EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

09.26.13

Former Novell Staff Still Pushing the Linux Foundation Into Restricted Boot Territory, Ignoring the Real Threat (Back Doors)

Posted in GNU/Linux, Kernel, Novell, Security at 3:54 am by Dr. Roy Schestowitz

Greg Kroah-Hartman
Photo by Sebastian Oliva

Summary: Back doors in code, embedded in blobs, and even shoehorned into encryption is the overlooked security threat, which gets pushed aside in favour of phantom threats which Microsoft ‘sells’ through former Novell staff (i.e. funded by Microsoft)

A MONTH or two ago we mostly ignored exaggerated (sexed-up) reports about something called “Hand of Thief”. When there’s a Windows security threat the press does not call out Windows, but when it relates to GNU/Linux then tabloids like ZDNet scream from the rooftops. This thing called “Hand of Thief” is basically a malicious program which GNU/Linux users need to install themselves in order for it to do malicious things. It is not a virus, it does not spread, and it hardly even uses social engineering to get itself installed. We cited some reports which stress these facts and now comes a belated one too [1]. LynuxWorks is now offering some “Linux rootkit detector” [2] as if rootkits on GNU/Linux are a common issue. In a sense, since the Linux Foundation seems to insist on helping UEFI restricted boot, we are led to the belief that bootkits are a common threat to Linux. As the Linux Foundation’s site put it, as in the words of the employee it acquired from Novell:

Now that The Linux Foundation is a member of the UEFI.org group, I’ve been working on the procedures for how to boot a self-signed Linux kernel on a platform so that you do not have to rely on any external signing authority.

Greg K-H has been working on all sorts of other kernel-level projects that help Microsoft. He did this while being paid by Novell, which was in turn being given money by Microsoft. That’s the power of money. Other former Novell employees also helped promote UEFI restricted boot, as we showed before. Rogue influence by Novell in the Linux Foundation is a subject we have written about for half a decade, showing numerous examples.

The bigger security issue right now might be back doors, which might also exist in Linux, even in encryption form [3] (giving away passwords over the network for example), so hard-to-crack passwords [4] might not be enough. Microsoft’s and Sony’s network compromises sure reveal the massive financial effects of system intrusions, so this subject should not be taken lightly.

UEFI restricted boot is actually a security threat, not a security solution, especially when a signature is provided and managed by some rogue company in the United States — one which has been secretly in bed with the NSA. With UEFI restricted boot, hardware can be bricked remotely. In a way, UEFI restricted boot deserves the name “unsecure boot”. In some devices it can block the user from accessing his/her own computer. Nobody should promote such treacherous computing.

Related/contextual items from the news:

  1. Hand of Thief, Not

    Linux’s biggest vulnerability is the software that users install with full “superuser” privileges. If you just install applications from your distro’s official repository, that’s not a problem. But if you download software from dubious web sites, or if you add a mysterious repository to your package manager, you’re opening yourself up for an infection. Always, always make sure you know what software you are installing, why you are installing it, and where it’s from.

  2. Linux rootkit detector adds hardware punch to security scanning

    LynuxWorks is stepping up the battle with the release of the first hardware-based rootkit detection system powered by the LynxSecure separation kernel. Called the RDS5201, it combats and detects stealthy advanced persistent threats. Built on the LynxSecure 5.2 separation kernel and hypervisor, this small form factor appliance has been designed to offer a unique detection capability that complements traditional security mechanisms as they try to protect against the growing number and complexity of cyber threats.

  3. RSA warns developers not to use RSA products

    In today’s news of the weird, RSA (a division of EMC) has recommended that developers desist from using the (allegedly) ‘backdoored’ Dual_EC_DRBG random number generator — which happens to be the default in RSA’s BSafe cryptographic toolkit. Youch.

  4. How-to make hard-to-crack passwords you can easily remember
  5. Australian who boasted of hacking to plead not guilty to charges stemming from raid

    Dylan Wheeler, who claimed in February to have breached Microsoft’s and Sony’s networks, has not been charged with hacking

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. Links 20/8/2014: Linux Event, GNOME Milestone

    Links for the day



  2. Corruption Watch: Microsoft Lobbying Designed to Kill Chile's Free Software Policy and Promote Microsoft With Subsidies, More Dirty Tricks Emerge in Munich

    icrosoft is systematically attacking migrations to GNU, Linux and Free software, using dirty tricks, as always



  3. Vista 8 Such a Disaster That Even Microsoft Cannot Cope With It, Vapourware Tactics Start Early

    Microsoft's Windows-powered services are failing and Windows gets bricked by Microsoft patches, whereupon we are seeing yet more of Microsoft's vapourware tactics (focusing in imaginary, non-existent versions of Windows)



  4. On BlackBerry and Other Patent Trolls

    A roundup regarding patent trolls, starting with the bigger and latest joiner, BlackBerry's new patents apparatus



