EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS


NSA Shows Why We Should Abandon All Proprietary Software and Verify Trust

Posted in Free/Libre Software, Security at 11:19 am by Dr. Roy Schestowitz

Without source code of all levels/layers of the software trust just cannot be established


Summary: Proprietary software can never be secure and back doors inside of it can be assumed (unless proven otherwise), based on some of the latest NSA leaks

THE NSA is a criminal operation, so we expect it to work with other criminal operations. Microsoft and the NSA collude to make the world a less secure place, enabling espionage with Windows (Stuxnet for example) and providing video/audio surveillance in people’s own homes without any warrants. Microsoft is about lawlessness is the same way the NSA is. The law of “rule” supersedes the rule of law.

Some say that the Windows-centric Stuxnet is the “world’s first true cyber-weapon”, but that is not true. History aside, to put it as IDG put it: “Stuxnet’s creators recognized they had built the world’s first true cyber-weapon and were more interested in pushing the envelope of this new type of digital warfare than causing large-scale destruction within targeted Iranian nuclear facilities, a study shows.

“In an analysis released last week, Ralph Langner, head of The Langner Group and a renowned expert in industrial control systems (ICS), also refuted arguments that only a nation-state had the resources to launch a Stuxnet-like attack. Assailants with less ambition could take the lessons learned and apply them to civilian critical infrastructure, he said.”

This was an example of overreach and violation of the law, enabled of course by Microsoft and Windows. GNU/Linux does not sell its users down the river the way Windows does.

Sadly, firms like White Source make a comeback with their FUD and they single out FOSS for security issues (here is the press release). This is not acceptable because they totally ignore the much bigger threats, as above (where security issues are there by design).

The White House is at war against FOSS geeks and other phantom enemies [1,2], where the logic is something along the lines of, if we don’t control it (we as in the government), then it’s a threat to national security. While it seems clear that a brute force attack is the Achilles Heel of FOSS [3,4,5] and Google keeps improving security of FOSS projects like Android [6,7,8,9.10] and others [11,12], the logic followed by the likes of White Source and White House is that if something proprietary keeps its flaws (or back doors) secret, then it’s secure and we should not pay attention to real security. Again, this is simply not acceptable.

The head of the Linux Foundation recently said that FOSS is safer, and Linux is more secure than any other OS [13]. Mikko Hypponen seems to agree with him [14] and despite some new known flaws in Red Hat software [15,16] (transparency makes weaknesses visible) we should remember that lack of knowledge about something does not mean it’s not there. Just because we cannot easily see back doors in proprietary software doesn’t mean they’re not there (some groups of people know they’re there and they exploit them silently). If Europe is serious about cyber security [17], then it should dump all proprietary software (back doors-friendly software) as soon as possible. Given everything we now know about the NSA, ignorance and uncertainty are no longer an excuse. A Dutch source has just revealed that the NSA cracked 50,000 computer networks. The evidence is overwhelming. Stuxnet is peanuts next to that.

Related/contextual items from the news:

  1. How Antisec Died

    Depending on when one asked, Antisec was generally between 8-10 people, with a solid core of about six. Not all of them were comfortable with talking to me, and certain ones were designated to communicate with press. I was never entirely sure who was in or out at any particular time — it was a fluid group. I never knew all the nicks. I talked repeatedly with five of them, including Sabu.

  2. Bizarre Online Gambling Movie-Plot Threat

    This article argues that online gambling is a strategic national threat because terrorists could use it to launder money.

  3. Huge horde of droids whacks code box GitHub in password-guess attack
  4. GitHub resets user passwords following rash of account hijack attacks

    GitHub is experiencing an increase in user account hijackings that’s being fueled by a rash of automated login attempts from as many as 40,000 unique Internet addresses.

  5. Google extends its proactive Patch Reward Program to include Android Open Source Project, Web servers, and more
  6. Google adds Android Open Source Project to Patch Rewards program
  7. Google expands Patch Rewards Program
  8. Google extends open source bug bounty programme to Android and Apache
  9. Android now part of Google’s Patch Reward Program
  10. Google adds Android and Apache to open source security rewards programme

    Google has extended its Patch Reward Program to include a raft of new platforms and technologies including its own Android system as it looks to improve the securiry of open source software.

    The firm announced an overhaul to its security patch policies last month, offering white hats up to $3,133 for fixes.

  11. Experts applaud Google completion of SSL certificate upgrade

    Step up to 2048-bit keys optimizes balance between protection of company services and maintaining performance

  12. Pinkie Pie and His Google Exploits: The Legend Grows

    Pinkie Pie returned in 2013 for the desktop Pwn2Own event operated by Hewlett-Packard’s Zero Day Initiative (ZDI), taking aim once again at Google. This time, it was Google’s Chrome browser running on Chrome OS. Pinkie Pie’s effort landed him another $40,000 in award money for the discovery and reporting of what turned out to be a trio of flaws, including one buried deep within the Linux kernel. Chrome OS is a Linux-based operating system that Google uses on its Chromebook notebooks.

    But wait. There is still more.

    Just this week in Japan at HP’s Mobile Pwn2Own event, the legend of Pinkie Pie grew as the My Little Pony-loving security researcher once again demonstrated previously unknown zero-day flaws in Google’s Chrome. Pinkie Pie was able to pwn Chrome on both a Nexus 4 as well as a Samsung Galaxy S 4 smartphone. This time, Pinkie Pie pocketed $50,000 for his efforts.

  13. Linux chief: ‘Open source is safer, and Linux is more secure than any other OS’ (exclusive)
  14. Mikko Hypponen: Open Source Software Will Make the World More Secure

    Open source software can be one answer to combating the global surveillance of innocent citizens, said security expert Mikko Hypponen in his keynote last week at LinuxCon and CloudOpen Europe in Edinburgh.

  15. Hackers actively exploiting JBoss vulnerability to compromise servers, researchers say

    Attackers are actively exploiting a known vulnerability to compromise JBoss Java EE application servers that expose the HTTP Invoker service to the Internet in an insecure manner.

  16. Red Hat: 2013:1521-01: python-django: Moderate Advisory
  17. European businesses urged implement anti-cyber security systems

    The European Cyber Security Directive, which proposes that European businesses have a legal obligation to ensure they have suitable IT security mechanisms in place, is soon to be enforced in the UK.

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New

  1. Željko Topić Attacks EPO Staff for 'Daring' to Legally Challenge the EPO's Management Over Its Gross Abuses in Europe

    Benoît Battistelli's right-hand man, Željko Topić, is under the false impression that yet more threats against staff of the EPO will help contain the crisis rather than further inflame it

  2. Media Reports Based on New Patents Suggest That Microsoft Continues to Attack Google and Android/Linux, Trying to Tax and Delete Android

    Reports and patent applications serve to show that Microsoft not only tries to infiltrate ("embrace") Android to put its apps there ("extend") but ultimately to delete ("extinguish") Android

  3. Commenters Provide Possible Explanations for Mr Van der Eijk Being on Unlimited Sick Leave

    Rumours are swirling around Wim Van der Eijk's absence, suggesting that he too may be a victim of Benoît Battistelli's iron fist

  4. Links 6/10/2015: Linux 4.3 RC4, HP OpenSwitch, Wind River Linux 8

    Links for the day

  5. With Software Patents in Europe (and Pushes for the Same Thing in Australia and India) Patent Trolls Now Come to Europe, Attack Android/Linux

    Worst-case scenarios are becoming a reality as Android backers officially attacked by patent trolls using standard-essential patents in London, England

  6. New Information on Limbo in the Enlarged Board, Courtesy of Illegal Actions by the EPO's Benoît Battistelli

    Battistelli's bullying of people whom he is not even allowed to bully turns out to have gone on for a lot longer than promised, and there is no sign of light at the end of this tunnel

  7. Microsoft Customers Complain About 'Inevitable' Vista 10 Because Microsoft Nearly Forces Botched 'Upgrades'

    In a desperate effort to spread Vista 10, sometimes even against people's will, Microsoft really upsets loyal customers, who are eventually eager to explore alternatives

  8. Dr. Ingve Björn Stjerna Explains Why the UPC (“Unitary Patent“ System) is an Undemocratic Sham Whilst UPC Silently Advanced by Patent Lawyers and Politicians

    European patent laws are being covertly overridden so as to allow broader scope of litigation, higher financial damages, speedy injunctions, and even software patents; the European public is intentionally kept in the dark about it, hence kept unable to express scepticism or issue truly effective objections

  9. IRC Proceedings: September 13th, 2015 – October 3rd, 2015

    Many IRC logs

  10. Article Explains Why SUEPO Went Silent Well Over a Week Ago: Nobody is Allowed to Talk to Journalists Without Permission From Battistelli

    More threats from Benoît Battistelli (threats of termination and legal actions on top of it) help hide the abuses of Battistelli and his fellow thugs at the EPO

  11. A Linux World: After Billions of Dollars in Losses Microsoft Changes How It Reports Financial Results

    The abusive monopolist is trying very hard to hide its growing difficulties, especially in an effort to bamboozle non-technical shareholders who cannot understand how Linux has essentially taken over

  12. Microsoft Continues to Extort Linux and Android OEMs Using Software Patents, This Time ASUS (Forced to Pre-Install Microsoft Spyware With OOXML)

    A roundup of news illustrating that Microsoft is still very much in a total war against Android, (mis)using federal regulators and even software patents to get its way

  13. Links 4/10/2015: Linux 4.2.3 , 4.1.10; MPlayer 1.2 released

    Links for the day

  14. Links 2/10/2015: Qubes 3.0, Linux.Wifatch

    Links for the day

  15. Microsoft-Connected Firm Net Applications Used to Mislead About Vista 10 Share and Mock GNU/Linux

    People who are connected to Microsoft (some being former staff) link to a firm that is connected to Microsoft in order to create the illusion that Vista 10 market share grew to 6.63%

  16. Chairman of the Enlarged Board of Appeal (EBoA) and EPO Vice-President of DG3 Suspiciously on Unlimited Sick Leave After Benoît Battistelli's Unprecedented Attacks on Other EBoA Staff

    Rumours suggest that Benoît Battistelli's affairs at the EPO may have something to do with Wim Van der Eijk's longterm absence

  17. Microsoft's Secret Special Relationship With EPO Illustrates Serious Corruption at Microsoft and the EPO

    A big story about the EPO and Microsoft working in a sort of collusion-type setup so as to serve Microsoft's patent agenda, which involves aggression, even against European software that is Free (as in freedom)

  18. Links 1/10/2015: LFS 7.8, Calculate Linux 15 Released

    Links for the day

  19. The 'Microsoft Loves Linux' Baloney is Still Being Floated in the Media While Microsoft Attacks Linux With Patents, New Lawsuits Reported

    Despite Microsoft's continued assault on Linux and on Android (using software patents, which it still discreetly lobbies for), some figures in the media are perpetually peddling the Microsoft-serving lie that 'Microsoft loves Linux'

  20. The Microsoft Botnet Goes Bonkers and ATMs Running Windows Spew Out Cash

    The terrible security (by design) of Microsoft Windows is causing all sorts of very serious and collectively expensive issues

  21. Black Duck Continues to Pile FUD on Free/Libre Software

    Having spent nearly a decade promoting the fear of Free software licensing, Black Duck now does the same regarding Free software security

  22. Links 30/9/2015: New Kernels, Nexus Devices

    Links for the day

  23. Links 28/9/2015: Last News Catchup Before Resumption

    Links for the day

  24. Links 25/9/2015: GNU/Linux in Indian Government, NeoKylin in China

    Links for the day

  25. Süddeutsche Zeitung Explains Imminent Federal Scrutiny Against Battistelli's EPO in Germany

    The German newspaper Süddeutsche Zeitung reveals that actions by the German government may be imminent against the EPO's cliquish management, including its ringleader Benoît Battistelli

  26. EPO Managers, Patent Lawyers, Commissioners and Other Non-Technical Personnel Tackle Democracy, Alter Laws in Bulk and in Secret

    The reckless assault on European democracies and long-established laws across Europe are now lucidly demonstrated when it comes to patents

  27. Europe's Acceptance of and Resistance to Software Patents, Courtesy of Corporate Front Groups and Courtrooms Respectively

    A snapshot of recent developments and upcoming developments in Europe, regarding software patents in particular

  28. German Press Explains EPO Investigation Unit (I.U.), Struggles to Openly Speak to the Secretive EPO

    The secretive Investigation/Investigative Unit (I.U.) of the European Patent Office (EPO) is further studied/explored by a recent article from junge Welt, an old and well-established German newspaper (since 1947)

  29. Links 24/9/2015: GNOME 3.18, Fedora 23 Beta, New Firefox

    Links for the day

  30. Translation Needed of Article About EPO Threats Against SUEPO's Elizabeth Hardon

    A call for translation of an important article that may help shed light on the modus operandi of the Investigation/Investigative Unit of the EPO, which works with Control Risks Group (CRG), the 'British Blackwater'


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time


Recent Posts