"I don’t want a back door. I want a front door." -- Director of the National Security Agency (NSA), April 2015
"Yes, Microsoft still keeps the NSA in the picture."Microsoft is still thinking that enough people foolishly believe NSA collaboration is 'for security' rather than for 'national security', i.e. back doors. A Windows-powered site reminded us some days ago that NSA "worked with Microsoft on security aspects of the Windows 7 operating system and later for Windows 8 and 10."
Yes, Microsoft still keeps the NSA in the picture. This actually surprised us because it's a PR disaster. Why does Microsoft still want to be seen working in cahoots/collusion with the NSA? In proprietary software, back doors or "national security", i.e. not real security, are the cause of many costly issues. Software is designed to be penetrable rather than secure. Is there anyone who still honestly thinks that Vista 10 won't have back doors? Microsoft never stopped its relationship with the NSA and it is obviously still working with the NSA, despite knowing the negative publicity this can bring. A Darwin Award goes out to anyone who still thinks that Microsoft is not helping the NSA exploit its software (because "national security" and other such excuses), despite the Snowden-provided documents that show exactly that.
Earlier today the developer of GNU Telephony wrote that at Microsoft "they created the perfect environment for such demands to be met, forced updates is a front door for govt malware and spying" [and indeed, as The Register revealed last week, they had even removed the ability to stop/block these updates in most "editions". Over ten years ago it was reported on the Web that even when you toggle off automatic updates Microsoft still does it.]
Looking back at news only a few days old, HP has reported 4 new vulnerabilities in Internet Explorer, and not for the first time. To quote IDG: "HP's Zero Day Initiative (ZDI) doesn't cut much slack with its 120-day disclosure policy. When ZDI knocks on your door and says you have a security hole, you get 120 days to fix it or risk full public disclosure. That's what happened -- again. With ZDI and Microsoft -- again. Over Internet Explorer -- again."
"The only way to avoid MSIE is to ditch Windows since it is built-in and impossible to remove" iophk said to us. Will Hill wrote: "There are still vendor supplied IE6 specific software that will not work outside of IE. One of my vendors at work told me one of their pieces of software might work with IE8 but no other browser, including the IE 11 that Microsoft had shoved onto most of the computers. This just highlights the fact that vendors who use Microsoft don’t care about their customers and that Microsoft does not care about anyone."
"In proprietary software, back doors or "national security", i.e. not real security, are the cause of many costly issues."Going only 3 days back, there is this news that Hacking Team helps governments take over Microsoft Windows through back/bug doors, exploiting fonts. "Unpatched systems," wrote Paul Hill, "can be affected if the user opens a document of webpage that contains an embedded OpenType font file. As the font drivers in Microsoft systems runs in kernel mode it means that an attacker could gain access to the entire system with the ability to add and remove programs and create new user accounts with admin privileges."
Windows recently suffered from other font-related holes, and not for the first time, either. It's an easy access point for the NSA into Windows (Microsoft tells the NSA before patching such holes). All versions of Windows are vulnerable and they have all been found vulnerable (without fixes) for decades.
What will the world look like after this back doors 'leader' and 'champion', Microsoft, is gone for good? Well, we need to ensure that NSA partners like Red Hat [1, 2, 3, 4, 5] don't compromise GNU/Linux, too. Social engineering, bribes, blackmail, anonymous patches, etc. are the classic tricks of this trade. ⬆