  5. Links 19/8/2014: Humble Jumbo Bundle 2 Betrayal, Mercedes-Benz Runs GNU/Linux

    Links for the day



  6. BlackBerry -- Like Microsoft Nokia -- Could be the Next Patent Proxy Troll

    BlackBerry is restructuring for patent assertion (i.e. trolling) in the wake of some alliances with Microsoft



  7. After Microsoft's Soft Bribe Some Non-Technical Deputy Does Not Like Free Software, Microsoft-Linked Media Responds to This Non-News by Making Bogus Claims of Munich Leaving GNU/Linux (Updated)

    The subversive forces that have secretly been attacking Munich over its migration to GNU/Linux (Microsoft press, Gartner, and even HP) are back to doing it while China and Russia follow Munich's lead



  8. Gates Foundation CFO Quits and Debate About Revolving Doors Recalled Amid Systematic and Shrewd Bribery of Public Officials

    More officials step out of the Gates Foundation and their destination is not known yet; Gates continues to corrupt the public sector with his money so as to increase personal gain at taxpayers' expense



  9. Links 19/8/2014: GNU/Linux Raves and Alternative to Proprietary Voice Chat

    Links for the day



  10. Links 18/8/2014: Linux 3.17 RC1, Escalation in Ferguson

    Links for the day



  11. Gartner Group Advocates Using Defective Software With Back Doors

    Despite strong evidence that Microsoft has been complicit in illegal surveillance, Gartner continues to recommend the use of Windows and other espionage-ready Microsoft software



  12. The Microsoft Patent Trolls: Android Extortion, Vringo Versus Google, and Intellectual Ventures

    Roundup of news about patent aggression by Microsoft and some of its proxies



  13. Links 16/8/2014: Microsoft Linux, US Government Turns to Free Software

    Links for the day



  14. Links 15/8/2014: Reiser4 in Headlines Again, GNOME and KDE Events Finish

    Links for the day



  15. Links 14/8/2014: Kernel Summit Coming, KMix on KDE Frameworks 5

    Links for the day



  16. Shameless Microsoft Spin is Blaming China for Microsoft's Misconduct and Back Doors While Justifying Massive Losses in Hardware (Made in China)

    A new look at how Microsoft-friendly media takes negative Microsoft news and turns that news into some kind of scandals where Microsoft is the victim



  17. Microsoft Spin in the Media Evokes 'New Microsoft' and New Back Doors

    Some new examples of Microsoft boosters rewriting history, characterising Microsoft as a FOSS champion, and generally weak/shallow reporting on Microsoft's audio/video surveillance software



  18. Links 13/8/2014: GNU/Linux as Winner, New Snowden Interview

    Links for the day



  19. Reader's Article: Skype Spying Reaches New Levels of Blatant

    Forced 'upgrades' of Skype give useds [sic.] of Skype more than they asked for



  20. The Problem is Software Patents (and Scope), Not Patent Trolls Who Abuse Them Just Like Large Corporations

    Reminder of the dangers of losing sight of the real patent problem, which is the patents themselves, not necessarily those who use them



  21. Fraud in the USPTO and CAFC Helped Apple Launch Frivolous Patent Lawsuits Against Linux/Android, Based on New Withdrawals

    Inherent corruption in the US system has aided Apple's assault on east Asian electronics giants that use Linux at the core of their products



  22. Investigation Reveals That USPTO is Corrupt, Time to Abolish It or Annul Nearly a Million Patents

    Corruption is found at the heart of the USPTO and the USPTO works hard to hide it, despite attempt by whistleblowers to bring this corruption to light



  23. Links 13/8/2014: Red Hat Enterprise Linux 6.6 Beta, Tizen in Watches

    Links for the day



  24. Links 12/8/2014: Chromebooks Surge, OpenGL in the Headlines

    Links for the day



  25. Bill Gates is Profiting By Diverting Public Money to His Own Pocket and Reducing Wages

    Gates' lobbying for companies he is an investor of and for lower salaries inside companies he is investing in (and managing) comes as no surprise



  26. Microsoft is Still Attacking Open Standards, So Khronos Does Not Need the Microsoft Moles

    Having attacked the industry's document standard OpenDocument Format (ODF) while pretending to have 'embraced' ODF Microsoft is now pretending that it is eager to support OpenGL



  27. Another Depressing Look at the Patent Systems in the US and in Europe

    A roundup of news about patent monopolies and in particular the immense power wielded by giant multi-national corporations that steer the debate and acquire trans-Atlantic monopolies on ideas, always against citizens' interests



  28. Links 11/8/2014: DEFT 8.2, Linux Mint on Debian Stable

    Links for the day



  29. Links 9/8/2014: Knoppix 7.4.0, GNU Linux Libre 3.16

    Links for the day



  30. Links 8/8/2014: Qt a Separate Company Again, KDE Frameworks 5.1 Released

    Links for the day


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts