dissemination of massive troves of child pornography, typically leading to many years in prison), so we’re closely examining if he’s still working and whether he still works for Bill and Melinda (more FOIA requests may be necessary)



  4. On Web Servers, Microsoft's Collapse Continues More Rapidly Under COVID (a Million Domains Lost in the Past Month)

    Even though the Microsoft-sponsored media repeatedly refuses (or strangely enough just 'fails') to report on it, the days of Microsoft's IIS are likely numbered; it won't be long before less than a million computers run it



  5. Canonical is Boosting Microsoft's Proprietary Software With Extensive Surveillance

    Canonical’s commitment to Free software barely exists; with so-called “Apps” and “Snaps” and “Stores” we’re seeing a gradual transition to — and acceptance of — blobs and DRM, including Microsoft lock-in inside Ubuntu



  6. IRC Proceedings: Wednesday, August 12, 2020

    IRC logs for Wednesday, August 12, 2020



  7. Harfbuzz Joins LibFFI, Zlib1g in Dragging GNOME, All Free Software Towards Microsoft

    "...I don’t want to help them help Microsoft control my computing by proxy — by controlling the development platform itself"



  8. Links 12/8/2020: Go 1.15, LibreOffice 7.0 Downloaded About Half a Million Times, LibreELEC (Leia) 9.2.4

    Links for the day



  9. Mega Setup, Mini Budget

    For a sum total of under £800 (eight hundred British pounds are about USD/$1043) one can piece together a versatile working environment (my latest additions, as of 5 days ago, are the 4 plastic plants)



  10. Twitter Appears to Have Taken Vendor/Platform Lock-in up Another Notch, Having Become Almost as Malicious as Facebook

    Twitter jumped the shark



  11. IRC Proceedings: Tuesday, August 11, 2020

    IRC logs for Tuesday, August 11, 2020



  12. Infographic by Marcia Wilbur: Where's My Refund?!

    Tweet by Marcia Wilbur:



  13. Links 12/8/2020: New GNU Emacs, GXml-0.20, WordPress 5.5, and Mozilla is Laying off 250 Staff

    Links for the day



  14. You Just Know Somebody is in a State of Retreat When the Strategy Becomes to Discredit One's Critics (or Collectively Paint Them All as Wrong/Crazy)

    A goulash of bullcrap from Bill Gates doesn't add up; it seems like his media strategy has warped (or fallen back) onto discrediting his critics as though they don't exist, don't know anything, or are simply jealous



  15. United States v IBM Archives/Resources

    As the massive case against IBM monopoly (United States v IBM; 104,400 pages of trial transcripts and 17,000 exhibits) predates the World Wide Web it's difficult to find comprehensive literature about it any longer (Wikipedia and more modern sites are instruments of revisionism and reputation laundering)



  16. History Goes in Cycles

    Just like antiwar activism was 'quelled' or 'pacified' half a century ago nowadays we're led to think that software freedom is just fine and there's nothing left to argue about (except words and other petty nonsense)



  17. Looking Back at the Real Story of Microsoft

    Let's take a moment to examine what Microsoft was all along (since its formation in 1975)



  18. Europe Deserves Better Than Today's EPO

    Overly restrictive society with countless monopolies (even on seeds!) will neither serve people nor will it breed general acceptance



  19. European Patent Office Management Swims With Sharks and Liars

    It has become increasingly if not abundantly evident that European Patent Office President Campinos is no better than Battistelli as he’s still a ‘darling’ of patent litigation trolls and their front groups/lawyers



  20. Linked In to Pedophilia

    As the above articles show (one published a couple of days ago), the 'Web of Lies' and the incredible deceit/cover-up run deep and we still lack answers from those who enabled what Salon has just said involved "trafficking five or six girls a day."



  21. Whistleblower Aid Already Showed Cover-up of Bill Gates 'Contributions' to MIT

    The Goodwin Procter report which failed to actually investigate whether Gates and Epstein jointly directed payments to MIT (the latter was already dead) can be understood differently in light of the above leak, which was published earlier this year



  22. IRC Proceedings: Monday, August 10, 2020

    IRC logs for Monday, August 10, 2020



  23. Proof (Archived Original Letter): Bill Gates Lied to the New Yorker, BBC and Others About Connection of MIT Money to Mr. Jeffrey Epstein and Their Close Relationship

    As the article (“The anatomy of Bill Gates’ Jeffrey Epstein-facilitated MIT donations”) put it at the time (just 2 days before Dr. Stallman received all the heat at MIT), “Secrecy in the funding of academic programs is highly problematic, as University of Virginia professor Siva Vaidhyanathan explains in a long Twitter thread. “Companies and the billionaires who run them are always bending research agendas (and sometimes even results) to their interests,” he writes. “Anonymity would prevent any examination or accountability.”” But there are more high-level Microsoft links to Mr. Epstein; “Hoffman invited both former MIT Media Lab director Joi Ito and Epstein to an August 2015 dinner in Palo Alto with Elon Musk, Mark Zuckerberg and Peter Thiel. He tells Axios that he invited Epstein at Ito’s behest, and only because Ito vouched for the convicted criminal, saying that he had successfully cleared MIT’s vetting process.” In 2016 the article “Bill Gates talked to Reid Hoffman about being on Microsoft’s board of directors” was published. “Furthermore,” it notes, “Gates and Hoffman have a lot in common: They both hold board seats and advisory roles, and no other formal status or day-to-day obligations, at the tech companies they founded.”



  24. All This Happened While Bill Gates' Engineer Was on Trial for Amassing Child Pornography

    While MIT relies on the word of someone who repeatedly lied about his relationship with Mr. Epstein (refuted even by MIT itself), the record shows what happened just when Bill Gates’ own engineer faced conviction for pedophilia (the media diverted attention to Dr. Stallman just days after the above E-mails came to light)



  25. Links 10/8/2020: Popcorn Computers Pocket PC, Finnix 121, GhostBSD 20.08.04, EasyOS 2.3.8

    Links for the day



  26. IRC Proceedings: Sunday, August 09, 2020

    IRC logs for Sunday, August 09, 2020



  27. Release: Bill Gates' Engineer Busted for More Child Pornography Than Reported in the Media

    Based on our analysis, which was repeated carefully twice, the sum of recognised hashes turns out to be about 7,500 (7,430 objects), which is more than was reported in the media after the arrest of Rick Allen Jones at Bill Gates' mansion



  28. Links 10/8/2020: KPhotoAlbum 5.7.0 and MX Linux RC

    Links for the day



  29. UserLibre: What I Want You to Get From This Book

    "Corporate-backed lies run the world, and the FSF used to get in the way."



  30. Even the Mainstream/Corporate Media is Trying to Study Why (or If) Bill Gates and Epstein's Sex Abuse Ring Were Closely Connected

    People in the media are eager to understand why Mr. Gates was so close to Mr. Epstein and even flew his plane (despite having several of his own)


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts