11.24.13

Trusting Trust and Trusting Red Hat et al.

Posted in Microsoft, Red Hat, Servers at 5:27 am by Dr. Roy Schestowitz

Even Red Hat’s logo does not inspire confidence

Red Hat logo

Summary: Why companies which are based on the United States cannot be trusted as US law requires them to provide access to personal information (or even back doors) without ever disclosing this

Red Hat Enterprise Linux 6.5 has just come out [1,2,3]. Red Hat targets the so-called 'cloud' (surveillance-friendly) market with it, quite frankly as usual [4]. Cutting-edge RHEL prototypes like Fedora 20 are to be released soon, and Scientific Linux (not just CentOS) will need to catch up by rebranding RHEL (they are being compared in terms of performance in [5]). Some people are remixing [6] Red Hat’s distributions, not rebranding them. But few people actually audit RHEL code line by line. Disassembling RHEL binaries is an even greater challenge, so nobody knows for sure what RHEL does. It’s a vast body of software and it is deployed in many mission-critical operations, not just in the United States.

“Trusting Trust” is an old concept, coined by some of the earlier UNIX folks. This subject happened to have been raised during business lunch earlier this week and it speaks on the degree of trust we must place on compiler developers, chipmakers, high-level software companies, and even Free software developers whose code we never personally audited (or continue to audit every time a new release is made available). Verifying the security of a small piece of software like a CMS (as Germany currently does) is feasible, but for entire operating systems it is virtually impossible and then there’s the peril of checking chip designs, their fabrication process, and the same for software (compilers). IBM et al., those who infect computers with TPM (NSA connections) only lead to mistrust. We are talking about a “special surveillance chip” here. And yes, there is history to it. Slashdot published this bit of analysis a few months ago. Read the comments too. One says: “I work for Red Hat…. The NSA asks me to put code in the Linux kernel and I pass it to Linus.” (see the context for more interesting information of this kind).

There is currently a discussion in Diaspora about this. It is argued that Red Hat will need to appease the government — especially the Pentagon/DOD — in order to keep winning major contracts that are derived from black budgets sometimes. There are stories I am aware of (but cannot share) about the role spies play in procurement for government. They can veto and influence decisions. This is a very ugly side of procurement which many people are simply not aware of. It only makes sense for Red Hat to try to appease the NSA and perhaps attach code from the NSA, with or without sufficient scrutiny (it goes well beyond involvement in SELinux, which is not the NSA’s only role in Linux). Well, some in Twitter wanted more information about this, so I reminded them that several years ago I wrote about how RHEL goes through the NSA before release; the same is true for SUSE. Now we know for sure that Linux was the target of NSA back doors [1, 2, 3, 4]; more new reporting on this [7-10] is starting to appear (people are catching up) and a new report tells us that “NSA infected 50,000 computer networks with malicious software” [11].

“he law in the US has become somewhat incompatible with freedom-respecting software.”We already know that the NSA worked closely with Microsoft and got a widely-used platform (internationally) with back doors it has exclusive access to, which basically means that Microsoft Windows is a Trojan horse for the NSA. Just remember where Linux is being developed. It’s the same country as Microsoft and Apple. Projects like Debian inherit some code from Red Hat, which complicates things further. The chain of trust is undone.

After the new report from the New York Times [12,13] (published to make huge impact this weekend) perhaps it’s time for Torvalds to withdraw his newly-acquired US citizenship and move back Linux development to Finland. With all sorts of National Security Letters, gag orders, oppressive laws like PATRIOT Act etc. we just know that those based in the US can be forced to facilitate surveillance (without ever speaking about it publicly). This may sound like a radical solution, but when companies like Red Hat and the Linux Foundation need to comply with US laws we just simply cannot have any trust. Torvalds pretty much lied to us (in a clever way) about NSA request for back doors in Linux, but his father, who is a European politician based in Europe, told us the truth.

In the past we argued that Red Hat should move to Europe because of software patents (I asked Red Hat’s CEO about it and he dismissed the possibility). Now we have another reason to suggest relocation. The law in the US has become somewhat incompatible with freedom-respecting software.

Related/contextual items from the news:

  1. Red Hat Enterprise Linux 6.5 Delivers Precision Timing
  2. Red Hat Launches Latest Version of Red Hat Enterprise Linux 6
  3. Red Hat Enterprise Linux 6.5 arrives
  4. Red Hat and eNovance to accelerate adoption of Red Hat Enterprise Linux OpenStack platform

    Red Hat Inc. and eNovance, an emerging European leader in the open source cloud computing market, are collaborating to deliver OpenStack implementation and integration services to joint customers. The companies made the announcement at the OpenStack Summit in Hong Kong.

    The collaboration between Red Hat and eNovance is aimed at accelerating enterprise adoption of OpenStack globally. According to a new report from 451 Research, OpenStack-related business revenue is expected to exceed $1 billion by 2015 as the enterprise market for OpenStack evolves.

