EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

12.22.13

More Details Revealed About How the NSA Infiltrates Windows and Other Proprietary Software, Governments Should Now Ban Microsoft

Posted in Europe, Microsoft, Security, Windows at 2:46 pm by Dr. Roy Schestowitz

RSA Conference

Summary: RSA is the latest (known) entity to have received bribes from the NSA in exchange for back doors; Germany may move towards banning software from companies that share data with the NSA

A COUPLE of nights ago Reuters published an explosive report about RSA, basically showing that Windows does not have back doors, it is a back door and so is a lot of the software that’s proprietary. Free/libre software does not suffer from the trap [1]. This is a serious wakeup call to any government that still relies on proprietary software and US companies that collect data.

Munich moved to GNU/Linux owing to political determination to do so [2], but what about other cities? Their politicians are in serious trouble and a constant threat of espionage.

“This is a serious wakeup call to any government that still relies on proprietary software and US companies that collect data.”As the Reuters report revealed [3] (and there was a lot of journalism linking to it [4,5]), “RSA Weakened Encryption For $10M From NSA,” to quote Slashdot, which consequently also published the item “Microsoft Security Essentials Misses 39% of Malware” (especially NSA malware that enables system compromise). Remember that Windows XP will soon receive no patches, so not just the NSA will get easy access through back doors. IDG’s advice on this matter is misguided as it basically offers continued use of Windows XP rather than runaway to a secure platform like GNU/Linux. As the author put it, “Microsoft’s support for Windows XP ends in less than four months, and the company has warned users repeatedly that it’s time to move on. But a lot of them are sticking with the aged OS. And for Microsoft, that’s a problem.”

Security is not really a problem here because there was never really any security to begin with. As we showed in our articles about the NSA, Windows is just a Trojan horse. It is obviously not secure and the only variable is, how many people can seize control of it?

The latest news makes almost all proprietary software suspect, even fake ‘open source’ like TrueCrypt (it is proprietary). As one tweet put it, “Check all on this list who use Dual_EC_DRBG as possible recipients of NSA bribes [...] Note Blackberry, Cisco, Juniper [...] Blast from the past: Call tracking Dual_EC_DRBG “Bribe Finder”: Any use by default post 2007 required either an implicit or explicit bribe.”

This is another good reason to avoid all proprietary software, including widely-used GNU/Linux programs like Skype. One tweet said that “Dual EC_DRBG was suspiciously absent from Wednesday’s report by President Obama’s NSA advisory panel.”

Going back to Microsoft’s flawed detection of malware, MinceR wrote that “their alleged “anti-malware” efforts started with stopping detecting claria as malware just as they were about to buy it, so i don’t know why anyone trusts them with such … [it] manages to out-sleaze even the other “antivirus” companies.”

” With Microsoft, NSA gets video/audio surveillance, not just through Skype but also through people’s webcams on computers that have Windows installed (and are idle).”Sosumi said that “they don’t detect NSA backdoors as malware, so why trust them?”

Nobody can trust Microsoft. The above report says that “latest tests from Dennis Publishing’s security labs saw Microsoft Security Essentials fail to detect 39% of the real-world malware thrown at it.”

It’s not just a case of access to one’s files by the way. See the new post titled “Windows users: Your webcam lights aren’t safe from the FBI either” (we wrote about CIPAV almost 5 years ago).

“In recent news,” says the post, “it was revealed the FBI has a “virus” that will record a suspect through the webcam secretly, without turning on the LED light. Some researchers showed this working on an older Macbook. In this post, we do it on Windows.”

“The more you know about how the NSA gets along with RSA & Microsoft,” writes one Twitter user, “the more perspective you have on their handling of Lavabit.” With Microsoft, NSA gets video/audio surveillance, not just through Skype but also through people’s webcams on computers that have Windows installed (and are idle). This is a good enough reason to immediately abandon Microsoft and some politicians in Germany already think about moving in this direction. See [6,7] below for details of the latest news and pay attention to the explosive new article “Snowden ally Appelbaum claims his Berlin apartment was invaded” [8]; clearly it’s not about terrorism but about cracking down on activists [9].

Following the revelations above there is some new effort [10] — including from GNU/Linux developers [11] — to sack with prejudice potential NSA moles.

Related/contextual items from the news:

  1. Worried OpenSSL uses NSA-tainted crypto? This BUG has got your back

    As fears grow that US and UK spies have deliberately hamstrung key components in today’s encryption systems, users of OpenSSL can certainly relax about one thing.

    It has been revealed that the cryptography toolkit – used by reams of software from web browsers for HTTPS to SSH for secure terminals – is not using the discredited random number generator Dual EC DRBG.

    And that’s due to a bug that’s now firmly a WONTFIX.

    A coding flaw uncovered in the library prevents “all use” of the dual elliptic curve (Dual EC) deterministic random bit generator (DRBG) algorithm, a cryptographically weak algorithm championed by none other than the NSA.

    No other DRBGs used by OpenSSL are affected, we’re told.

  2. Moving a city to Linux needs political backing, says Munich project leader

    This year saw the completion of the city of Munich’s switch to Linux, a move that began about ten years ago. “One of the biggest lessons learned was that you can’t do such a project without continued political backing,” said Peter Hofmann, the leader of the LiMux project, summing up the experience.

    The Munich city authority migrated around 14,800 of the 15,000 or so PCs on its network to LiMux, its own Linux distribution based on Ubuntu, exceeding its initial goal of migrating 12,000 desktops.

  3. Exclusive: Secret contract tied NSA and security industry pioneer

    As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $10 million contract with RSA, one of the most influential firms in the computer security industry, Reuters has learned.

  4. NSA Gave RSA $10 Million To Promote Crypto It Had Purposely Weakened

    Earlier this year, the Snowden leaks revealed how the NSA was effectively infiltrating crypto standards efforts to take control of them and make sure that backdoors or other weaknesses were installed. Many in the crypto community reacted angrily to this, and began to rethink how they interact with the feds. However, Reuters has just dropped a bombshell into all of this, as it has revealed that not only did the NSA purposefully weaken crypto, it then paid famed crypto provider RSA $10 million to push the weakened crypto, making it a de facto standard.

  5. How much did NSA pay to put a backdoor in RSA crypto? Try $10m – report

    Latest Snowden claims: Flawed encryption tech switched on by default in exchange for cash

  6. Germany should ban U.S. contracting companies passing data to NSA – report

    U.S. contracting companies such as Cisco, which manages much of the German armed forces’ data, should be contractually barred from passing sensitive information to the U.S. security services, a spokesman for Chancellor Angela Merkel’s conservatives was quoted saying.

  7. German government buildings and charities were targets of GCHQ and NSA, says Edward Snowden

    Humanitarian organisations and German government buildings are among the targets of UK and US surveillance agencies, documents leaked by Edward Snowden are said to show.

    The latest disclosures from the Snowden archive also highlight the key role in national security played by the small Cornish holiday resort town of Bude.

    A government listening facility on the Cornish coast had a unit that was used to analyse samples of electronic date to assess whether surveillance targets were worth the effort of listening in on their communications more frequently.

    A significant amount of the Bude listening post’s funding comes from the National Security Agency (NSA), the US surveillance body, because of shared operational projects.

  8. Snowden ally Appelbaum claims his Berlin apartment was invaded

    Jacob Appelbaum, a US Internet activist and one of the people with access to Edward Snowden’s documents, has told a Berlin paper that his apartment was broken into, saying he suspected US involvement.

  9. The Real Purpose of Oakland’s Surveillance Center

    City leaders have argued that Oakland needs a massive surveillance system to combat violent crime, but internal documents reveal that city staffers are also focused on tracking political protesters.

  10. Critics: NSA agent co-chairing key crypto standards body should be removed (updated)

    Security experts are calling for the removal of a National Security Agency employee who co-chairs an influential cryptography panel, which advises a host of groups that forge widely used standards for the Internet Engineering Task Force (IETF).

    Kevin Igoe, who in a 2011 e-mail announcing his appointment was listed as a senior cryptographer with the NSA’s Commercial Solutions Center, is one of two co-chairs of the IETF’s Crypto Forum Research Group (CFRG). The CFRG provides cryptographic guidance to IETF working groups that develop standards for a variety of crucial technologies that run and help secure the Internet. The transport layer security (TLS) protocol that underpins Web encryption and standards for secure shell connections used to securely access servers are two examples. Igoe has been CFRG co-chair for about two years, along with David A. McGrew of Cisco Systems.

  11. Kevin M. Igoe should step down from CFRG Co-chair

    I’ve said recently that pervasive surveillance is wrong. I don’t think anyone from the NSA should have a leadership position in the development or deployment of Internet communications, because their interests are at odds with the interest of the rest of the Internet. But someone at the NSA is in exactly such a position. They ought to step down.

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. Interesting Supreme Court Cases About Patents in the United States

    A quick review of some of the latest developments regarding SCOTUS (the US Supreme Court) as far as patents go



  2. Governments in Europe Still Active Against EPO Management

    There is still political work being done -- albeit rather discreetly -- against Battistelli and his goons at the European Patent Office's top-level management



  3. The European Spam Office (EPO)

    EPO budget at 'work', days after doing copy-paste jobs and also working overtime in the weekend for an extravagant and needless/purposeless event (except for Battistelli's own pride)



  4. Not Just Benoît Battistelli and Willy Minnoye (EPO): Željko Topić Too Thinks He is Above the Law, Avoids the Judges and Courts

    The latest developments regarding some of the criminal complaints and civil lawsuits against Topić, who is now a Vice-President at the European Patent Office (EPO)



  5. Nefarious Forces for Patent Abuse and Software Patents in the United States, Australia, India, Korea, and Europe

    A roundup of news from the weekend and today, with emphasis on the elements inside the system (or the media) which push for regressive policies that benefit them financially at the expense of everybody else



  6. [ES] El Sistema de Patentes de los EE.UU: Donde Uno Desperdicia Años en Corte y Gasta $8,000,000 en Honorarios de Abogados Peleándo una Patente Falsa

    un sumario de noticias acerca de las patentes de software en los EE.UU. Y ha lo que han llevado, debido en gran manera al decline en calidad de las patentes por parte de la USPTO (dejando que otros se las arreglen limpiando el desórden)



  7. [ES] La Oficina Europea de Patentes Todavía Sigilósamente Abusiva, Pagará $15,000 en Compensasió a Trabajadora Tras un Tardío Fallo de la ILO

    La Organización Internacional del Trabajo (ILO) emite un fallo en un caso de abuso de la EPO y nota “la excesiva duración de los procedimienteos internos de apelación.”



  8. Links 2/5/2016: Linux 4.6 RC6, DragonBox Pyra

    Links for the day



  9. Links 1/5/2016: Wine 1.9.9, Devuan Jessie 1.0 Beta

    Links for the day



  10. The US Patent System: Where One Wastes Years in Court and Spends $8,000,000 in Lawyers' Fees Fighting a Bogus Patent

    A roundup of news about software patents in the US and what they have led to, owing in part to the USPTO's declining patent quality (leaving others to clean up its mess)



  11. The European Patent Office Still Silently Abusive, Will Pay $15,000 in Compensation to Female Worker After Belated ILO Judgment

    The International Labour Organisation (ILO) issues a judgment on a case of abuse by the EPO and notes "excessive length of the internal appeal proceedings."



  12. [ES] Alice Continúa Quebrando Patentes de Software Asi Que los Abogados de Patentes, Cabilderos de los Monopolistas, Etc. Ahora Atacan a la Corte Suprema por Hacer Esto

    los cabilderos Corpórativos y abogados de patentes están tratándo de poner a Alicia en la tumba, por su impacto en las patentes de software que es muy profundo y así hasta ahora casi indetenible



  13. [ES] ¿Cómo Salvar la Reputación de la EPO?: Crear Más Jurados de Apelaciónes en Europa y Abolir la Malgíada/Malintencionada Fantasía de la UPC

    Una crítica evaluación de lo que ocurre en la Oficina Europea de Patentes (EPO), la que rápidamente se está yendo para abajo (y degradando sobre todo) a el nivel de los sistemas Chinos, en conjuntamente con corrupción, los abusos, y la bajísima calidad de las patentes



  14. [ES] La Corte de Apelaciónes del Circuito Federal (CAFC) Acaba de Ponerse a Favor de los Trolles de Patentes

    la tristémente célebre CAFC, que manifestó las patentes de software en los EE.UU, acaba de dar un regalo a los trolles de patentes quienes típicamente usan las patentes de software para extorsión enc complicidad con los jueces del Este de Texas



  15. [ES] Análisis de los Últimos Datos de Lex Machina Acerca de la Litigación de Patentes Muestra Como está Declinándo

    el Professor Mark Lemley de Lex Machina resalta las tendencias en litigation al colectar y analizar datos relacionados con patente y concerniéntes a monopolios intelectuales en general; actualmente muestra una sequía de litigaciones (muestran que ha disminuído)



  16. [ES] La India Está Teniendo Otra Prueba de los Peligros de las Patentes Occidentales, Debe Aprender a Rechazar Completamente las Patentes de Software en Medio de Gran Presión

    El gigante de software que es la India continua enfrentándos ea la cruel y agresivo cabildeo de Occidente, haciéndo que este controle a la India por patentes que no deberían de existir en primer lugar



  17. [ES] Microsoft Dice que Continuará Extorsiónando a Compañías Que Distribuyan Linux, Usando Patentes de Software Usuallmente

    La guerra de Microsoft contra Linux, una guerra que es peleada usando patentes de software patents (por ganancias y/o por chantáje con arreglos empaquetados), todavía continúa a pesar de todas las tácticas de relaciónes públicas de Microsoft y sus sócios



  18. Alice Continues to Smash Software Patents So Patent Lawyers, Monopolists' Lobbyists Etc. Now Attack the Supreme Court for Doing This

    Corporate lobbyists and patent lawyers are trying to put Alice in the grave, for its impact on software patents is very profound and thus far almost unstoppable



  19. How to Salvage the EPO's Reputation: Create More Boards of Appeal in Europe and Abolish the Misguided UPC Fantasy

    A critical evaluation of what goes on at the European Patent Office (EPO), which is quickly descending down (and overall degrading) to the level of Chinese systems, along with the corruption, the abuses, and the low quality of patents



  20. Court of Appeals for the Federal Circuit (CAFC) Has Just Sided With Patent Trolls

    The notorious CAFC, which manifested software patents in the United States, has just given a gift to patent trolls that typically use software patents for extortion down in Texas



  21. Analyses of the Latest Data From Lex Machina About Patent Litigation Show Some Litigation Declines

    Professor Mark Lemley's Lex Machina highlights litigation trends by collecting and analysing data related to patents and pertaining to intellectual monopolies in general; now it shows litigation droughts



  22. India is Having Another Taste of the Dangers of Western Patents, Must Learn to Reject Software Patents in the Face of Great Pressure

    The growing software giant which is India continues to face cruel and aggressive lobbying from the West, enabling the West to control India by patents that should not exist in the first place



  23. Links 29/4/2016: GNOME 3.21.1, Fairphone

    Links for the day



  24. Microsoft Says It Will Continue to Extort Companies That Distribute Linux, Using Software Patents As Usual

    Microsoft's war on Linux, a war which is waged using software patents (for revenue and/or for coercion in bundling deals), is still going on in spite of all the PR tactics from Microsoft and its paid partners



  25. Australia Might be Next to Block Software Patents If Commission's Advice is Followed

    Australian advice against software patents, which can hopefully influence Australian politicians and put an end, once and for all, to all software patents in Australia



  26. [ES] ''Si la Forma de Pensar de la EPO fuese Seguida, Guantánamo Sería Posible en Suelo Alemán.”

    La EPO está todavía bajo fuego, pero mucho de ello pasa detrás de las cortinas y envuelve abogados y/o burócratas



  27. The European Copy-Paste Office (EPO)

    This morning's example (not the first) of how the EPO uses 'social' media



  28. Links 28/4/2016: Fedora 24, EE Goes Open Source

    Links for the day



  29. Amid Referendum “the New European Unitary Patent System is Likely to Collapse Before It Started”

    The Unitary Patent Court (UPC) vision seems like it may be just one month away from its gradual death, depending on British voices amongst other key factors



  30. USTR is Trying to Shame and Bully India Into Introducing Software Patents in India

    Lobbying body of the US (corporations-led) is trying its usual dirty tactics against India's sound policy which excludes software/algorithms from patent scope


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts