Bonum Certa Men Certa

Latest Android 'Malware' Claims Come From Former Microsoft Staff, Who Conveniently Ignore Microsoft's Huge Security Problem With Back Doors

Bias by overlooking fundamental flaws in binary-only operating systems



Summary: Targeting of the leading Linux-powered operating system attributed to a company controlled by many executives who came from Microsoft

Techrights has been writing about Juniper for almost half a decade, covering for the most part the influx of Microsoft executives joining that company [1, 2, 3, 4, 5] (some count as many 12 Microsoft executives entering Juniper), especially the very highest positions therein. There is yet more badmouthing of Android, which comes after previous Android FUD from the same company not too long ago (the end of last year). This generates press coverage even where Linux-focused writers dominate. To quote: "According to the new 2013 Mobile Threats Report from the Juniper Networks Mobile Threat Center, 92 percent of mobile threats are now targeted at Android. That's up from 47 percent in 2012."



How are those numbers being put together and measured? Why is there no scaling or normalisation based on share? Where are desktops? How is malware defined? If the user installs malware as a download from the Web and not through a trusted repository like Google Play, what does that count as? Many of these questions can be treated with great bias to say just about anything one wants about Android security. Google and non-Google professionals have repeatedly labeled such claims FUD. Other former Microsoft staff [1, 2] is doing the same type of thing, dedicating entire projects just to showing security threats in Android (whilst ignoring other platforms). They don't call out Windows and they dare not mention the danger which is NSA access (see the new post titled "NSA Built Back Door In All Windows Software by 1999" or confirmation that NSA is in bed with Microsoft). It is perfectly possible that NSA back doors are what enabled Stuxnet to be put on computers in Iran -- something which is not just a theory anymore. As one man put it for the uninitiated: "You may recall last year that the NY Times revealed details on how US intelligence created the Stuxnet virus and got it into Iranian computers, leading to screwing up Iran's nuclear enrichment program. There were some questions at the time about who leaked that information and how the Obama administration didn't seem to mind nearly as much when the leaks made them look good. However, given the siege mentality the administration appears to have about any kind of leaks, to the point at which the Defense Department directly claims that "leaking is tantamount to aiding the enemies of the United States," it appears that the administration may be looking to go after the leaker of the Stuxnet info."

The BBC covers this too right now. For an agency so ruthless and lawless, where everything is seen as permitted, even cracking and sabotage of computers in another country, this should not be off limits. There is an admission that they did this when they claim to have found a leaker, a 4-star general. Al Jazeera is having a field day with this unintended confirmation that the US cracked computers running Windows.

Reports say retired general is being probed for leaks linked to 2010 cyber attack on Iran's nuclear programme.


Maybe Juniper should put more focus on Windows back doors and their huge national security threat, not some petty 'malware' that Android users need to insist on installing, which is not easy by the way (actively discouraged by the operating system).

After the NSA leaks we must insist that security professionals take more seriously the immediate need to uncover back doors, such as this HP backup server back door. The debate needs to change.

Recent Techrights' Posts

Explaining (in Length and Depth) the Damage Matthew Garrett Did to Linux and to GNU/Linux Users
no matter how many threats we receive
 
Oracle Fraud (or Defrauding Shareholders)
"the obvious [lie] is that watts are (wasted) electricity [and] and FLOPS are computing capacity"
Geminispace is Growing Faster in 2025 Than It Did in 2024
What matters is that corporations haven't ruined it and LLM slop is extremely rare
Links 13/09/2025: China Punishes for 'Negative' Posts, US Police Unable to Find Shooter
Links for the day
Who's the Mystery Financier of SLAPP Against Techrights and Is That a Millionaire/Billionaire?
Whose idea was it to fund meritless lawsuits against my wife and I?
Slopwatch: Slow Slop Day
This distracts from or may take traffic away from the original articles, actually written by actual people
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, September 12, 2025
IRC logs for Friday, September 12, 2025
CoC Gone Wrong: Celebrating Murder OK, Complaining About the Celebration Gets You Banned
Hopefully the NixOS Foundation will have a word with (maybe replace) the moderator/s
Gemini Links 12/09/2025: Familiarity and Secondary Dominants
Links for the day
Links 12/09/2025: "Bad Reviews" as Extortion Weapon, "Free Speech At Risk in America’s Schools" According to ACLU
Links for the day
Only One Speaker Does Not Do Sharecropping for MElon (in X.com)
The man who puts principles before PR/optics
The Mind of the 'Hulk Hogan of UEFI'
in a nutshell
A Day After "UEFI 9/11": UEFI Secure Boot Bypass
In the news today (right now), as published in the past few hours
Links 12/09/2025: Slop Code as Liability, Microsoft Outlook Down for Many
Links for the day
It's Still Not to Late to Turn Off "Secure Boot"
If people reboot their PC or server today, and it relies on "Secure Boot" on Sept. 12 or later, then depending on the firmware there may be trouble ahead
Links 12/09/2025: Shira Perlmutter is Back, “Software Per Se” Patent Rejections in In re McFadden
Links for the day
Slopwatch: Linux Plagiarism, Slopfarms Still Infesting Google News, Many Images Are Fake
Google is promoting plagiarism
"This Morning Might Turn Out to be an Interesting One for System Admins Who Haven't Updated Their Devices' Secure Boot Certificate" (If They Reboot)
Who asked for this anyway?
Gemini Links 12/09/2025: Metric System, Dumping Windows, and Software Architecture is Dead
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, September 11, 2025
IRC logs for Thursday, September 11, 2025
Microsoft Admits the Workers Have Lost Trust (Endless Layoffs, 12-13 Rounds of Layoffs This Year), So Now It's Trotting out Its Peter Bright-Like Media Prop Jordan Novet
What they don't want people to pay attention to right now
Links 11/09/2025: Windows TCO and Russian Drones Invading Poland (EU/NATO)
Links for the day
Gemini Links 11/09/2025: xkcd, misfin, and Alhena 5.3.2
Links for the day
Repetition of Last Summer (Microsoft Breaking Dual-Boot Systems)
UEFI 9/11 is about to kick in
UEFI 'Secure Boot' Boiling Frogs (Cannot Turn Off 'Secure Boot')
"MSI laptop is locked on Secure Boot and doesn't allow me to turn it off"
UEFI 9/11 Aftermath - Part IV: The 'Hulk Hogan of UEFI' and His 'Hideout' Holiday (Retreat From Reality)
Let's keep an eye on what matters
UEFI 9/11 Aftermath - Part III: Mr. 'Secure Boot' (Shim) and His Fake 'Holiday' (Sending My Wife and I Threatening E-mails on 9/11)
despite being on holiday, according to him, he finds time to instruct lawyers to contact my wife
UEFI 9/11 Aftermath - Part II: "The SecureBoot Thing Got Out of Hand."
The next few weeks might be... interesting
UEFI 9/11 Aftermath - Part I: "I Believe This Affects Thousands of Devices... Because Multiple Devices I Checked, Whether Client or Server [...] Affected."
Most people aren't even aware that this is happening or about to happen
The UEFI 9/11 - Part X - An Outline of the Series About Microsoft Sabotaging GNU/Linux (With Ramifications to Unfold Online in Coming Weeks as People Reboot)
Today is UEFI 9/11 (9/11/2025)
Ron Wyden: Microsoft Should be Held Accountable for Security Breaches (He Has Said This for Years Already, It Never Happens)
Negative media coverage isn't a fine and it does nothing to compensate Microsoft's billions of victims
Culture of silence: Ubisoft harassment convictions, Mozilla, Sylvestre Ledru & Debian make no comment
Reprinted with permission from Daniel Pocock
Disable 'Secure Boot' (If It Lets You)
it doesn't put you in control
Links 11/09/2025: "Hey Hi" Ponzi Schemes at Oracle (Unpaid Contracts) and Cindy Cohn is Leaving the EFF
Links for the day
Longtime Red Hat Staff: Maybe Just Disable 'Secure Boot'
A refreshing take from Adam Williamson
Gemini Links 11/09/2025: Playdate Console, Dichotomy between the Real and the Digital
Links for the day
A Dozen Observations About "UEFI 9/11" Deflections
What we are expected to see, tentatively
The Microsoft AstroTurfing and Microsoft-Led Blame-Shifting Tactics Are Ahead of Us
Of course it has nothing to do with security, it's about control, i.e. them controlling everything
Celebrating Assassination is Bad Because It Legitimises Assassination of the People You Like, Too
Condoning or even celebrating political assassinations is bad optics (and taste)
The World's Richest Ponzi Scheme (Faking Value Using Net Waste)
The higher they go the harder they fall
We Could Dual-Boot Back in the 1990s, Why Has This Become So Difficult?
And prone to breakage
Being Conditioned to Accept Unreliable Computer Systems That Fail With Black Screen of Death (BSoD)
Welcome to 2025
Slopwatch: Google News is Still Promoting Many Fake Articles About "Linux", in Effect Rewarding Misinformation and Plagiarism
things continue to deteriorate
New Series: The Coup Against GNU/Linux Has Begun
today, this year in particular, we shall also focus on Secure Boot, which is sold based on a lie and tortures many computer user
New Paper on "BYOVD, but in firmware. Signed UEFI shells, vulnerable modules offer new paths for Secure Boot bypasses."
One might say digital "security theatre"
Links 11/09/2025: Oracle Layoffs, Drunk Pilots in Japan Airlines, US-Korea Tensions Grow
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Wednesday, September 10, 2025
IRC logs for Wednesday, September 10, 2025