EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

12.22.13

More Details Revealed About How the NSA Infiltrates Windows and Other Proprietary Software, Governments Should Now Ban Microsoft

Posted in Europe, Microsoft, Security, Windows at 2:46 pm by Dr. Roy Schestowitz

RSA Conference

Summary: RSA is the latest (known) entity to have received bribes from the NSA in exchange for back doors; Germany may move towards banning software from companies that share data with the NSA

A COUPLE of nights ago Reuters published an explosive report about RSA, basically showing that Windows does not have back doors, it is a back door and so is a lot of the software that’s proprietary. Free/libre software does not suffer from the trap [1]. This is a serious wakeup call to any government that still relies on proprietary software and US companies that collect data.

Munich moved to GNU/Linux owing to political determination to do so [2], but what about other cities? Their politicians are in serious trouble and a constant threat of espionage.

“This is a serious wakeup call to any government that still relies on proprietary software and US companies that collect data.”As the Reuters report revealed [3] (and there was a lot of journalism linking to it [4,5]), “RSA Weakened Encryption For $10M From NSA,” to quote Slashdot, which consequently also published the item “Microsoft Security Essentials Misses 39% of Malware” (especially NSA malware that enables system compromise). Remember that Windows XP will soon receive no patches, so not just the NSA will get easy access through back doors. IDG’s advice on this matter is misguided as it basically offers continued use of Windows XP rather than runaway to a secure platform like GNU/Linux. As the author put it, “Microsoft’s support for Windows XP ends in less than four months, and the company has warned users repeatedly that it’s time to move on. But a lot of them are sticking with the aged OS. And for Microsoft, that’s a problem.”

Security is not really a problem here because there was never really any security to begin with. As we showed in our articles about the NSA, Windows is just a Trojan horse. It is obviously not secure and the only variable is, how many people can seize control of it?

The latest news makes almost all proprietary software suspect, even fake ‘open source’ like TrueCrypt (it is proprietary). As one tweet put it, “Check all on this list who use Dual_EC_DRBG as possible recipients of NSA bribes [...] Note Blackberry, Cisco, Juniper [...] Blast from the past: Call tracking Dual_EC_DRBG “Bribe Finder”: Any use by default post 2007 required either an implicit or explicit bribe.”

This is another good reason to avoid all proprietary software, including widely-used GNU/Linux programs like Skype. One tweet said that “Dual EC_DRBG was suspiciously absent from Wednesday’s report by President Obama’s NSA advisory panel.”

Going back to Microsoft’s flawed detection of malware, MinceR wrote that “their alleged “anti-malware” efforts started with stopping detecting claria as malware just as they were about to buy it, so i don’t know why anyone trusts them with such … [it] manages to out-sleaze even the other “antivirus” companies.”

” With Microsoft, NSA gets video/audio surveillance, not just through Skype but also through people’s webcams on computers that have Windows installed (and are idle).”Sosumi said that “they don’t detect NSA backdoors as malware, so why trust them?”

Nobody can trust Microsoft. The above report says that “latest tests from Dennis Publishing’s security labs saw Microsoft Security Essentials fail to detect 39% of the real-world malware thrown at it.”

It’s not just a case of access to one’s files by the way. See the new post titled “Windows users: Your webcam lights aren’t safe from the FBI either” (we wrote about CIPAV almost 5 years ago).

“In recent news,” says the post, “it was revealed the FBI has a “virus” that will record a suspect through the webcam secretly, without turning on the LED light. Some researchers showed this working on an older Macbook. In this post, we do it on Windows.”

“The more you know about how the NSA gets along with RSA & Microsoft,” writes one Twitter user, “the more perspective you have on their handling of Lavabit.” With Microsoft, NSA gets video/audio surveillance, not just through Skype but also through people’s webcams on computers that have Windows installed (and are idle). This is a good enough reason to immediately abandon Microsoft and some politicians in Germany already think about moving in this direction. See [6,7] below for details of the latest news and pay attention to the explosive new article “Snowden ally Appelbaum claims his Berlin apartment was invaded” [8]; clearly it’s not about terrorism but about cracking down on activists [9].

Following the revelations above there is some new effort [10] — including from GNU/Linux developers [11] — to sack with prejudice potential NSA moles.

Related/contextual items from the news:

  1. Worried OpenSSL uses NSA-tainted crypto? This BUG has got your back

    As fears grow that US and UK spies have deliberately hamstrung key components in today’s encryption systems, users of OpenSSL can certainly relax about one thing.

    It has been revealed that the cryptography toolkit – used by reams of software from web browsers for HTTPS to SSH for secure terminals – is not using the discredited random number generator Dual EC DRBG.

    And that’s due to a bug that’s now firmly a WONTFIX.

    A coding flaw uncovered in the library prevents “all use” of the dual elliptic curve (Dual EC) deterministic random bit generator (DRBG) algorithm, a cryptographically weak algorithm championed by none other than the NSA.

    No other DRBGs used by OpenSSL are affected, we’re told.

  2. Moving a city to Linux needs political backing, says Munich project leader

    This year saw the completion of the city of Munich’s switch to Linux, a move that began about ten years ago. “One of the biggest lessons learned was that you can’t do such a project without continued political backing,” said Peter Hofmann, the leader of the LiMux project, summing up the experience.

    The Munich city authority migrated around 14,800 of the 15,000 or so PCs on its network to LiMux, its own Linux distribution based on Ubuntu, exceeding its initial goal of migrating 12,000 desktops.

  3. Exclusive: Secret contract tied NSA and security industry pioneer

    As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $10 million contract with RSA, one of the most influential firms in the computer security industry, Reuters has learned.

  4. NSA Gave RSA $10 Million To Promote Crypto It Had Purposely Weakened

    Earlier this year, the Snowden leaks revealed how the NSA was effectively infiltrating crypto standards efforts to take control of them and make sure that backdoors or other weaknesses were installed. Many in the crypto community reacted angrily to this, and began to rethink how they interact with the feds. However, Reuters has just dropped a bombshell into all of this, as it has revealed that not only did the NSA purposefully weaken crypto, it then paid famed crypto provider RSA $10 million to push the weakened crypto, making it a de facto standard.

  5. How much did NSA pay to put a backdoor in RSA crypto? Try $10m – report

    Latest Snowden claims: Flawed encryption tech switched on by default in exchange for cash

  6. Germany should ban U.S. contracting companies passing data to NSA – report

    U.S. contracting companies such as Cisco, which manages much of the German armed forces’ data, should be contractually barred from passing sensitive information to the U.S. security services, a spokesman for Chancellor Angela Merkel’s conservatives was quoted saying.

  7. German government buildings and charities were targets of GCHQ and NSA, says Edward Snowden

    Humanitarian organisations and German government buildings are among the targets of UK and US surveillance agencies, documents leaked by Edward Snowden are said to show.

    The latest disclosures from the Snowden archive also highlight the key role in national security played by the small Cornish holiday resort town of Bude.

    A government listening facility on the Cornish coast had a unit that was used to analyse samples of electronic date to assess whether surveillance targets were worth the effort of listening in on their communications more frequently.

    A significant amount of the Bude listening post’s funding comes from the National Security Agency (NSA), the US surveillance body, because of shared operational projects.

  8. Snowden ally Appelbaum claims his Berlin apartment was invaded

    Jacob Appelbaum, a US Internet activist and one of the people with access to Edward Snowden’s documents, has told a Berlin paper that his apartment was broken into, saying he suspected US involvement.

  9. The Real Purpose of Oakland’s Surveillance Center

    City leaders have argued that Oakland needs a massive surveillance system to combat violent crime, but internal documents reveal that city staffers are also focused on tracking political protesters.

  10. Critics: NSA agent co-chairing key crypto standards body should be removed (updated)

    Security experts are calling for the removal of a National Security Agency employee who co-chairs an influential cryptography panel, which advises a host of groups that forge widely used standards for the Internet Engineering Task Force (IETF).

    Kevin Igoe, who in a 2011 e-mail announcing his appointment was listed as a senior cryptographer with the NSA’s Commercial Solutions Center, is one of two co-chairs of the IETF’s Crypto Forum Research Group (CFRG). The CFRG provides cryptographic guidance to IETF working groups that develop standards for a variety of crucial technologies that run and help secure the Internet. The transport layer security (TLS) protocol that underpins Web encryption and standards for secure shell connections used to securely access servers are two examples. Igoe has been CFRG co-chair for about two years, along with David A. McGrew of Cisco Systems.

  11. Kevin M. Igoe should step down from CFRG Co-chair

    I’ve said recently that pervasive surveillance is wrong. I don’t think anyone from the NSA should have a leadership position in the development or deployment of Internet communications, because their interests are at odds with the interest of the rest of the Internet. But someone at the NSA is in exactly such a position. They ought to step down.

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. Speculations That Microsoft is About to Buy Cyanogen (or at Least Officially Partner) to Attack Google's Android/Linux, Replacing Everything With Microsoft

    Articles in the corporate media and some analysis from smaller media sites serve to highlight the role which Microsoft plays in Cyanogen



  2. Links 28/3/2015: FoundationDB FOSS Shut Down by Apple, European Commission Support for Free Software

    Links for the day



  3. Microsoft Keeps Pretending to be 'Open Source', Despite Relentless Assaults on Open Source

    Microsoft's charm offensives against Free/libre software are proving to be rather effective, despite them involving a gross distortion of facts and exploitation of corruptible elements in the corporate media



  4. Željko Topić and Ivan Šimonović, Two Residues of Ivo Sanader's Corrupt Regime, Seen as Indirectly Connected

    Further exploration of the remnants of Sanader's highly notorious record and those whom he had brought to power before he landed in jail



  5. Links 27/3/2015: Ubuntu 15.04 Second Beta, Dart 1.9

    Links for the day



  6. The EPO's Dutch Scandal Leaves Battistelli and His Cronies on the Run

    EPO management is making concessions and issues statements which admit defeat, allowing the staff union to continue its activities



  7. Microsoft Won't Let People Wipe (Off) Windows But Happily Wipes Android, Wipes Android Apps Through Cyanogen and Blackmailed 'Partners'

    Microsoft's obscene double-standards leave Android and Linux between a rock and a hard place



  8. Links 26/3/2015: GNOME 3.16 Officially Released

    Links for the day



  9. Links 25/3/2015: India Moving to Free Software

    Links for the day



  10. Another Reason to Boycott UEFI: Back Doors or Crackers

    UEFI makes computers more prone to infections, according to some security experts



  11. The EPO's Administrative Council is Under Increased Pressure to Rein in and to Finally Stop Benoît Battistelli

    The EPO's Administrative Council (AC) is about to have a meeting, so the Member States' delegations are urged to call for action



  12. IRC Proceedings: February 22nd - March 21st, 2015

    Many IRC logs



  13. The Latest Microsoft Attacks on GNU/Linux and Free/Libre Software

    Microsoft is still hiding behind the façade of 'love' whilst actively attacking GNU/Linux and Free software from many directions



  14. Attempts to Disrupt Android by Pushing Microsoft Software Into It (Using Patent Blackmail and Cyanogen)

    Microsoft's Android coup d'état is succeeding owing to public apathy and poor comprehension of what Microsoft really is up to, partly due to media misdirection



  15. Links 24/3/2015: WebKitGTK+ 2.8.0, Black Lab Linux 6.5

    Links for the day



  16. Concerns Over Željko Topić's Alleged Powerful Links in Croatian Diplomacy

    Rikard Frgačić explains the powerful connections acquired though Ivan Šimonović, who is himself connected to EPO Vice-President Željko Topić



  17. Benoît Battistelli's EPO Comes Under Fire From Prominent Figures Who Are Key EPO Stakeholders, Expect Battistelli to Resign 'in the Longer Term'

    The ‘reign of terror’ which is primarily attributed to Battistelli and his cronies may be about to end; the Luxembourg parliament approves the Unified Patent Court



  18. Benoît Battistelli's EPO is Under Attack From French Politicians Yet Again

    More EPO interventions -- this time from France -- target Benoît Battistelli over his abuses and take it up to Eurocrats for political actions



  19. Bribes and Extortion Help Turn Android (Linux-powered) Into 'Microsoft Android'

    A strategy involving harassment and bribes drives large Android players into Microsoft's arms (PRISM and lock-in), much to Google's (and users') detriment and beyond regulators' range of visibility



  20. Microsoft-connected Black Duck Software Created by Microsoft Marketing Man as an Anti-GPL Operation, Admits the Management

    Black Duck "was founded [on] the idea ... to keep GPL-licensed code out of corporate codebases entirely," according to a new report



  21. Links 23/3/2015: Linux 4.0 RC5, Kubuntu Celebrates Ten Years

    Links for the day



  22. Microsoft Admits Lying (or Deceiving) About the Cost of Vista 10

    After much hype in the press about Windows being 'free' it turns out that Microsoft just lied yet again, leaving that lingering perception that Windows is as inexpensive as GNU/Linux



  23. Politics of Blackmail at the EPO

    Comments serve to highlight the role of bribes (or contrariwise blackmail), as allegedly exercised by the current management of the European Patent Office



  24. Benoît Battistelli's EPO Comes Under Attack From the British

    A British MEP criticises Battistelli and the management of the European Patent Office (EPO) while Baroness Lucy Neville-Rolfe, UK Minister for Intellectual Property, gets closer to Battistelli in a tactless effort to improve relations



  25. The Royal Norwegian Department of Labour on the Right of European Patent Office (EPO) Workers to Strike

    The role of bureaucrats from Norway in defending (or not) the rights of EPO workers -- rights that the EPO's management is actively trying to deny and punish for



  26. Michael Silver Back to Acting as Gartner's Microsoft Agent, Promoting Vista 10 Based on False Promises

    Vista 10 in the headlines as its marketing propaganda zones in on false perceptions around cost, aided in part by longtime foes of GNU/Linux such as Gartner, especially its Microsoft-embedded elements (Michael Silver and co-workers)



  27. Despite Media Propaganda About Security, Microsoft Windows Remains the Least Secure Operating System, by Design

    Amid highly misleading security-centric reports that rely on Microsoft's bogus number of vulnerabilities (Microsoft already admitted hiding many of them) Techrights presents recent news about Windows 'security'



  28. Canonical Goes to Bed With Company That Sues Linux Using Software Patents and Copyrights (Through SCO)

    Despite Microsoft's continued assault on GNU/Linux, Canonical is foolish enough to give Microsoft control over many Ubuntu instances



  29. Links 22/3/2015: GNOME 3.16 Shaping Up, LibrePlanet 2015

    Links for the day



  30. Microsoft Hates Linux - Part VI - Propaganda Wars Against Free Software Facilitated While Media Control is Secured and Abused

    How Microsoft systematically lies to the public, including decision-makers and officials who can be tricked into choosing proprietary software, thinking it is in fact "open"


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts