EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

12.22.13

More Details Revealed About How the NSA Infiltrates Windows and Other Proprietary Software, Governments Should Now Ban Microsoft

Posted in Europe, Microsoft, Security, Windows at 2:46 pm by Dr. Roy Schestowitz

RSA Conference

Summary: RSA is the latest (known) entity to have received bribes from the NSA in exchange for back doors; Germany may move towards banning software from companies that share data with the NSA

A COUPLE of nights ago Reuters published an explosive report about RSA, basically showing that Windows does not have back doors, it is a back door and so is a lot of the software that’s proprietary. Free/libre software does not suffer from the trap [1]. This is a serious wakeup call to any government that still relies on proprietary software and US companies that collect data.

Munich moved to GNU/Linux owing to political determination to do so [2], but what about other cities? Their politicians are in serious trouble and a constant threat of espionage.

“This is a serious wakeup call to any government that still relies on proprietary software and US companies that collect data.”As the Reuters report revealed [3] (and there was a lot of journalism linking to it [4,5]), “RSA Weakened Encryption For $10M From NSA,” to quote Slashdot, which consequently also published the item “Microsoft Security Essentials Misses 39% of Malware” (especially NSA malware that enables system compromise). Remember that Windows XP will soon receive no patches, so not just the NSA will get easy access through back doors. IDG’s advice on this matter is misguided as it basically offers continued use of Windows XP rather than runaway to a secure platform like GNU/Linux. As the author put it, “Microsoft’s support for Windows XP ends in less than four months, and the company has warned users repeatedly that it’s time to move on. But a lot of them are sticking with the aged OS. And for Microsoft, that’s a problem.”

Security is not really a problem here because there was never really any security to begin with. As we showed in our articles about the NSA, Windows is just a Trojan horse. It is obviously not secure and the only variable is, how many people can seize control of it?

The latest news makes almost all proprietary software suspect, even fake ‘open source’ like TrueCrypt (it is proprietary). As one tweet put it, “Check all on this list who use Dual_EC_DRBG as possible recipients of NSA bribes [...] Note Blackberry, Cisco, Juniper [...] Blast from the past: Call tracking Dual_EC_DRBG “Bribe Finder”: Any use by default post 2007 required either an implicit or explicit bribe.”

This is another good reason to avoid all proprietary software, including widely-used GNU/Linux programs like Skype. One tweet said that “Dual EC_DRBG was suspiciously absent from Wednesday’s report by President Obama’s NSA advisory panel.”

Going back to Microsoft’s flawed detection of malware, MinceR wrote that “their alleged “anti-malware” efforts started with stopping detecting claria as malware just as they were about to buy it, so i don’t know why anyone trusts them with such … [it] manages to out-sleaze even the other “antivirus” companies.”

” With Microsoft, NSA gets video/audio surveillance, not just through Skype but also through people’s webcams on computers that have Windows installed (and are idle).”Sosumi said that “they don’t detect NSA backdoors as malware, so why trust them?”

Nobody can trust Microsoft. The above report says that “latest tests from Dennis Publishing’s security labs saw Microsoft Security Essentials fail to detect 39% of the real-world malware thrown at it.”

It’s not just a case of access to one’s files by the way. See the new post titled “Windows users: Your webcam lights aren’t safe from the FBI either” (we wrote about CIPAV almost 5 years ago).

“In recent news,” says the post, “it was revealed the FBI has a “virus” that will record a suspect through the webcam secretly, without turning on the LED light. Some researchers showed this working on an older Macbook. In this post, we do it on Windows.”

“The more you know about how the NSA gets along with RSA & Microsoft,” writes one Twitter user, “the more perspective you have on their handling of Lavabit.” With Microsoft, NSA gets video/audio surveillance, not just through Skype but also through people’s webcams on computers that have Windows installed (and are idle). This is a good enough reason to immediately abandon Microsoft and some politicians in Germany already think about moving in this direction. See [6,7] below for details of the latest news and pay attention to the explosive new article “Snowden ally Appelbaum claims his Berlin apartment was invaded” [8]; clearly it’s not about terrorism but about cracking down on activists [9].

Following the revelations above there is some new effort [10] — including from GNU/Linux developers [11] — to sack with prejudice potential NSA moles.

Related/contextual items from the news:

  1. Worried OpenSSL uses NSA-tainted crypto? This BUG has got your back

    As fears grow that US and UK spies have deliberately hamstrung key components in today’s encryption systems, users of OpenSSL can certainly relax about one thing.

    It has been revealed that the cryptography toolkit – used by reams of software from web browsers for HTTPS to SSH for secure terminals – is not using the discredited random number generator Dual EC DRBG.

    And that’s due to a bug that’s now firmly a WONTFIX.

    A coding flaw uncovered in the library prevents “all use” of the dual elliptic curve (Dual EC) deterministic random bit generator (DRBG) algorithm, a cryptographically weak algorithm championed by none other than the NSA.

    No other DRBGs used by OpenSSL are affected, we’re told.

  2. Moving a city to Linux needs political backing, says Munich project leader

    This year saw the completion of the city of Munich’s switch to Linux, a move that began about ten years ago. “One of the biggest lessons learned was that you can’t do such a project without continued political backing,” said Peter Hofmann, the leader of the LiMux project, summing up the experience.

    The Munich city authority migrated around 14,800 of the 15,000 or so PCs on its network to LiMux, its own Linux distribution based on Ubuntu, exceeding its initial goal of migrating 12,000 desktops.

  3. Exclusive: Secret contract tied NSA and security industry pioneer

    As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $10 million contract with RSA, one of the most influential firms in the computer security industry, Reuters has learned.

  4. NSA Gave RSA $10 Million To Promote Crypto It Had Purposely Weakened

    Earlier this year, the Snowden leaks revealed how the NSA was effectively infiltrating crypto standards efforts to take control of them and make sure that backdoors or other weaknesses were installed. Many in the crypto community reacted angrily to this, and began to rethink how they interact with the feds. However, Reuters has just dropped a bombshell into all of this, as it has revealed that not only did the NSA purposefully weaken crypto, it then paid famed crypto provider RSA $10 million to push the weakened crypto, making it a de facto standard.

  5. How much did NSA pay to put a backdoor in RSA crypto? Try $10m – report

    Latest Snowden claims: Flawed encryption tech switched on by default in exchange for cash

  6. Germany should ban U.S. contracting companies passing data to NSA – report

    U.S. contracting companies such as Cisco, which manages much of the German armed forces’ data, should be contractually barred from passing sensitive information to the U.S. security services, a spokesman for Chancellor Angela Merkel’s conservatives was quoted saying.

  7. German government buildings and charities were targets of GCHQ and NSA, says Edward Snowden

    Humanitarian organisations and German government buildings are among the targets of UK and US surveillance agencies, documents leaked by Edward Snowden are said to show.

    The latest disclosures from the Snowden archive also highlight the key role in national security played by the small Cornish holiday resort town of Bude.

    A government listening facility on the Cornish coast had a unit that was used to analyse samples of electronic date to assess whether surveillance targets were worth the effort of listening in on their communications more frequently.

    A significant amount of the Bude listening post’s funding comes from the National Security Agency (NSA), the US surveillance body, because of shared operational projects.

  8. Snowden ally Appelbaum claims his Berlin apartment was invaded

    Jacob Appelbaum, a US Internet activist and one of the people with access to Edward Snowden’s documents, has told a Berlin paper that his apartment was broken into, saying he suspected US involvement.

  9. The Real Purpose of Oakland’s Surveillance Center

    City leaders have argued that Oakland needs a massive surveillance system to combat violent crime, but internal documents reveal that city staffers are also focused on tracking political protesters.

  10. Critics: NSA agent co-chairing key crypto standards body should be removed (updated)

    Security experts are calling for the removal of a National Security Agency employee who co-chairs an influential cryptography panel, which advises a host of groups that forge widely used standards for the Internet Engineering Task Force (IETF).

    Kevin Igoe, who in a 2011 e-mail announcing his appointment was listed as a senior cryptographer with the NSA’s Commercial Solutions Center, is one of two co-chairs of the IETF’s Crypto Forum Research Group (CFRG). The CFRG provides cryptographic guidance to IETF working groups that develop standards for a variety of crucial technologies that run and help secure the Internet. The transport layer security (TLS) protocol that underpins Web encryption and standards for secure shell connections used to securely access servers are two examples. Igoe has been CFRG co-chair for about two years, along with David A. McGrew of Cisco Systems.

  11. Kevin M. Igoe should step down from CFRG Co-chair

    I’ve said recently that pervasive surveillance is wrong. I don’t think anyone from the NSA should have a leadership position in the development or deployment of Internet communications, because their interests are at odds with the interest of the rest of the Internet. But someone at the NSA is in exactly such a position. They ought to step down.

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. Links 20/7/2018: MusicBrainz is Back, Microsoft Pushing .NET Through Canonical

    Links for the day



  2. Some US Patents' Quality is So Low That There's a Garden Clearance/Fire Sale

    Rather than shoot worthless patents into orbit where they belong the Allied Security Trust (AST), collector of dubious patents, will try to sell them to gullible opportunists and patent trolls (even if the said patents would likely perish in courts)



  3. When Amplifying the Message of 'Global Innovation Index 2018' IP Watch Sounds Like WIPO and IP Watchdog (Watchtroll)

    In addition to senatorial efforts and misleading debates about patents, we now contend with something called “Global Innovation Index 2018," whose purpose appears to be similar to the debunked Chamber of Commerce's rankings (quantifying everything in terms of patents)



  4. Erosion of Patent Justice in Europe With Kangaroo Courts and Low-Quality European Patents

    The problematic combination of plaintiff-friendly courts (favouring the accuser, just like in Eastern Texas) and low-quality patents that should never have been granted



  5. Mafia Tactics in Team UPC and Battistelli's Circle

    Mafia-like behaviour at the EPO and the team responsible for the Unified Patent Court (UPC); appointments of loyal friends and family members have become common (nepotism and exchange of favours), as have threats made towards critics, authorities, and the press



  6. Australia Says No to Software Patents

    Rokt is now fighting the Australian patent office over its decision to reject software patents; Shelston IP, an Australian patent law firm (originally from Melbourne), already meddles a great deal in such policies/decisions, hoping to overturn them



  7. Links 19/7/2018: Krita 4.1.1, Qt Creator 4.7.0, and Microsoft-Led Lobby Against Android in EU

    Links for the day



  8. IAM is Pushing SEPs/FRAND Agenda for Patent Trolls and Monopolists That Fund IAM

    The front group of patent trolls, IAM, sets up an echo chamber-type event, preceded by all the usual pro-FRAND propaganda



  9. “Trade Secrets” Litigation Rising in the Wake of TC Heartland, Alice, Oil States and Other Patent-Minimising Decisions

    Litigation strategies are evolving in the wake of top-level decisions that rule out software patents, restrict venue shifting, and facilitate invalidation of patents even outside the courtroom



  10. The EPO -- Like the Unified Patent Court (UPC) and Unitary Patent System -- is an Untenable Mess

    The António Campinos-led EPO, nearly three weeks under his leadership, still fails to commit to justice (court rulings not obeyed), undo union-busting efforts and assure independence of judges; this, among other factors, is why the Office/Organisation and the UPC it wants to manage appear more or less doomed



  11. Links 18/7/2018: System76's Manufacturing Facility, Microsoft-Led Lobby for Antitrust Against Android

    Links for the day



  12. What Patent Lawyers Aren't Saying: Most Patent Litigation Has Become Too Risky to be Worth It

    The lawyers' key to the castle is lost or misplaced; they can't quite find/obtain leverage in courts, but they don't want their clients to know that



  13. Software Patents Royalty (Tax) Campaign by IBM, a Serial Patent Bully, and the EPO's Participation in All This

    The agenda of US-based patent maximalists, including patent trolls and notorious bullies from the United States, is still being served by the 'European' Patent Office, which has already outsourced some of its work (e.g. translations, PR, surveillance) to the US



  14. The European Council Needs to Check Battistelli's Back Room Deals/Back Door/Backchannel With Respect to Christian Archambeau

    Worries persist that Archambeau is about to become an unworthy beneficiary (nepotism) after a Battistelli setup that put Campinos in power, supported by the Belgian delegation which is connected to Archambeau, a national/citizen of Belgium



  15. PTAB and § 101 (Section 101) Have Locked the Patent Parasites Out of the Patent System

    Patent Trial and Appeal Board (PTAB) inter partes reviews (IPRs) have contributed a great deal to patent quality and have reduced the number of frivolous patent lawsuits; this means that firms which profit from patent applications and litigation hate it with a passion and still lobby to weaken if not scuttle PTAB



  16. Patents on Computer Software and Plants in the United States Indicative of Systemic Error

    The never-ending expansion of patent scope has meant that patent law firms generally got their way at the patent office; can the courts react fast enough (before confidence in patents and/or public support for patents is altogether shattered)?



  17. Yesterday's Misleading News From Team UPC and Its Aspiring Management of the Unified Patent Court (UPC)

    The Unified Patent Court (UPC) enthusiasts — i.e. those looking to financially gain from it — continue to wrestle with logic, manipulate words and misrepresent the law; yesterday we saw many law firms trying to make it sound as though the UPC is coming to the UK even though this isn’t possible and UPC as a whole is likely already dead



  18. Time for the European Commission to Investigate EPO Corruption Because It May be Partly or Indirectly Connected to EU-IPO, an EU Agency

    The passage of the top role at the EU-IPO from António Campinos to Christian Archambeau would damage confidence in the moral integrity of the European Council; back room deals are alleged to have occurred, implicating corrupt Battistelli



  19. Links 17/7/2018: Catfish 1.4.6 Released, ReactOS 0.4.9, Red Hat's GPL Compliance Group Grows

    Links for the day



  20. Links 16/7/2018: Linux 4.18 RC5, Latte Dock v0.8, Windows Back Doors Resurface

    Links for the day



  21. Alliance for US Startups and Inventors for Jobs (USIJ) Misleads the US Government, Pretending to Speak for Startups While Spreading Lies for the Patent Microcosm

    In the United States, which nowadays strives to raise the patent bar, the House Small Business Committee heard from technology firms but it also heard from some questionable front groups which claim to support "startups" and "jobs" (but in reality support just patents on the face of it)



  22. 'Blockchain', 'Cloud' and Whatever Else Gets Exploited to Work Around 35 U.S.C. § 101 (or the EPC) and Patent Algorithms/Software

    Looking for a quick buck or some low-quality patents (which courts would almost certainly reject), opportunists carry on with their gold rush, aided by buzzwords and hype over pretty meaningless things



  23. PTAB Defended by the EFF, the R Street Institute and CCIA as the Number of Petitions (IPRs) Continues to Grow

    Patent Trial and Appeal Board (PTAB) inter partes reviews (IPRs) come to the rescue when patently-bogus patents are used, covering totally abstract concepts (like software patents do); IPRs continue to increase in number and opponents of PTAB, who conveniently cherry-pick Supreme Court (SCOTUS) decisions, can't quite stop that



  24. IAM/Joff Wild May Have Become a de Facto Media Partner of the Patent Troll iPEL

    Invitation to trolls in China, courtesy of the patent trolls' lobby called "IAM"; this shows no signs of stopping and has become rather blatant



  25. Cautionary Tale: ILO Administrative Tribunal Cases (Appeals) 'Intercepted' Under António Campinos

    The ILO Administrative Tribunal (ILO-AT) is advertised by the EPO's management as access to justice, but it's still being undermined quite severely to the detriment of aggrieved staff



  26. Asking the USPTO to Comply With 35 U.S.C. § 101 is Like Asking Pentagon Officials to Pursue Real, Persistent Peace

    Some profit from selling weapons, whereas others profit from patent grants and litigation; what's really needed right now is patent sanity and adherence to the public interest as well as the law itself, e.g. Supreme Court (SCOTUS) decisions



  27. BT and Sonos Are Still Patent Bullies, Seeing Patents as a Backup Plan

    The companies seeking to complement their business (or make up for their demise) using patents are still suing rivals while calling that litigation "research and development" (the same old euphemism)



  28. Jim Skippen, a Longtime Patent Troll, Admits That the Trolling Sector is Collapsing

    Canada's biggest patent troll (WiLAN) bar BlackBerry doesn't seem to be doing too well as its CEO leaves the domain altogether



  29. From East Asia to the Eastern District of Texas: XYZ Printing, Maxell, and X2Y Attenuators

    The patent aggression, which relies on improper litigation venues, harms innocent parties a great deal; only their lawyers benefit from all this mess



  30. Links 14/7/2018: Mesa 18.1.4, Elisa 0.2.1, More on Python's Guido van Rossum

    Links for the day


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts