EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

09.26.13

Former Novell Staff Still Pushing the Linux Foundation Into Restricted Boot Territory, Ignoring the Real Threat (Back Doors)

Posted in GNU/Linux, Kernel, Novell, Security at 3:54 am by Dr. Roy Schestowitz

Greg Kroah-Hartman
Photo by Sebastian Oliva

Summary: Back doors in code, embedded in blobs, and even shoehorned into encryption is the overlooked security threat, which gets pushed aside in favour of phantom threats which Microsoft ‘sells’ through former Novell staff (i.e. funded by Microsoft)

A MONTH or two ago we mostly ignored exaggerated (sexed-up) reports about something called “Hand of Thief”. When there’s a Windows security threat the press does not call out Windows, but when it relates to GNU/Linux then tabloids like ZDNet scream from the rooftops. This thing called “Hand of Thief” is basically a malicious program which GNU/Linux users need to install themselves in order for it to do malicious things. It is not a virus, it does not spread, and it hardly even uses social engineering to get itself installed. We cited some reports which stress these facts and now comes a belated one too [1]. LynuxWorks is now offering some “Linux rootkit detector” [2] as if rootkits on GNU/Linux are a common issue. In a sense, since the Linux Foundation seems to insist on helping UEFI restricted boot, we are led to the belief that bootkits are a common threat to Linux. As the Linux Foundation’s site put it, as in the words of the employee it acquired from Novell:

Now that The Linux Foundation is a member of the UEFI.org group, I’ve been working on the procedures for how to boot a self-signed Linux kernel on a platform so that you do not have to rely on any external signing authority.

Greg K-H has been working on all sorts of other kernel-level projects that help Microsoft. He did this while being paid by Novell, which was in turn being given money by Microsoft. That’s the power of money. Other former Novell employees also helped promote UEFI restricted boot, as we showed before. Rogue influence by Novell in the Linux Foundation is a subject we have written about for half a decade, showing numerous examples.

The bigger security issue right now might be back doors, which might also exist in Linux, even in encryption form [3] (giving away passwords over the network for example), so hard-to-crack passwords [4] might not be enough. Microsoft’s and Sony’s network compromises sure reveal the massive financial effects of system intrusions, so this subject should not be taken lightly.

UEFI restricted boot is actually a security threat, not a security solution, especially when a signature is provided and managed by some rogue company in the United States — one which has been secretly in bed with the NSA. With UEFI restricted boot, hardware can be bricked remotely. In a way, UEFI restricted boot deserves the name “unsecure boot”. In some devices it can block the user from accessing his/her own computer. Nobody should promote such treacherous computing.

Related/contextual items from the news:

  1. Hand of Thief, Not

    Linux’s biggest vulnerability is the software that users install with full “superuser” privileges. If you just install applications from your distro’s official repository, that’s not a problem. But if you download software from dubious web sites, or if you add a mysterious repository to your package manager, you’re opening yourself up for an infection. Always, always make sure you know what software you are installing, why you are installing it, and where it’s from.

  2. Linux rootkit detector adds hardware punch to security scanning

    LynuxWorks is stepping up the battle with the release of the first hardware-based rootkit detection system powered by the LynxSecure separation kernel. Called the RDS5201, it combats and detects stealthy advanced persistent threats. Built on the LynxSecure 5.2 separation kernel and hypervisor, this small form factor appliance has been designed to offer a unique detection capability that complements traditional security mechanisms as they try to protect against the growing number and complexity of cyber threats.

  3. RSA warns developers not to use RSA products

    In today’s news of the weird, RSA (a division of EMC) has recommended that developers desist from using the (allegedly) ‘backdoored’ Dual_EC_DRBG random number generator — which happens to be the default in RSA’s BSafe cryptographic toolkit. Youch.

  4. How-to make hard-to-crack passwords you can easily remember
  5. Australian who boasted of hacking to plead not guilty to charges stemming from raid

    Dylan Wheeler, who claimed in February to have breached Microsoft’s and Sony’s networks, has not been charged with hacking

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. Links 31/3/2015: New BlackArch Linux, Mozilla Firefox 37.0

    Links for the day



  2. Links 30/3/2015: Linux 4.0 RC6, OpenELEC 5.0.7

    Links for the day



  3. Techrights Cited by European Politicians in Support of EPO Staff's Causes

    Benoît Battistelli's right-hand man is characterised as suspected of corruption in European Parliament questions



  4. When the EPO Came Under Fire From the Netherlands and Before Systemic Corruption Was Revealed

    Questions that targeted the Dutch Minister of Justice amidst EPO abuses against staff and a shameful failure to enforce a court's decision



  5. Links 29/3/2015: Red Hat's Stock Soars, Kodi 14.2 Released

    Links for the day



  6. Speculations That Microsoft is About to Buy Cyanogen (or at Least Officially Partner) to Attack Google's Android/Linux, Replacing Everything With Microsoft

    Articles in the corporate media and some analysis from smaller media sites serve to highlight the role which Microsoft plays in Cyanogen



  7. Links 28/3/2015: FoundationDB FOSS Shut Down by Apple, European Commission Support for Free Software

    Links for the day



  8. Microsoft Keeps Pretending to be 'Open Source', Despite Relentless Assaults on Open Source

    Microsoft's charm offensives against Free/libre software are proving to be rather effective, despite them involving a gross distortion of facts and exploitation of corruptible elements in the corporate media



  9. Željko Topić and Ivan Šimonović, Two Residues of Ivo Sanader's Corrupt Regime, Seen as Indirectly Connected

    Further exploration of the remnants of Sanader's highly notorious record and those whom he had brought to power before he landed in jail



  10. Links 27/3/2015: Ubuntu 15.04 Second Beta, Dart 1.9

    Links for the day



  11. The EPO's Dutch Scandal Leaves Battistelli and His Cronies on the Run

    EPO management is making concessions and issues statements which admit defeat, allowing the staff union to continue its activities



  12. Microsoft Won't Let People Wipe (Off) Windows But Happily Wipes Android, Wipes Android Apps Through Cyanogen and Blackmailed 'Partners'

    Microsoft's obscene double-standards leave Android and Linux between a rock and a hard place



  13. Links 26/3/2015: GNOME 3.16 Officially Released

    Links for the day



  14. Links 25/3/2015: India Moving to Free Software

    Links for the day



  15. Another Reason to Boycott UEFI: Back Doors or Crackers

    UEFI makes computers more prone to infections, according to some security experts



  16. The EPO's Administrative Council is Under Increased Pressure to Rein in and to Finally Stop Benoît Battistelli

    The EPO's Administrative Council (AC) is about to have a meeting, so the Member States' delegations are urged to call for action



  17. IRC Proceedings: February 22nd - March 21st, 2015

    Many IRC logs



  18. The Latest Microsoft Attacks on GNU/Linux and Free/Libre Software

    Microsoft is still hiding behind the façade of 'love' whilst actively attacking GNU/Linux and Free software from many directions



  19. Attempts to Disrupt Android by Pushing Microsoft Software Into It (Using Patent Blackmail and Cyanogen)

    Microsoft's Android coup d'état is succeeding owing to public apathy and poor comprehension of what Microsoft really is up to, partly due to media misdirection



  20. Links 24/3/2015: WebKitGTK+ 2.8.0, Black Lab Linux 6.5

    Links for the day



  21. Concerns Over Željko Topić's Alleged Powerful Links in Croatian Diplomacy

    Rikard Frgačić explains the powerful connections acquired though Ivan Šimonović, who is himself connected to EPO Vice-President Željko Topić



  22. Benoît Battistelli's EPO Comes Under Fire From Prominent Figures Who Are Key EPO Stakeholders, Expect Battistelli to Resign 'in the Longer Term'

    The ‘reign of terror’ which is primarily attributed to Battistelli and his cronies may be about to end; the Luxembourg parliament approves the Unified Patent Court



  23. Benoît Battistelli's EPO is Under Attack From French Politicians Yet Again

    More EPO interventions -- this time from France -- target Benoît Battistelli over his abuses and take it up to Eurocrats for political actions



  24. Bribes and Extortion Help Turn Android (Linux-powered) Into 'Microsoft Android'

    A strategy involving harassment and bribes drives large Android players into Microsoft's arms (PRISM and lock-in), much to Google's (and users') detriment and beyond regulators' range of visibility



  25. Microsoft-connected Black Duck Software Created by Microsoft Marketing Man as an Anti-GPL Operation, Admits the Management

    Black Duck "was founded [on] the idea ... to keep GPL-licensed code out of corporate codebases entirely," according to a new report



  26. Links 23/3/2015: Linux 4.0 RC5, Kubuntu Celebrates Ten Years

    Links for the day



  27. Microsoft Admits Lying (or Deceiving) About the Cost of Vista 10

    After much hype in the press about Windows being 'free' it turns out that Microsoft just lied yet again, leaving that lingering perception that Windows is as inexpensive as GNU/Linux



  28. Politics of Blackmail at the EPO

    Comments serve to highlight the role of bribes (or contrariwise blackmail), as allegedly exercised by the current management of the European Patent Office



  29. Benoît Battistelli's EPO Comes Under Attack From the British

    A British MEP criticises Battistelli and the management of the European Patent Office (EPO) while Baroness Lucy Neville-Rolfe, UK Minister for Intellectual Property, gets closer to Battistelli in a tactless effort to improve relations



  30. The Royal Norwegian Department of Labour on the Right of European Patent Office (EPO) Workers to Strike

    The role of bureaucrats from Norway in defending (or not) the rights of EPO workers -- rights that the EPO's management is actively trying to deny and punish for


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts