Bonum Certa Men Certa

NSA Shows Why We Should Abandon All Proprietary Software and Verify Trust

Without source code of all levels/layers of the software trust just cannot be established

Compiler



Summary: Proprietary software can never be secure and back doors inside of it can be assumed (unless proven otherwise), based on some of the latest NSA leaks

THE NSA is a criminal operation, so we expect it to work with other criminal operations. Microsoft and the NSA collude to make the world a less secure place, enabling espionage with Windows (Stuxnet for example) and providing video/audio surveillance in people's own homes without any warrants. Microsoft is about lawlessness is the same way the NSA is. The law of "rule" supersedes the rule of law.



Some say that the Windows-centric Stuxnet is the "world's first true cyber-weapon", but that is not true. History aside, to put it as IDG put it: "Stuxnet's creators recognized they had built the world's first true cyber-weapon and were more interested in pushing the envelope of this new type of digital warfare than causing large-scale destruction within targeted Iranian nuclear facilities, a study shows.

"In an analysis released last week, Ralph Langner, head of The Langner Group and a renowned expert in industrial control systems (ICS), also refuted arguments that only a nation-state had the resources to launch a Stuxnet-like attack. Assailants with less ambition could take the lessons learned and apply them to civilian critical infrastructure, he said."

This was an example of overreach and violation of the law, enabled of course by Microsoft and Windows. GNU/Linux does not sell its users down the river the way Windows does.

Sadly, firms like White Source make a comeback with their FUD and they single out FOSS for security issues (here is the press release). This is not acceptable because they totally ignore the much bigger threats, as above (where security issues are there by design).

The White House is at war against FOSS geeks and other phantom enemies [1,2], where the logic is something along the lines of, if we don't control it (we as in the government), then it's a threat to national security. While it seems clear that a brute force attack is the Achilles Heel of FOSS [3,4,5] and Google keeps improving security of FOSS projects like Android [6,7,8,9.10] and others [11,12], the logic followed by the likes of White Source and White House is that if something proprietary keeps its flaws (or back doors) secret, then it's secure and we should not pay attention to real security. Again, this is simply not acceptable.

The head of the Linux Foundation recently said that FOSS is safer, and Linux is more secure than any other OS [13]. Mikko Hypponen seems to agree with him [14] and despite some new known flaws in Red Hat software [15,16] (transparency makes weaknesses visible) we should remember that lack of knowledge about something does not mean it's not there. Just because we cannot easily see back doors in proprietary software doesn't mean they're not there (some groups of people know they're there and they exploit them silently). If Europe is serious about cyber security [17], then it should dump all proprietary software (back doors-friendly software) as soon as possible. Given everything we now know about the NSA, ignorance and uncertainty are no longer an excuse. A Dutch source has just revealed that the NSA cracked 50,000 computer networks. The evidence is overwhelming. Stuxnet is peanuts next to that.

Related/contextual items from the news:



  1. How Antisec Died
    Depending on when one asked, Antisec was generally between 8-10 people, with a solid core of about six. Not all of them were comfortable with talking to me, and certain ones were designated to communicate with press. I was never entirely sure who was in or out at any particular time — it was a fluid group. I never knew all the nicks. I talked repeatedly with five of them, including Sabu.


  2. Bizarre Online Gambling Movie-Plot Threat
    This article argues that online gambling is a strategic national threat because terrorists could use it to launder money.


  3. Huge horde of droids whacks code box GitHub in password-guess attack


  4. GitHub resets user passwords following rash of account hijack attacks
    GitHub is experiencing an increase in user account hijackings that's being fueled by a rash of automated login attempts from as many as 40,000 unique Internet addresses.
  5. Google extends its proactive Patch Reward Program to include Android Open Source Project, Web servers, and more


  6. Google adds Android Open Source Project to Patch Rewards program
  7. Google expands Patch Rewards Program
  8. Google extends open source bug bounty programme to Android and Apache


  9. Android now part of Google’s Patch Reward Program


  10. Google adds Android and Apache to open source security rewards programme
    Google has extended its Patch Reward Program to include a raft of new platforms and technologies including its own Android system as it looks to improve the securiry of open source software.

    The firm announced an overhaul to its security patch policies last month, offering white hats up to $3,133 for fixes.


  11. Experts applaud Google completion of SSL certificate upgrade
    Step up to 2048-bit keys optimizes balance between protection of company services and maintaining performance


  12. Pinkie Pie and His Google Exploits: The Legend Grows
    Pinkie Pie returned in 2013 for the desktop Pwn2Own event operated by Hewlett-Packard's Zero Day Initiative (ZDI), taking aim once again at Google. This time, it was Google's Chrome browser running on Chrome OS. Pinkie Pie's effort landed him another $40,000 in award money for the discovery and reporting of what turned out to be a trio of flaws, including one buried deep within the Linux kernel. Chrome OS is a Linux-based operating system that Google uses on its Chromebook notebooks.

    But wait. There is still more.

    Just this week in Japan at HP's Mobile Pwn2Own event, the legend of Pinkie Pie grew as the My Little Pony-loving security researcher once again demonstrated previously unknown zero-day flaws in Google's Chrome. Pinkie Pie was able to pwn Chrome on both a Nexus 4 as well as a Samsung Galaxy S 4 smartphone. This time, Pinkie Pie pocketed $50,000 for his efforts.


  13. Linux chief: ‘Open source is safer, and Linux is more secure than any other OS’ (exclusive)


  14. Mikko Hypponen: Open Source Software Will Make the World More Secure
    Open source software can be one answer to combating the global surveillance of innocent citizens, said security expert Mikko Hypponen in his keynote last week at LinuxCon and CloudOpen Europe in Edinburgh.


  15. Hackers actively exploiting JBoss vulnerability to compromise servers, researchers say
    Attackers are actively exploiting a known vulnerability to compromise JBoss Java EE application servers that expose the HTTP Invoker service to the Internet in an insecure manner.


  16. Red Hat: 2013:1521-01: python-django: Moderate Advisory


  17. European businesses urged implement anti-cyber security systems
    The European Cyber Security Directive, which proposes that European businesses have a legal obligation to ensure they have suitable IT security mechanisms in place, is soon to be enforced in the UK.




Recent Techrights' Posts

Microsoft's 'Lawsuit Diplomacy' (SLAPPs Riding UK Libel Law and Piggybacking UK GDPR, Inapplicable!) Will Only Give a Worse Image to Microsofters (and Microsoft), Give Exposure to Even More Suppressed Facts and Scandals
Microsoft came to dominate some sectors because of (or owing to) crimes; Microsoft won't just go away without some more crimes.
Five (or Three) Years Without Social Control Media
Glyn Moody quit X (Twitter)
Why GNU/Linux is Growing
There's growing interest in GNU/Linux right now because people do not fancy buying a new PC just to 'upgrade' (more spying) Windows
 
Links 20/04/2025: Bleeding Constitution and ChatGPT Infuriates Users Some More
Links for the day
Deja vu: Hitler's Birthday, Andreas Tille elected Debian Project Leader again
Reprinted with permission from Daniel Pocock
Chinese OEMs (and World's Largest) Pave a Path Out of Microsoft Windows
So Microsoft now values (or prices) Vista 11 at just $140?
Gemini Links 20/04/2025: Contradictions of Mark Carney and Blog Questions Challenge
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Saturday, April 19, 2025
IRC logs for Saturday, April 19, 2025
Electronics in People's Bedrooms
Modern technology not only blurred the gap between "functions" of rooms
Gemini Links 19/04/2025: Contingencies, GTD, and Old Computers
Links for the day
Links 19/04/2025: Economic Races, Charm Offensives, and USB-C Rants
Links for the day
Links 19/04/2025: "Infantilization at Big Tech" and LLM Slop Abused in Defiance of Workplace Rules/Policies
Links for the day
Gemini Links 19/04/2025: Palm Addiction and Real Experts
Links for the day
Egypt is Controlled by Google, Not Microsoft
Moving from Microsoft to Google is not the answer
Microsofters Say They Cannot Find a Job (That They Want) Because of Techrights, But Techrights Merely Reported on Their Behaviour
Quit pointing the finger at people who are recipients of abuse or merely mention the abuse
Free Software and Standards - Not Marketing Blitz - Needed Amid Growing Severity of Dependency on Hostile Suppliers (or Another Country's Sovereignty)
ZenDiS can be described as the "Center for Digital Sovereignty of Public Administration"
When It Comes to the Web, Google is Evil and It Destroys the Web's Integrity With LLM Slop
Even academia, which is meant to keep standards high, is being lured into LLM slop
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, April 18, 2025
IRC logs for Friday, April 18, 2025
Links 18/04/2025: "Fentanylware (TikTok) Exodus Continues", Chinese Weapons Allegedly in Russia Already
Links for the day
Gemini Links 18/04/2025: Price of Games and State of Tinylog
Links for the day
Sounds Like IBM is Preparing for Mass Layoffs/Redundancies in Red Hat, Albeit in "PIP" (Performance Improvement Plan) or "Relocation" Clothing
This isn't the "old" IBM; they're applying pressure by confusion and humiliation
Gemini Links 17/04/2025: Role of Language and Back to Mutt for E-mail
Links for the day
"Sayonara" (さよなら), Microsoft
Windows had fallen below iOS in some countries
Links 18/04/2025: Layoffs at Microsoft Infosys and Qt Becoming Increasingly Proprietary (Plus Slop)
Links for the day
Google News is Dying
treating MElon's algorithmic/biased site as a source of verified news
Microsoft's Attack Dogs Have Failed. Now What?
It would be utterly foolish to assume that Microsoft has any intention of changing
All Your "Github Projects" Will be Gone One Day (Just Like Skype)
If you have code you wish to share and keep, then start learning how to do so on your own
To Understand Who's Truly Controlling You Follow the Trail of Censorship (or Self-Censorship)
Do not let media steal and steer the narrative; CoCs are not about "social justice", they're about corporate domination
Fedora Already Lost Its Soul Under IBM
Fedora used to be very strict compared to many other distros and it had attracted very bright volunteers
Microsoft is Still Attacking GNU/Linux and the Net
Microsoft bribed the government using money that did not even exist
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, April 17, 2025
IRC logs for Thursday, April 17, 2025
Gemini Links 18/04/2025: Pinephone Pro and Linux is too Easy
Links for the day