  5. Fedora 20 Beta vs. Ubuntu 13.10 vs. Scientific Linux 6.4
  6. Update on x2go

    I’ve been playing with / using x2go more lately and I sure do like it. I originally learned about it by reading the Fedora 20 ChangeSet and saw that it will be a new feature in the upcoming Fedora 20. I started using Fedora 20 shortly before the alpha release came out. Fedora 20 Beta was released on 2013-11-12… and I’ve been building my MontanaLinux remix about once a week.

  7. NSA wanted a backdoor in Linux, confirms Linus’ father
  8. Did NSA contact Linus for a backdoor in Linux? [updated]
  9. Linus’ father confirms NSA attempt at backdoor in Linux
  10. Mastering Linux, Backdoor’d, & openSUSE 13.1
  11. NSA infected 50,000 computer networks with malicious software
  12. N.S.A. Report Outlined Goals for More Power

    In a February 2012 paper laying out the four-year strategy for the N.S.A.’s signals intelligence operations, which include the agency’s eavesdropping and communications data collection around the world, agency officials set an objective to “aggressively pursue legal authorities and a policy framework mapped more fully to the information age.”

    Written as an agency mission statement with broad goals, the five-page document said that existing American laws were not adequate to meet the needs of the N.S.A. to conduct broad surveillance in what it cited as “the golden age of Sigint,” or signals intelligence. “The interpretation and guidelines for applying our authorities, and in some cases the authorities themselves, have not kept pace with the complexity of the technology and target environments, or the operational expectations levied on N.S.A.’s mission,” the document concluded.

    Using sweeping language, the paper also outlined some of the agency’s other ambitions. They included defeating the cybersecurity practices of adversaries in order to acquire the data the agency needs from “anyone, anytime, anywhere.” The agency also said it would try to decrypt or bypass codes that keep communications secret by influencing “the global commercial encryption market through commercial relationships,” human spies and intelligence partners in other countries. It also talked of the need to “revolutionize” analysis of its vast collections of data to “radically increase operational impact.”

  13. Latest Snowden leak reveals NSA’s goal to continually expand surveillance abilities

    In a mission statement last year the US National Security Agency described how it would continue to expand its power and assert itself as the global leader in clandestine surveillance, according to a new report based on the Edward Snowden leaks.

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Reddit
  • email

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. InteLeaks – Part XXII: Bubbles and Buzzwords, No Substance at Intel's Internet of Things (IoT) Group (IOTG)

    The video above is continuation of the previous part about a document full of superficial buzzwords (not technical jargon anywhere), in effect recommending to managers that they blindly follow trends and cargo cults (such as Clown Computing) and not what’s most suitable for technical excellence



  2. IRC Proceedings: Tuesday, January 19, 2021

    IRC logs for Tuesday, January 19, 2021



  3. Links 20/1/2021: WireGuard for pfSense and New US President

    Links for the day



  4. Links 19/1/2021: Krita 4.4.2 Released and JingOS Hype

    Links for the day



  5. Team UPC Keeps Pretending That UPCA Can Still be Resurrected (Even Without the UK, Which is Strictly a Requirement)

    The latest distortion of facts regarding the Unified Patent Court (UPC) Agreement (UPCA) as seen from the lens of people who seek to profit from such distortion



  6. 'Ethical Source' is Not Ethical and Not a Movement But a Misguided Self-Serving PR Stunt

    Something which is neither enforceable nor ethical is being promoted by profoundly unethical media in the pockets of large corporations



  7. InteLeaks – Part XXI: Intel Seeking Advice From a Bunch of Clowns (Harbor 'Research')

    A firm called Harbor 'Research' is making dubious recommendations to Intel; as shown in the above video, there's also an obsession with buzzwords (typically suggestive of a lack of technical grasp/understanding)



  8. IRC Proceedings: Monday, January 18, 2021

    IRC logs for Monday, January 18, 2021



  9. The US Election Was Not Rigged, But the Nomination Process Was (Undermined to Maintain Control by Oligarchy)

    Cheating/driving the left out of the Democratic Party seems like a longstanding tradition and we know who stands to gain from it; moreover, problems remain in the voting process because it's controlled by secret code of companies like Microsoft (in spite of the openwashing)



  10. InteLeaks – Part XX: Redacted (for Names Only) Release of Intel File About Developer eXperience (DX) Meddling in GNU/Linux

    Today (or tonight) we release the first 'phase' of InteLeaks in a sensibly redacted form; coming up next is a surprise from Team Microsoft



  11. Sites in Bed With the EPO and UPC 'Covering' the 'News' Without Mentioning Any of the Overt Abuses

    It is rather sad that blogs like IP Kat have turned into proponents of abusive EPO management and Team UPC increasingly resorts to lying using pseudonyms (to avert criticism and accountability); much of the rebuttal or response that’s hinged on reality/facts can only be found in comments, which are still subjected to a face-saving moderation process (conducted by Team UPC)



  12. Suppressed Facts of the Free Software Movement and Its Community of Volunteers – Part IV: Stories From the Depths of the Free Software Foundation (FSF)

    To reduce or alleviate suspicions and a potential of mistrust the FSF needs to become more transparent and liberate information (such as the real reason Bradley Kuhn left, as noted in the previous part)



  13. Links 18/1/2021: GNU Radio 3.9, Wikipedia at 20

    Links for the day



  14. InteLeaks – Part XIX: Intel's Web 'Experts' Seen as Microsoft Champions Dealing With the Platform Microsoft is Looking to Destroy

    Things aren't rosy at Intel because the hires aren't suitable for the job of documenting and/or presenting GNU/Linux-centric products (whose target audience is Free software developers)



  15. Adding Images as Characters to the Daily Bulletins of Techrights

    Our daily bulletins now have inside them coarse graphics, depicted using characters alone, and the tool used to generate them announced a new release earlier today; we showcase some of its features (in a new video)



  16. Links 18/1/2021: Weekly Summaries and Linux 5.11 RC4

    Links for the day



  17. IRC Proceedings: Sunday, January 17, 2021

    IRC logs for Sunday, January 17, 2021



  18. The Oligarchs' Parties Will Never Choose the Side of Software Freedom Because Free Software Cannot Bribe Officials

    The tough reality is that next week's (or this coming week's, depending on what Sunday counts as) inauguration ceremony is partly symbolic as all the same and important issues remain largely untouched, for corporations control almost everything of significance



  19. COVID-19 Has Actually Helped Software Freedom Due to Financial and 'Spare Time' Factors

    Developers and users are increasingly exploring what the Free software world has to offer; this is actually measurable and it contradicts claims to the contrary



  20. Future Plans and Using Videos to Complement Text

    Remarks on recent and impending site changes; We are not replacing text with video, we're just trying to enhance the presentation a bit, especially where visuals help make a point or where browsing through Web sites (or leaks) is more suitable than static, linear presentation



  21. InteLeaks – Part XVIII: Intel Does Not Know How to Properly Do Research and It Seems Apparent Unscientific Methods Are Used to Justify Poor Documentation

    There appears to be a severe crisis at Intel; they cannot recruit scientists (or those whom they recruited are walking away) and as a result the company produces bad products with poor documentation (or highly defective chipsets that top-notch marketing cannot compensate for); in this video we walk through some examples of how studies are being conducted (as already noted in Part XVII)



  22. Suppressed Facts of the Free Software Movement and Its Community of Volunteers – Part III: The Free Software Foundation (FSF) Seems More Like a Victim of Destabilisation Campaigns

    The Free Software Foundation (FSF), which turns 36 later this year, is looking to raise money that helps support the GNU Project, soon 38 years old and likely the most important Free software project to exist (ever)



  23. Links 17/1/2021: EasyOS on Raspberry Pi and GNU libsigsegv 2.13

    Links for the day



  24. InteLeaks – Part XVII: The High Cost of Microsoft Windows Users in GNU/Linux Development Teams

    A look inside Intel explains what holds back the technical team, which bemoans the lesser technical people getting in the way and not even using the product that they are writing about



  25. IRC Proceedings: Saturday, January 16, 2021

    IRC logs for Saturday, January 16, 2021



  26. Suppressed Facts of the Free Software Movement and Its Community of Volunteers – Part II: Why Bradley Kuhn Left the Free Software Foundation (FSF)

    The founder of the FSF is still at the FSF (albeit not publicly) and the person who lobbied to oust him has basically been 'banished' by the founder



  27. Links 16/1/2021: LibreOffice 7.1 Release Candidate, Zeroshell 3.9.5, FreeBSD Report, and GhostBSD 21.01.15

    Links for the day



  28. Free Speech on the Web Not Respected by Companies That Used to Support Software Freedom

    Mozilla does not have to make its Web browser about politics; it can just make an excellent piece of software that is neutral about the Web pages that it renders, based on the user's personal preferences



  29. Suppressed Facts of the Free Software Movement and Its Community of Volunteers – Part I: We Are Under Attack by Corporations and Their Salaried Facilitators

    The corporate takeover (taking over the Commons, produced by volunteers who are motivated by altruism) is a subject we must speak about and somehow tackle; this series will highlight uncomfortable or difficult truths



  30. InteLeaks – Part XVI: Intel Cannot Do Command Line, Even When It's Vastly Simpler and More Suitable for Development

    The Developer eXperience (DX) team at Intel seems to be full of Microsoft drones instead of developers and/or mildly technical people; this has not only harmed the quality of documentation but also upset staff, alienating people who actually understand what developers need (more than buzzwords like "DX")


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts