EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

12.22.13

More Details Revealed About How the NSA Infiltrates Windows and Other Proprietary Software, Governments Should Now Ban Microsoft

Posted in Europe, Microsoft, Security, Windows at 2:46 pm by Dr. Roy Schestowitz

RSA Conference

Summary: RSA is the latest (known) entity to have received bribes from the NSA in exchange for back doors; Germany may move towards banning software from companies that share data with the NSA

A COUPLE of nights ago Reuters published an explosive report about RSA, basically showing that Windows does not have back doors, it is a back door and so is a lot of the software that’s proprietary. Free/libre software does not suffer from the trap [1]. This is a serious wakeup call to any government that still relies on proprietary software and US companies that collect data.

Munich moved to GNU/Linux owing to political determination to do so [2], but what about other cities? Their politicians are in serious trouble and a constant threat of espionage.

“This is a serious wakeup call to any government that still relies on proprietary software and US companies that collect data.”As the Reuters report revealed [3] (and there was a lot of journalism linking to it [4,5]), “RSA Weakened Encryption For $10M From NSA,” to quote Slashdot, which consequently also published the item “Microsoft Security Essentials Misses 39% of Malware” (especially NSA malware that enables system compromise). Remember that Windows XP will soon receive no patches, so not just the NSA will get easy access through back doors. IDG’s advice on this matter is misguided as it basically offers continued use of Windows XP rather than runaway to a secure platform like GNU/Linux. As the author put it, “Microsoft’s support for Windows XP ends in less than four months, and the company has warned users repeatedly that it’s time to move on. But a lot of them are sticking with the aged OS. And for Microsoft, that’s a problem.”

Security is not really a problem here because there was never really any security to begin with. As we showed in our articles about the NSA, Windows is just a Trojan horse. It is obviously not secure and the only variable is, how many people can seize control of it?

The latest news makes almost all proprietary software suspect, even fake ‘open source’ like TrueCrypt (it is proprietary). As one tweet put it, “Check all on this list who use Dual_EC_DRBG as possible recipients of NSA bribes [...] Note Blackberry, Cisco, Juniper [...] Blast from the past: Call tracking Dual_EC_DRBG “Bribe Finder”: Any use by default post 2007 required either an implicit or explicit bribe.”

This is another good reason to avoid all proprietary software, including widely-used GNU/Linux programs like Skype. One tweet said that “Dual EC_DRBG was suspiciously absent from Wednesday’s report by President Obama’s NSA advisory panel.”

Going back to Microsoft’s flawed detection of malware, MinceR wrote that “their alleged “anti-malware” efforts started with stopping detecting claria as malware just as they were about to buy it, so i don’t know why anyone trusts them with such … [it] manages to out-sleaze even the other “antivirus” companies.”

” With Microsoft, NSA gets video/audio surveillance, not just through Skype but also through people’s webcams on computers that have Windows installed (and are idle).”Sosumi said that “they don’t detect NSA backdoors as malware, so why trust them?”

Nobody can trust Microsoft. The above report says that “latest tests from Dennis Publishing’s security labs saw Microsoft Security Essentials fail to detect 39% of the real-world malware thrown at it.”

It’s not just a case of access to one’s files by the way. See the new post titled “Windows users: Your webcam lights aren’t safe from the FBI either” (we wrote about CIPAV almost 5 years ago).

“In recent news,” says the post, “it was revealed the FBI has a “virus” that will record a suspect through the webcam secretly, without turning on the LED light. Some researchers showed this working on an older Macbook. In this post, we do it on Windows.”

“The more you know about how the NSA gets along with RSA & Microsoft,” writes one Twitter user, “the more perspective you have on their handling of Lavabit.” With Microsoft, NSA gets video/audio surveillance, not just through Skype but also through people’s webcams on computers that have Windows installed (and are idle). This is a good enough reason to immediately abandon Microsoft and some politicians in Germany already think about moving in this direction. See [6,7] below for details of the latest news and pay attention to the explosive new article “Snowden ally Appelbaum claims his Berlin apartment was invaded” [8]; clearly it’s not about terrorism but about cracking down on activists [9].

Following the revelations above there is some new effort [10] — including from GNU/Linux developers [11] — to sack with prejudice potential NSA moles.

Related/contextual items from the news:

  1. Worried OpenSSL uses NSA-tainted crypto? This BUG has got your back

    As fears grow that US and UK spies have deliberately hamstrung key components in today’s encryption systems, users of OpenSSL can certainly relax about one thing.

    It has been revealed that the cryptography toolkit – used by reams of software from web browsers for HTTPS to SSH for secure terminals – is not using the discredited random number generator Dual EC DRBG.

    And that’s due to a bug that’s now firmly a WONTFIX.

    A coding flaw uncovered in the library prevents “all use” of the dual elliptic curve (Dual EC) deterministic random bit generator (DRBG) algorithm, a cryptographically weak algorithm championed by none other than the NSA.

    No other DRBGs used by OpenSSL are affected, we’re told.

  2. Moving a city to Linux needs political backing, says Munich project leader

    This year saw the completion of the city of Munich’s switch to Linux, a move that began about ten years ago. “One of the biggest lessons learned was that you can’t do such a project without continued political backing,” said Peter Hofmann, the leader of the LiMux project, summing up the experience.

    The Munich city authority migrated around 14,800 of the 15,000 or so PCs on its network to LiMux, its own Linux distribution based on Ubuntu, exceeding its initial goal of migrating 12,000 desktops.

  3. Exclusive: Secret contract tied NSA and security industry pioneer

    As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $10 million contract with RSA, one of the most influential firms in the computer security industry, Reuters has learned.

  4. NSA Gave RSA $10 Million To Promote Crypto It Had Purposely Weakened

    Earlier this year, the Snowden leaks revealed how the NSA was effectively infiltrating crypto standards efforts to take control of them and make sure that backdoors or other weaknesses were installed. Many in the crypto community reacted angrily to this, and began to rethink how they interact with the feds. However, Reuters has just dropped a bombshell into all of this, as it has revealed that not only did the NSA purposefully weaken crypto, it then paid famed crypto provider RSA $10 million to push the weakened crypto, making it a de facto standard.

  5. How much did NSA pay to put a backdoor in RSA crypto? Try $10m – report

    Latest Snowden claims: Flawed encryption tech switched on by default in exchange for cash

  6. Germany should ban U.S. contracting companies passing data to NSA – report

    U.S. contracting companies such as Cisco, which manages much of the German armed forces’ data, should be contractually barred from passing sensitive information to the U.S. security services, a spokesman for Chancellor Angela Merkel’s conservatives was quoted saying.

  7. German government buildings and charities were targets of GCHQ and NSA, says Edward Snowden

    Humanitarian organisations and German government buildings are among the targets of UK and US surveillance agencies, documents leaked by Edward Snowden are said to show.

    The latest disclosures from the Snowden archive also highlight the key role in national security played by the small Cornish holiday resort town of Bude.

    A government listening facility on the Cornish coast had a unit that was used to analyse samples of electronic date to assess whether surveillance targets were worth the effort of listening in on their communications more frequently.

    A significant amount of the Bude listening post’s funding comes from the National Security Agency (NSA), the US surveillance body, because of shared operational projects.

  8. Snowden ally Appelbaum claims his Berlin apartment was invaded

    Jacob Appelbaum, a US Internet activist and one of the people with access to Edward Snowden’s documents, has told a Berlin paper that his apartment was broken into, saying he suspected US involvement.

  9. The Real Purpose of Oakland’s Surveillance Center

    City leaders have argued that Oakland needs a massive surveillance system to combat violent crime, but internal documents reveal that city staffers are also focused on tracking political protesters.

  10. Critics: NSA agent co-chairing key crypto standards body should be removed (updated)

    Security experts are calling for the removal of a National Security Agency employee who co-chairs an influential cryptography panel, which advises a host of groups that forge widely used standards for the Internet Engineering Task Force (IETF).

    Kevin Igoe, who in a 2011 e-mail announcing his appointment was listed as a senior cryptographer with the NSA’s Commercial Solutions Center, is one of two co-chairs of the IETF’s Crypto Forum Research Group (CFRG). The CFRG provides cryptographic guidance to IETF working groups that develop standards for a variety of crucial technologies that run and help secure the Internet. The transport layer security (TLS) protocol that underpins Web encryption and standards for secure shell connections used to securely access servers are two examples. Igoe has been CFRG co-chair for about two years, along with David A. McGrew of Cisco Systems.

  11. Kevin M. Igoe should step down from CFRG Co-chair

    I’ve said recently that pervasive surveillance is wrong. I don’t think anyone from the NSA should have a leadership position in the development or deployment of Internet communications, because their interests are at odds with the interest of the rest of the Internet. But someone at the NSA is in exactly such a position. They ought to step down.

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. Catarina Holtz From the EPO Boards of Appeal Explains Bad Behaviour of the Management With Regards to EPC 2000

    The violations of rules set forth by the European Patent Convention (EPC) are being discussed by an EPO veteran (now retired)



  2. The EPO's Paid Propaganda Campaign in the Media

    EPO buys (using public money) coverage that is favourable to its rogue management's agenda, demonstrating utter disregard for scientific processes



  3. Links 31/1/2015: Open Lunchbox, Librem 15 at Around $400,000

    Links for the day



  4. Links 30/1/2015: CERN Adopts 64-bit GNU/Linux, Inkscape 0.91 Released

    Links for the day



  5. Apple- and Microsoft-Friendly Media Continues Attacking Android/Linux

    Some of the latest examples where corporate media (funded and run by large corporation) distorts facts, selectively covers facts, and generally serves to protect the Apple-Microsoft duopolist world view



  6. Qualys Admits That Its Scare Campaign (So-called 'GHOST') Somewhat Baseless

    Even the company that bombarded the media with its "GHOST" nonsense admits that this bug, which was fixed two years ago, does not pose much of a threat



  7. European Unitary Patent and Court System in Trouble

    New resistance to the Unitary Patent amid allegations of misconduct in the European patent authorities



  8. Text of Ruling/Decision Against Željko Topić (Regarding Audi as a Bribe)

    The legal loss of Željko Topić laid bear for the public to see even outside Croatia



  9. Media Coverage of Demonstration Against Jesper Kongstad of the Administrative Council (EPO)

    Last week's EPO demonstration has been covered by Danish media, raising awareness of the "banana republic" state of the EPO



  10. Links 29/1/2015: Android Shipments in 2014 Exceed 1,000,000,000, LibreOffice 4.4 is Out

    Links for the day



  11. Corporate Media, Led Astray by Patent Lawyers, Continues to Distort the Reality of Software Patents Post-Alice

    The press of the rich and the powerful continues its attempt to preserve software patents, despite the US Supreme Court's decision to abolish a lot of them on the basis of abstraction



  12. An Estimated 1,000 EPO Employees-Strong Legion Engulfs Danish Consulate to Protest Jesper Kongstad's (of Administrative Council) Protection of Benoît Battistelli

    A large protest waged by staff of the EPO targets one of the key facilitators of Battistelli's terrifying tyranny



  13. Links 28/1/2015: Ubuntu Touch Windowed Mode, NVIDIA Linux Legacy Drivers Updated

    Links for the day



  14. Breaking: EPO Vice-President Željko Topić Loses Defamation Case in Croatia

    The EPO's notorious Vice-President, whose appointment at the EPO is still raising some alarming questions, has just lost his case in Croatia (one of many cases), motivating us to accelerate coverage about the persona known as Željko Topić



  15. Qualys Starts Self-Promotional FUD Campaign, Naming a Bug That Was Already Fixed 2 Years Ago and Distros Have Covered With Patches

    Responding to the media blitz which paints GNU/Linux as insecure despite the fact that bugs were evidently found and fixed



  16. The Openwashing of Microsoft is Now Threatening to Eliminate the Identity of Free Software

    More openwashing of Microsoft, including in the corporate media, shows just to what great an extent and how quickly the old "Microsoft Open Source" Big Lie grows feet



  17. Links 27/1/2015: Plasma 5.2, Dell Precision With GNU/Linux

    Links for the day



  18. Microsoft's Media Attack on Free Software and GNU/Linux

    Brainwash war is still being waged by Microsoft and its friends to convince people that Windows is universally dominant and that Microsoft is now part of the Free software world



  19. Microsoft Accounting Practices After Fire Again, After Previous Abuses and Book-Cooking

    After the infamous IRS brawl comes another confrontation between Microsoft and the SEC, which is unhappy with Microsoft for seemingly cooking the books again



  20. Links 26/1/2015: Debian 8.0 “Jessie” RC1, Linux Kernel 3.19 RC6

    Links for the day



  21. Links 25/1/2015: Android Wear 5.0, Tizen in Bangladesh

    Links for the day



  22. IRC Proceedings: January 11th, 2015 – January 24th, 2015

    Many IRC logs



  23. Links 24/1/2015: Zenwalk Linux Reviewed, Netrunner 14.1 Released

    Links for the day



  24. The Latest 'Microsoft is Open Source' Propaganda a Parade of Lies

    Microsoft myth makers continue their assault on what is objectively true and try to tell the public that Microsoft is a friend of "Open Source"



  25. Apple -- Like Microsoft -- Not Interested in the Security of Its Operating Systems

    Apple neglected to patch known security flaws in Mac OS X for no less than three months and only did something about that vector of intrusion when the public found out about it



  26. As Battistelli Breaks the Rules and Topić Silences Staff, New European Parliament Petition for Tackling the EPO's Abuses is Needed

    The neglected (by EPO) Article 4a of the European Patent Convention (EPC) and the European Parliament petition/complaint against the EPO's crooked management



  27. Links 23/1/2015: Red Hat on IBM Power, Meizu Leaks With Ubuntu

    Links for the day



  28. Links 23/1/2015: Plasma 5.2, Manjaro 0.9-pre1

    Links for the day



  29. Microsoft is Dying Due to Free Software, Tries to Infect GNU/Linux With .NET and to Infect Moodle in Schools With Microsoft Office and OOXML Lock-in

    'Free' drugs (a proprietary software analogy) the new strategy of Microsoft in its latest battle against Free software, especially in schools where choice is a rarity (if not an impossibility), with the premeditated intention of forming dependency/addiction among young people



  30. Microsoft Symptoms of a Dying Company: More Boosters Depart, Back Doors Revealed, Microsoft's Outlook Cracked

    Bad news for Microsoft shortly before the marketing extravaganza served to cover much of it up


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts