Bonum Certa Men Certa

EPO Whistleblowing: How (Not) to Use Machines at the Office

Control Risks and EPOSummary: What Control Risks and the EPO's management probably hope staff won't know and therefore, potentially, self-incriminate

STAFF of the EPO, as we noted here a few days ago, no longer trusts phones at the Office, but what about the PCs and the printers? Thankfully, having inquired for a while, we have been able to gather some information and now is a good time to share it, for the safety of EPO workers who are under the vigilant eyes of Team Battistelli and unaccountable goons like Control Risks.



"Anyone who uses an EPO computer to do anything at all is in danger," one reader told us.

“It is thus imperative that any file which is published isn't 100% identical to the original, even if it was widely distributed internally in the first place.”
      --Anonymous
"It is pretty much established that ALL user computers at the EPO are equipped with key logging software," said an anonymous person. This is apparently well understood by now. No wonder the atmosphere at work is so depressing. There have been studies conducted which explain the effect of never having any privacy, let alone a sense of privacy.

"I obviously couldn't study the currently installed machines myself," one reader told us, "but I trust my sources on this. The amount of data transmitted and stored is trivial, and putting myself in the skin of a spy, I would suppose that the logging includes the list of opened windows with the ID of the one in focus, with occasional screen captures. That's fairly easy to implement."

As some people put it, Windows is almost designed and even optimised for spying. There are many surveillance add-ons sold for it, and Vista 10 is spyware out of the box (for Microsoft to spy on every keypress and much more).

“There are commercial programs offered on the market that monitor and log any data traffic to and from attached USB ports.”
      --Anonymous
"Using hooks in the file system," a reader of ours hypothesised, "you could also check whether someone uploads a file in Chrome or Firefox for transmission, e.g. in a webmail window, so you don't even need to doctor and compromise the browsers.

"It would also be easy to scan EPO computers for an identical copy of any file which shows up on the Internet. Someone who would want to leak a document would have to store it on his/her local drive first, and that leaves traces. This wouldn't require excessive resources if you work with file signatures computed hash functions.

"It is thus imperative that any file which is published isn't 100% identical to the original, even if it was widely distributed internally in the first place."

Obviously it would be unwise to use a computer at work for subversive activities in the first place. It's safer to do so from home or some open network.

"I often work with bitmap conversions," a person once advised us, "which strips all original metadata and of any stuff which could be easily hidden in PDFs. The Adobe format is ugly and complex, and provides PLENTY of opportunities for introducing side channels, e.g. orphan objects, extra entries in character coding vectors, or even the ordering of objects within a page, which PDF linearization wouldn't defeat. Technically, you could still watermark a document using character kerning, which is harder to defeat with bitmap transformation, but this would require an infrastructure just for that, and that would require RATHER smart operators."

“One can only send a document to one's own e-mail address these days.”
      --Anonymous
Going back to the point about Windows, especially recent versions of it, it's probably not wise to use it because spying is often done by numerous parties (including Microsoft) at the same time. Personal data is later being passed around or even sold.

One reader reminds us: "There are commercial programs offered on the market that monitor and log any data traffic to and from attached USB ports. It would be slightly safer to obfuscate a file before saving it to an USB stick, but there are still traces. I know of places who use these, but I don't know if the EPO is among them. By the way, our beloved NSA files patents for "butt plugs" for insertion into USB ports."

Just to complete the picture, someone told us that if people use the machines at the Office, then "Xerox" may appear in the document producer metadata and "chances are," in such a case, "that the document was scanned on these high performance network printers which are widely used at the EPO. These used to be in open access, but current models require the user to present his ID badge in order to access the scan menu. One can only send a document to one's own e-mail address these days."

Our sources believe that computer keyboards are equipped with smart card readers, but we don't know whether the smart card must be left inserted in order to work. In any case, the screen lock delay is quite short, so one can hardly use the excuse "someone must have entered my office when I went out to take a leak".

Any public file produced by the Register or Espacenet is generated on the fly from internal bitmap images and contains metadata which could betray the IP of the requester, so sources would want to cleanse these too.

At Techrights we use various methods to eliminate or at least significantly reduce the risk of sources being found through metadata. Nevertheless, if during transmission there is identifying information and if Control Risks can observe the session, then there is risk of useful interception. We previously provided information on how to securely send data to us. Some of the above observations hopefully increase awareness of the traps and the weaknesses that are EPO-specific.

Recent Techrights' Posts

The Ultimate and Inevitable Fall of OpenAI (Even Brave is 'Bigger' Now)
"When you advertise at the Super Bowl, you’ve reached just about every consumer in America. It’s the last stop. If you’re not profitable yet, you never will be."
 
Links 10/02/2025: Announcing "Stringless" and Mental Health Improvement
Links for the day
Links 10/02/2025: Facebook Mass Layoffs, "Meta" Did What Aaron Swartz Had Done But to the Tune of 81.7 Terabytes
Links for the day
Microsoft Tarnishing the Brand of Arch
Of course Arch can do whatever it wants, but being associated with Microsoft is a badge of shame
Adding Slop to Your Blog Only Makes One Assume All the Text is LLM Slop
Simon Coter from Oracle has turned to slop
Macao is Leaving Microsoft Behind
Windows is falling to new all-time lows
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Sunday, February 09, 2025
IRC logs for Sunday, February 09, 2025
Microsoft's WSL (LSW) Shows That It Can Never Love Linux, Only Windows
that's just how Microsoft rolls
Activism in Times of War and a Coup
'Linux' Foundation works for fascism
What the Silencing of Neatnik Tells Us About Linus Torvalds Inside a Microsoft-Dominated 'Linux' Foundation
Is Linus Torvalds free to express his mind as he wishes about every topic, even just any technical topic?
Windows Down to 11.35% in Senegal, as Measured by statCounter
Another all-time low (Windows was at 99% in 2009)
"Latest Technology News" in BetaNews is LLM Slop Promoting OOXML and Proprietary Software at the Expense of LibreOffice and OpenDocument Format (ODF)
Remember that "open-source" and Open Source aren't the same; the former is fake
Links 09/02/2025: Coffee, Toxic Productivity, and Programming
Links for the day
Debian's Human Rights violations & Swiss women Nazi symbolism
Reprinted with permission from Daniel Pocock
Links 09/02/2025: Software Patents on MP3 and Another Scam Dressed Up as "Crypto"
Links for the day
Links 09/02/2025: Russian Energy Cut Off, LLM Pushers Show Signs of Desperation
Links for the day
Richard Stallman (RMS) Does Not Have Media Companies and Lobbyists on His Side, But His Message Spreads Regardless
The message of RMS is spreading in spite of all the smears
GNU/Linux Rises to All-Time High in Chile
sharp rise for GNU/Linux in Chile
Links 09/02/2025: Hottest January on Record, Panama Blackmailed
Links for the day
Why We Still Love Gemini Protocol
Gemini Protocol may seem like something "old" (it's actually very new) and something "nobody would use", but many people use it
Gemini Links 09/02/2025: "Died as a Mineral" and Game Interface for a Non-Game
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Saturday, February 08, 2025
IRC logs for Saturday, February 08, 2025
Links 08/02/2025: UK Back Doors and Religious Fundamentalists in Positions of Higher Power
Links for the day
Today's IBM (Red Hat) Isn't the Company That Fought a Microsoft-Sponsored SCO in Court
IBM is nowadays in a state of rapid disintegration
When You Simply Rebrand Almost Everything as "Hey Hi" ("AI"), "Hey Hi Workloads", "Hey Hi Datacentres" and Whatnot
The "growth" has been a growing lie for years if not decades
Microsoft Windows Falls to 12% in Myanmar
Remember that Microsoft is virtually 0% in mobile
This is the Man Who's Attacking Linus Torvalds et al in "a Disease" (Social Control Media)
One thing that Richard M. Stallman and Torvalds can agree on is that Social Control Media should be avoided
Gemini Links 08/02/2025: "Thought Leaders" and Returns to Gemini Protocol
Links for the day
Links 08/02/2025: MElon Coup, Mass Layoffs at Facebook, and PlayStation Network Down
Links for the day
Unlike GAFAM, Free Software Serves You, It Does Not Serve Governments and MElons (Overlapping Forces)
Tired of oligarchy controlling your life through gadgets and "apps"?
On Wars Against Founders
We need to insist that founders remain
When It Comes to Social Control Media, Linus Torvalds is Channeling Techrights
GAFAM workers know exactly who to aim at
New EPO Paper: Promoting (Rewarding) People Who Grant Many Illegal European Patents to Make More Money (at Europeans' Expense) While Patent Courts in the EU Are Themselves Illegal
now the coup is sort of complete and even the "courts" are part of the corruption
Slopwatch: Carnival of LLM Slop and FUD Spewed by Bots, Pasted in by MaKenna Hensley and Day
Welcome to the Web in 2025. Articles about "Linux", "Security", and the Web (e.g. "Firefox") are fake.
Links 08/02/2025: News Corp Admits Traffic Declines, Wildlife Trafficking Tackled
Links for the day
Gemini Links 08/02/2025: Lamp and Notions
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, February 07, 2025
IRC logs for Friday, February 07, 2025