EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

01.29.14

The Latest FOSS FUD Revolves Around Fakes and Bogus Arguments

Posted in Free/Libre Software, Security at 2:07 pm by Dr. Roy Schestowitz

Summary: How Free/Open Source Software (FOSS) gets discredited over “security”, based on something which has nothing to do with FOSS and more to with human error or social engineering

THE reports from IDG make it sound as though FileZilla is a security threat [1,2] when it fact it is fakes that are a threat, as Sean pointed out to counter these allegations [3].

Yesterday we took note of the trend and two days ago we gave some examples of security-flavoured FUD against Android, of which there is plenty these days (and even today). Some of it is correctly being characterised as platform-agnostic [4]. This sometimes requires user intervention [5] or social engineering [6], so there’s a lot more to be taken into account. When the OpenSSL project got compromised some weeks ago it was actually the fault of a weak password [7,8], but some of the media spread FUD about OpenSSL itself. Weak passwords are a common human error [9] and those who don’t encrypt E-mails that contain passwords (they should!) only have themselves to blame [10,11]. To get an example of real vulnerability, consider Apple’s Safari storing passwords in plain text [12]!!! GNU/Linux, by contrast, facilitates strong encryption and has protection against all sorts of attacks [13-14].

Blaming FOSS for issues that relate to social engineering is a common FUD pattern these days (like blaming Android for users installing malware they download outside repositories), but the real security issues are back doors like Microsoft’s, security flukes like Apple’s, and data leakage through so-called ‘clouds’ (which are typically promoted by proprietary software players, tightly connected to the crack-leaning NSA).

Related/contextual items from the news:

  1. FileZilla warns of large malware campaign
  2. FileZilla warns of large malware campaign
  3. FileZilla, Other Open-Source Software From ‘Right’ Sources Is Safe

    A basic tenant of open-source software security has long been the idea that since the code is open, anyone can look inside to see if there is something that shouldn’t be there.

  4. Java-based malware driving DDoS botnet infects Windows, Mac, Linux devices

    The cross-platform HEUR:Backdoor.Java.Agent.a, as reported in a blog post published Tuesday by Kaspersky Lab, takes hold of computers by exploiting CVE-2013-2465, a critical Java vulnerability that Oracle patched in June. The security bug is present on Java 7 u21 and earlier. Once the bot has infected a computer, it copies itself to the autostart directory of its respective platform to ensure it runs whenever the machine is turned on. Compromised computers then report to an Internet relay chat channel that acts as a command and control server.

  5. Yahoo users exposed to malware attack

    Users clicking on some ads are redirected to sites armed with code that exploits vulnerabilities in Java and installs a variety of different malware.

  6. Password Security Requires Multiple Layers of Protection

    The gist of the story is that “123456″ is now the most commonly used weak password—surpassing the use of the word “password.”

  7. No hypervisor vulnerability exploited in OpenSSL site breach

    The OpenSSL Project confirmed that weak passwords used on the hosting infrastructure led to the compromise of its website, dispelling concerns…

  8. OpenSSL site defacement involving hypervisor hack rattles nerves (updated)

    Code repositories remained untouched in the December 29 hack, and the only outward sign of a breach was a defacement left on the OpenSSL.org home page. The compromise is nonetheless rattling some nerves. In a brief advisory last updated on New Year’s Day, officials said “the attack was made via hypervisor through the hosting provider and not via any vulnerability in the OS configuration.” The lack of additional details raised the question of whether the same weakness may have been exploited to target other sites that use the same service. After all, saying a compromise was achieved through a hypervisor vulnerability in the Web host of one of the Internet’s most important sites isn’t necessarily comforting news if the service or hypervisor platform is widely used by others.

  9. 7 sneak attacks used by today’s most devious hackers
  10. 10,000 Top Passwords

    Back when I wrote Perfect Passwords, I generated a list of the top 500 worst (aka most common) passwords which seems to have propagated quite a bit across the internet, including being mentioned on Gizomodo, Boing Boing, Symantec, Laughing Squid and many other sites. Since then I have collected a large number of new passwords bringing my current list to about 6,000,000 unique username/password combos, including many of those that have been recently made public*.

  11. All Your Internet Are Belong To Iceland*

    All that being said, and given that the Luddite solution of forsaking the Internet may not be terribly practical, this is another reason to encrypt technical data that you are sending by email even if the recipient is a U.S. person firmly planted on U.S. soil. No, the encryption isn’t a defense to the violation, but it is at least a mitigating factor. Remember, as I posted last May, that the U.S. military thinks it can put ITAR-controlled technical data on a Chinese satellite if it’s encrypted; so if you don’t have anything else to say in your defense when an email with export controlled data accidentally wanders through Lithuania, you will at least have that. And maybe one day in the distant future, BIS and DDTC will admit that the Internet exists and that encryption works.

  12. Older Versions of Safari Store Login Info in Plain Text

    Older versions of Safari for Mac store unencrypted user login credentials in a plain text file, according to security firm Kaspersky (via ZDNet). Safari saves the information in order to restore a previous browsing session, reopening all sites, even those that require authentication using the browser’s “Reopen All Windows from Last Session” functionality.

  13. Quantum crypto pitches for data centre links
  14. Linux Is the Only Way to Protect Against Potential Sound-Transmitted Malware
Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. Links 4/5/2015: Many New Releases, Ubuntu Drone

    Links for the day



  2. Misplaced Focus on Patent Trolls and Patent Lawyers' Defence of Trolls

    Observations about media coverage and reactions to the focus on patent trolls, which distracts from desperately-needed reform around patent scope



  3. PATENT Act a 'Reform' for Big Corporations, Hence Does Not Address the Core Issues, Including Patent Scope and Massive Patent Aggressors

    Big corporations, including some of the biggest patent aggressors out there, successfully lobbied for what has essentially become a bipartisan bill to eliminate the thorn in their side



  4. Openwashing of Binary Blobs That Microsoft Uses to Attack Free Software and GNU/Linux From the Inside

    Media which is either willfully ignorant or complicit has successfully, based on volume of coverage, framed Microsoft's proprietary software as openness and nicety



  5. Microsoft Kills Netscape Again, This Time Removing It From the History Books

    Microsoft's embarrassing crimes against Netscape -- the ones that put Bill Gates on trial and nearly split Microsoft -- virtually forgotten as Netscape itself is made to 'disappear'



  6. Microsoft India's Unofficial 'Branch' Infosys is Torturing the Meaning of Open Source Software

    Infosys, which is best known for its promotion of Microsoft in India, is distorting the meaning of 'Open Source' and joins a non-profit that is supposed to promote programming, not binary blobs



  7. Microsoft Windows is Dying, British Government Should Spend No More Money on It

    Time for the Establishment in the UK to abandon the out-of-support Windows XP (from 2001) and join the next generation of computing, which increasingly revolves around GNU/Linux and Free/libre software, supported by truly British companies



  8. IRC Proceedings: April 5th - May 2nd, 2015

    Many IRC logs



  9. Links 3/5/2015: Black Lab 6.5 RC2

    Links for the day



  10. Links 2/5/2015: Robolinux 7.9.1, LibreOffice Numbering

    Links for the day



  11. Links 1/5/2015: HP Ubuntu Laptops, Arch Linux 2015.05.01

    Links for the day



  12. Links 30/4/2015: Plasma 4.4 in the Making

    Links for the day



  13. Microsoft Embracing, Extending, Extinguishing the Linux-centric Arduino and Raspberry Pi, Making Them Windows Devices

    Raspberry Pi and Arduino carry water for Microsoft as part of the publicity stunts for Vista 10, the operating system which Microsoft tells investors is "marketing"



  14. Microsoft Uses Ubuntu to Demonstrate and Promote Microsoft Lock-in

    Canonical's Ubuntu is now used as the bait by which to seduce developers in the GNU/Linux world into Microsoft dependencies, surveillance, and software patents



  15. The EPO's Tyrant, Benoît Battistelli, is Probably on His Way Out, Threatens to Resign

    The Napoleonic self-acclaimed 'president' of the EPO, who surrounded himself with loyal thugs and crushed all opposition to him (assuring reign by fear), reportedly threatens to fall on his sword if an independent mediator gets appointed



  16. Links 30/4/2015: Debian GNU/Hurd 2015, Microsoft Copies Ubuntu

    Links for the day



  17. Windows Recipes for Disaster (Met Police and Fukushima)

    Microsoft Windows mentality and strong dependencies continue to cause immeasurable damage that costs people a lot in terms money and in terms of health



  18. ‘Visual Studio Code’: Not News, Not Free, Not Open Source

    Another publicity stunt from Microsoft, this time going under the name ‘Visual Studio Code’, which is basically proprietary lock-in



  19. Microsoft's Patent Attacks on Android Not Covered in the Corporate Media, Only Microsoft as the 'Victim'

    Omission of important developments around Microsoft's war on GNU/Linux and Free software, notably against Android and ChromeOS as of late



  20. As Core Issues Still Not Addressed, Another Protest Against EPO Management Scheduled for Tomorrow in Munich, Germany

    On Thursday (tomorrow) yet another demonstration is organised in Munich, less than a week ahead of the UPC decision (May 5th)



  21. Pharmaceutical Patents and Hedge Funds: Evil Fighting Evil

    Revisiting the subject of patents on life or life-saving processes, plus a hedge fund's extortion-type attack on such patents (for quick profit)



  22. UCLA Foolishly Grooms Microsoft's Patent Troll Nathan Myhrvold (Intellectual Ventures), Who is Busy Attacking Android and Linux These Days

    More news about Intellectual Ventures, Microsoft's and Bill Gates' anti-Linux tool, who lost a battle because of last year's SCOTUS ruling and is now groomed by the University of California, Los Angeles (UCLA)



  23. Links 28/4/2015: Plasma 5.3, Cutelyst 0.8.0

    Links for the day



  24. Links 28/4/2015: More on Debian 8 “Jessie”, Fedora 22 Beta Walkthrough

    Links for the day



  25. Microsoft is Attacking Android Like Never Before, Qisda the Latest to Sign Patent Extortion Deal

    More blackmail and propaganda against Android, courtesy of the gentler, kinder, 'new' Microsoft



  26. Caution Needed When Microsoft Copywriters Flood the Media With Microsoft Propaganda

    Media actively subverted by Microsoft-sponsored agents of deception, whose goal is to change what people think of Microsoft and its software, even if by lying (they call it 'marketing')



  27. Gartner Staff That Worked for Microsoft and the Latest Nonsense from Gartner or 'Former' Staff

    Gartner waited until 2015 to declare FOSS fit for databases; another example spotted where Gartner staff comes from Microsoft or vice versa



  28. Links 27/4/2015: Debian 9 Named, Linux 4.1 Reaches RC

    Links for the day



  29. Microsoft is Interjecting Itself Into GNU/Linux and Free Software News, Even Events and Foundations

    Microsoft's entryism strategy is proving effective as Microsoft successfully embeds itself inside the idealogical competition, subverting the competition's overall message and diluting the competition's focus on Free software



  30. The Unethical Business of Selling Fear of Free/Libre Software Bugs (Black Duck, Sonatype, and Symantec)

    The spreading of fear of Free/Open Source software (FOSS) is now a growth industry, so proprietary opportunists are eager to capitalise on it, even if by distorting the truth


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts