04.27.22

Gemini version available ♊︎

Microsoft Aggression and Deflection (Against Linux)

Posted in Deception, FUD, GNU/Linux, Microsoft, Security, Windows at 3:35 pm by Dr. Roy Schestowitz

Video download link | md5sum e6992ceaa55d089f64f07013fd228f56
Microsoft Loves Linux FUD
Creative Commons Attribution-No Derivative Works 4.0

Summary: Today we wish to take stock of a bunch of misleading, sensationalist coverage about “Linux”; as usual, Microsoft is connected to that, even more directly than one might expect…

THE TECHNICAL sabotage by Microsoft is easily demonstrable, e.g. in Mesa and in Linux (the “contributions” by Microsoft are to Microsoft, not to Linux, and they promote proprietary surveillanceware, not Software Freedom). In the video above I discuss NTFS in Linux (indirect link to bypass sites we boycott).

“Nothing Microsoft does benefits anyone else,”Ryan said moments ago in IRC, “except for a few odd cases that were usually less than 100 lines anyway. Which someone else probably would have done regardless at some point…”

“They try to minimize the usefulness of their “Linux” work to anyone else, because they don’t want to make “Linux” work better except in shackles under their Azure crap.”

More importantly, however, so far this week I’ve seen many Linux-hostile headlines, usually in Microsoft-friendly and/or Microsoft-connected sites which have historically been Linux-hostile.

Ignoring deliberate holes in Microsoft products, such sites would have you believe that Linux is the least secure thing on the entire planet!

As we put it in the latest batch of Daily Links, “while CISA admits Microsoft is full of holes that are actively exploited Microsoft and its faithful media operatives try to shift attention to “Linux” [as we demonstrated a few days ago, linking directly to CISA's site]…”

So what on Earth is going on here? “Microsoft concern-trolling Linux while putting NSA back doors in Windows,” to quote our editorial comment? Speaking of actively exploited holes, two months after a patch had been made widely available we see this article. “This was patched a very long time ago,” we noted this morning, and “meanwhile, there are dozen of zero-day flaws in Windows that are remotely exploitable, not local privilege escalation…”

So it seems like there might be distraction going on. And maybe there’s more to it than meets the eye…

Not only is it very hard for a malicious, unknown actor to actually leverage such a bug; it’s also hard to prove that Microsoft manipulates the media consciously in this case. We’d need to see leaked communications to actually prove such an assertion.

The net effect is the same and Microsoft staff now feeds the media with anti-Linux talking points. The stories are run by moles of the company, Microsoft-sympathetic ‘gurus’ who have moreover infiltrated the Linux Foundation (an organisation that nowadays ACTIVELY PARTICIPATES in such anti-Linux campaigns of semi-false talking points).

This keeps happening. We see it once in a few months, and this time it culminates in “old news” being rerun (about a bug properly patched more than 50 days ago [1, 2, 3, 4] and before it was even known to the general public).

The real problem, according to CISA, is Microsoft. But CISA’s “blog” almost never mentions “Microsoft”. It just maintains a catalogue many Microsoft flaws.

“If there is a problem affecting non-Microsoft systems,” an associate told us today, “then that is unusual and therefore news. If there is a remote exploit in the wild being actively exploited against Microsoft systems, that is the normal situation and thus not news.”

Towards the end of the video I show this new blog post from Debian’s Russell Coker, noting that Microsoft gives the NSA et al direct access to PCs, so no “security” measures from Microsoft should be taken seriously, to quote the latest Daily Links.

To quote Ryan, who is a former Microsoft MVP: “Local Privilege Escalations are bugs, yes, but they are of low concern (and do get fixed). Anyone with direct physical access to a computer can elevate their privileges eventually. And on Windows there’s a ton of them which sometimes even bypass the TPM and Bitlocker. There was one in the print spooler, for example, last summer. But it happens all the time on Windows and you don’t even see it much in “the news”. Any user on the machine could become SYSTEM and read your files, even if they were “protected”. So that’s Windows for you.”

bnchs noted that “in GNU/Linux, you would have to boot to another OS to get root.”

Quoting Ryan some more: “Becoming SYSTEM is an even bigger disaster than becoming ADMINISTRATOR, because in Windows, this means that you’re…well, part of the system. You can even patch and hook into things that are “secured” and off limits to ADMINISTRATOR. Stuff that normally requires digital signing no longer requires digital signing. So at this point, rootkit? Sure. And all it takes is someone running as a Guest or as a user with no administrator hat to run a file that knows where the vulnerabilities are. Microsoft was in the news (their news) recently for raising the bug bounty. It’s still less than Google’s, and way less than what those things are worth to nation state attackers, terrorists, and ransomware outfits. By a factor of $10,000:$1 sometimes.”

MinceR said it’s “still wasted money from their perspective [as] that could be better spent on corruption, ads and lawyers…”

Ryan continued: “Even if you get $40,000 out of Microsoft’s bug bounty system somehow, the ransomware gangs can just exploit it and make $20 million or more on one hit. So they’ll pay better each time and it’s simply up to the conscience of whoever found the problem in Windows as to what they want to do with it at that point. So the bug bounties are a ruse, a smoke screen, and the illusion of responsibility. In Linux, people find and fix bugs all the time. The code isn’t hidden. That leads, usually, to inevitable discovery, and quick patching.”

“People want to find bugs in Linux and report and fix hundreds of the same type, so they develop tools that can do things like that. Microsoft is annoyed that you reported one. Even over a decade ago before profiling tools were not as robust, not by a long shot, Coverity Scan admitted that “open source software, in general” was less than half as buggy as a comparable proprietary program. The proprietary software is sort of like the worst case situation for your security because they have little incentive to fix it unless there’s already malware out there and they just can’t hide the bugs any longer.”

“It’s like General Motors [GM] putting defective ignition switches in millions of cars for a decade after they knew they were shutting off the car unexpectedly and killing people in accidents. GM figured it’ll cost $1 a car to fix this problem, then come all of the recalls, and we’ll just grind them down with stall tactics and lawyers and stuff if they ever find out, and the settlement will still cost less. So that’s what we do.”

Update: Since we made the video above a bunch of other Microsoft boosters (with history) joined this FUD campaign. Of course they don’t mention what happened to Windows this past week (CISA reports). Left out from the video (3 examples) are:

And about half a dozen more. Screenshot below:

Microsoft- anti-linux FUD

But yes, Microsoft loves Linux…

Microsoft loves Linux FUD.

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Reddit
  • email

Decor ᶃ Gemini Space

Below is a Web proxy. We recommend getting a Gemini client/browser.

Black/white/grey bullet button This post is also available in Gemini over at this address (requires a Gemini client/browser to open).

Decor ✐ Cross-references

Black/white/grey bullet button Pages that cross-reference this one, if any exist, are listed below or will be listed below over time.

Decor ▢ Respond and Discuss

Black/white/grey bullet button If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

DecorWhat Else is New


  1. Links 01/06/2023: KStars 3.6.5 and VEGA ET1031 RISC-V Microprocessor in Use

    Links for the day



  2. Gemini Links 01/06/2023: Scam Call and Flying High With Gemini

    Links for the day



  3. Links 01/06/2023: Spleen 2.0.0 Released and Team UPC Celebrates Its Own Corruption

    Links for the day



  4. IRC Proceedings: Wednesday, May 31, 2023

    IRC logs for Wednesday, May 31, 2023



  5. Tux Machines Closing the Door on Twitter Because Twitter is Dead (for a Lot of People)

    Tux Machines recently joined millions of others who had already quit Twitter, including passive posting (fully or partly automated)



  6. Links 31/05/2023: Inkscape’s 1.3 Plans and New ARM Cortex-A55-Based Linux Chip

    Links for the day



  7. Gemini Links 31/05/2023: Personality of Software Engineers

    Links for the day



  8. Links 31/05/2023: Armbian 23.05 Release and Illegal UPC

    Links for the day



  9. IRC Proceedings: Tuesday, May 30, 2023

    IRC logs for Tuesday, May 30, 2023



  10. Gemini Protocol About to Turn 4 and It's Still Growing

    In the month of May we had zero downtime (no updates to the system or outages in the network), which means Lupa did not detect any errors such as timeouts and we’re on top of the list (the page was fixed a day or so after we wrote about it); Gemini continues to grow (chart by Botond) as we’re approaching the 4th anniversary of the protocol



  11. Links 31/05/2023: Librem Server v2, curl 8.1.2, and Kali Linux 2023.2 Release

    Links for the day



  12. Gemini Links 31/05/2023: Bayes Filter and Programming Wordle

    Links for the day



  13. [Meme] Makes No Sense for EPO (Now Connected to the EU) and Staff Pensions to be Tied to the UK After Brexit

    It seems like EPO staff is starting to have doubts about the safety of EPO pensions after Benoît Battistelli sent money to reckless gambling (EPOTIF) — a plot that’s 100% supported by António Campinos and his enablers in the Council, not to mention the European Union



  14. Working Conditions at EPO Deteriorate and Staff Inquires About Pension Rights

    Work is becoming a lot worse (not even compliant with the law!) and promises are constantly being broken, so staff is starting to chase management for answers and assurances pertaining to finances



  15. Links 30/05/2023: Orc 0.4.34 and Another Rust Crisis

    Links for the day



  16. Links 30/05/2023: Nitrux 2.8.1 and HypoPG 1.4.0

    Links for the day



  17. Gemini Links 30/05/2023: Bubble Version 3.0

    Links for the day



  18. Links 30/05/2023: LibreOffice 7.6 in Review and More Digital Restrictions (DRM) From HP

    Links for the day



  19. Gemini Links 30/05/2023: Curl Still Missing the Point?

    Links for the day



  20. IRC Proceedings: Monday, May 29, 2023

    IRC logs for Monday, May 29, 2023



  21. MS (Mark Shuttleworth) as a Microsoft Salesperson

    Canonical isn’t working for GNU/Linux or for Ubuntu; it’s working for “business partners” (WSL was all along about promoting Windows)



  22. First Speaker in Event for GNU at 40 Called for Resignation/Removal of GNU's Founder

    It’s good that the FSF prepares an event to celebrate GNU’s 40th anniversary, but readers told us that the speakers list is unsavoury, especially the first one (a key participant in the relentless campaign of defamation against the person who started both GNU and the FSF; the "FSFE" isn't even permitted to use that name)



  23. When Jokes Became 'Rude' (or Disingenuously Misinterpreted by the 'Cancel Mob')

    A new and more detailed explanation of what the wordplay around "pleasure card" actually meant



  24. Site Updates and Plans Ahead

    A quick look at or a roundup of what we've been up to, what we plan to publish in the future, what topics we shall focus on very soon, and progress moving to Alpine Linux



  25. Links 29/05/2023: Snap and PipeWire Plans as Vendor Lock-in

    Links for the day



  26. Gemini Links 29/05/2023: GNU/Linux Pains and More

    Links for the day



  27. Links 29/05/2023: Election in Fedora, Unifont 15.0.04

    Links for the day



  28. Gemini Links 29/05/2023: Rosy Crow 1.1.1 and Smolver 1.2.1 Released

    Links for the day



  29. IRC Proceedings: Sunday, May 28, 2023

    IRC logs for Sunday, May 28, 2023



  30. Daniel Stenberg Knows Almost Nothing About Gemini and He's Likely Just Protecting His Turf (HTTP/S)

    The man behind Curl, Daniel Stenberg, criticises Gemini; but it's not clear if he even bothered trying it (except very briefly) or just read some inaccurate, one-sided blurbs about it


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts