The Problem of Microsoft Security Problems is Microsoft (the Solution is to Quit Microsoft) and "Salt Typhoon" Coverage Must Name CALEA Back Doors
Name the holes, not those who exploit them.
"CISA orders federal agencies to secure Microsoft cloud systems after ‘recent’ intrusions," says this CIA-funded (and now fully acquired) company. As we noted here before, CISA is deeply infiltrated by Microsofters [1, 2, 3, 4], so it tends to be "soft" on Microsoft and not pursue real solutions to the Microsoft problem.
Regarding the above report, which was echoed in some "security" (posers') sites, an associate of ours said it's "an exercise in futility unless the mandate is for a rip-and-replace move away from Microsoft products and services entirely."
The associate said that Canonical and IBM are intentionally missing this opportunity for reasons that we covered earlier this week and last week. Instead they've become Microsoft resellers.
In relation to this we've seen a couple reports that paint "China" as the problem [1, 2] instead of the back doors China has chosen to exploit. Can't they explain to the general public what's really going on? Do the security posers control the media?
As the associate put it, "all the recent articles on "Salt Typhoon" seem to make a point to avoid even mentioning CALEA or CALEA2" (some distract by bringing up "Linux" instead)..
"The guide comes as the government continues to deal with the fallout of the Salt Typhoon hack," CyberScoop says. Maybe explain what makes this Salt Typhoon "hack" (crack) possible in the first place. Hours ago we saw "Linux" blamed for yet more things that have nothing to do with Linux. █