THE OTHER day we mentioned demands for back doors, which basically would make any piece of proprietary software (where back doors cannot be removed) utterly useless for any serious work because secure communication is a cornerstone of computing in a connected environment. We also mentioned Microsoft hiding many of its existing back doors even more aggressively, essentially telling users nothing about their easy-to-compromise systems.
"Always remember that Microsoft makes money from spying on users (government subsidies for the back door access), including in cases where this directly benefits Microsoft's business interests"This article from the British press says that this "move was criticised by some security professionals, who said it would hinder organisations’ ability to quickly test and deploy Microsoft’s updates."
They should just quit relying on Windows. Sony can tell them how reliance on Microsoft Windows already caused them to be doxxed against, potentially costing the company many billions of dollars in damages. One security-oriented professional "called the change, which was made with no advance notice, an “assault” on IT security teams."
Microsoft "assaults" the IT security industry. It attacks security itself, too. To quote further from the article: "Other industry observers said the change may have resulted from a broad reorganisation at Microsoft that began in 2013 and included large-scale layoffs in the middle of last year, with the Trustworthy Computing security group shut down in September. The reorganisation is itself the result of a broad industry shift toward mobile devices which has diminished the importance of Microsoft products such as Windows.
"Prominent figures at MSRC have left Microsoft, including senior development manager Jonathan Ness and Dustin Childs, group manager of response communications. In November Microsoft discontinued a long-running webcast in which engineers gave details on the monthly updates.
"Microsoft said in a statement that while ANS is no longer public, the company may also “take the appropriate actions to reach customers” if it determines that “broad communication” is needed for a specific situation."
So Microsoft Windows bug doors are becoming more secretive now. Nice timing given Cameron's call for back doors in everything; he would be so proud. Remember that Microsoft tells the NSA (and hence GCHQ too) about these bug doors well before they are patched, even 3 months in advance (Microsoft does not bother to patch holes until much later, if ever).
GNU/Linux is completely different because the code is visible and everyone can patch holes as soon as they are revealed. There are huge software repositories for which source code is available, so even underlying applications -- not just the operating system -- can be fixed. On Windows it is a sordid mess of random downloads of binaries from the Web and so-called 'crapware' that comes preinstalled with Windows and often has malicious behaviour. As Jim Lynch put it the other day: "I guess the bottom line here is to try to avoid being the sucker by installing crapware in the first place, regardless of the operating system you are using. If you don’t understand or aren’t sure about what’s being installed THEN DON’T INSTALL IT on your system. And only install software from trusted sources that don’t engage in the freeware bundling shenanigans."
Free software has none of these issues. The user is in charge.
Caspar Bowden, whom Microsoft fired for 'daring' to care about security and privacy, talks about Microsoft's publicity stunt case (intended to make it look like Microsoft cares about security and privacy). He now says he hopes Microsoft's publicity stunt will go down in flames and here is why: "His reasoning is that the US government can use other legal instruments, such as FISA 702 or Executive Order 12333, to brush aside such niceties as Safe Harbor or binding corporate rules (BCR) to get its hands on such data perfectly legally any time it likes, and as such the whole case is a smokescreen that actually suits both parties.
""Even if Microsoft wins that case, and I hope they don't because that'll just shore up the whole rotten system, it will make no difference to surveillance by the NSA under FISA 702 or Executive Order 12333 [see below]," he told Computing.
"Bowden - who was the chief privacy adviser to 40 national technology officers at Microsoft before he was "let go" in 2011 after revealing what FISA 702 implies for the firm's non-US customers - believes that this is all for show. It is part of a campaign of "cloudwashing" on the part of government and the industry, he says, that deliberately conflates data security - over which US cloud companies and their customers can take an active role - and government surveillance, over which, for legal reasons, they cannot. FISA 702 allows the US government to install surveillance apparatus inside the data centres of US companies. These interventions are covered by the espionage law, and anyone revealing their existence could face a lengthy jail sentence, as Yahoo's Marissa Mayer revealed."
Bowden is a Brit speaking about Ireland in the British press. We are happy to see him using the term "cloudwashing" -- a term we have used a lot for years. A lot of the pro-cloud hype is about increasing surveillance; it's often the business model. Always remember that Microsoft makes money from spying on users (government subsidies for the back door access), including in cases where this directly benefits Microsoft's business interests. ⬆