Bonum Certa Men Certa

EPO Whistleblowing: How (Not) to Use Machines at the Office

Control Risks and EPOSummary: What Control Risks and the EPO's management probably hope staff won't know and therefore, potentially, self-incriminate

STAFF of the EPO, as we noted here a few days ago, no longer trusts phones at the Office, but what about the PCs and the printers? Thankfully, having inquired for a while, we have been able to gather some information and now is a good time to share it, for the safety of EPO workers who are under the vigilant eyes of Team Battistelli and unaccountable goons like Control Risks.



"Anyone who uses an EPO computer to do anything at all is in danger," one reader told us.

“It is thus imperative that any file which is published isn't 100% identical to the original, even if it was widely distributed internally in the first place.”
      --Anonymous
"It is pretty much established that ALL user computers at the EPO are equipped with key logging software," said an anonymous person. This is apparently well understood by now. No wonder the atmosphere at work is so depressing. There have been studies conducted which explain the effect of never having any privacy, let alone a sense of privacy.

"I obviously couldn't study the currently installed machines myself," one reader told us, "but I trust my sources on this. The amount of data transmitted and stored is trivial, and putting myself in the skin of a spy, I would suppose that the logging includes the list of opened windows with the ID of the one in focus, with occasional screen captures. That's fairly easy to implement."

As some people put it, Windows is almost designed and even optimised for spying. There are many surveillance add-ons sold for it, and Vista 10 is spyware out of the box (for Microsoft to spy on every keypress and much more).

“There are commercial programs offered on the market that monitor and log any data traffic to and from attached USB ports.”
      --Anonymous
"Using hooks in the file system," a reader of ours hypothesised, "you could also check whether someone uploads a file in Chrome or Firefox for transmission, e.g. in a webmail window, so you don't even need to doctor and compromise the browsers.

"It would also be easy to scan EPO computers for an identical copy of any file which shows up on the Internet. Someone who would want to leak a document would have to store it on his/her local drive first, and that leaves traces. This wouldn't require excessive resources if you work with file signatures computed hash functions.

"It is thus imperative that any file which is published isn't 100% identical to the original, even if it was widely distributed internally in the first place."

Obviously it would be unwise to use a computer at work for subversive activities in the first place. It's safer to do so from home or some open network.

"I often work with bitmap conversions," a person once advised us, "which strips all original metadata and of any stuff which could be easily hidden in PDFs. The Adobe format is ugly and complex, and provides PLENTY of opportunities for introducing side channels, e.g. orphan objects, extra entries in character coding vectors, or even the ordering of objects within a page, which PDF linearization wouldn't defeat. Technically, you could still watermark a document using character kerning, which is harder to defeat with bitmap transformation, but this would require an infrastructure just for that, and that would require RATHER smart operators."

“One can only send a document to one's own e-mail address these days.”
      --Anonymous
Going back to the point about Windows, especially recent versions of it, it's probably not wise to use it because spying is often done by numerous parties (including Microsoft) at the same time. Personal data is later being passed around or even sold.

One reader reminds us: "There are commercial programs offered on the market that monitor and log any data traffic to and from attached USB ports. It would be slightly safer to obfuscate a file before saving it to an USB stick, but there are still traces. I know of places who use these, but I don't know if the EPO is among them. By the way, our beloved NSA files patents for "butt plugs" for insertion into USB ports."

Just to complete the picture, someone told us that if people use the machines at the Office, then "Xerox" may appear in the document producer metadata and "chances are," in such a case, "that the document was scanned on these high performance network printers which are widely used at the EPO. These used to be in open access, but current models require the user to present his ID badge in order to access the scan menu. One can only send a document to one's own e-mail address these days."

Our sources believe that computer keyboards are equipped with smart card readers, but we don't know whether the smart card must be left inserted in order to work. In any case, the screen lock delay is quite short, so one can hardly use the excuse "someone must have entered my office when I went out to take a leak".

Any public file produced by the Register or Espacenet is generated on the fly from internal bitmap images and contains metadata which could betray the IP of the requester, so sources would want to cleanse these too.

At Techrights we use various methods to eliminate or at least significantly reduce the risk of sources being found through metadata. Nevertheless, if during transmission there is identifying information and if Control Risks can observe the session, then there is risk of useful interception. We previously provided information on how to securely send data to us. Some of the above observations hopefully increase awareness of the traps and the weaknesses that are EPO-specific.

Recent Techrights' Posts

IBM Cannot Even Do Payroll, Now a "Legitimate Target" of Iran
Missiles or not, it seems like IBM systems will be targeted more by cybercriminals
Microsofters' SLAPP Censorship - Part 10 Out of 200: Showing Public Tweets is Not a Privacy Violation, But This Isn't About Justice, It's About Censorship
It's time to put a stop to this abuse of process (which is what the Judge deemed it to be last year)
 
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, March 12, 2026
IRC logs for Thursday, March 12, 2026
Gemini Links 13/03/2026: "Someone to Take Over Antenna" and Random Seed/RNG
Links for the day
By Expanding to Advocacy of Ponzi Schemes and Bill Epsteingate (Sex Trafficking), Linux Foundation Revenue Grew to $220,730,594, But Salary of Linus Torvalds Not Even in Top 10 Anymore!
true!
In the Name of Transparency, Today We Show Our Defence and Counterclaim
already uploaded by the other side
Links 12/03/2026: Heating Bills to Soar, "Banks in Gulf Evacuate Their Offices"
Links for the day
Gemini Links 12/03/2026: On Phone Anxiety and Bjorn "Looking for Someone to Take Over Antenna"
Links for the day
Cultification: best candidates avoiding Debian leader elections
Reprinted with permission from Daniel Pocock
Richard Stallman (RMS) et al Cited in 'Nature' (Journal/Site) Today, "CODE beyond FAIR"
Under Open Access
The Register MS, on Verge of Collapse, Keeps Promoting a Ponzi Scheme for China
Publishers that participate in this simply don't care about their readers
Overview of False Narratives and Lies Used to Lower Salaries at the European Patent Office (EPO), Abandoning Patent Quality and the EPC
Many of the latter slides are the same as Munich's
Links 12/03/2026: Atlassian Layoffs, GAFAN Covering up Slop-Induced Outages, "Age-verification in Operating Systems and the Internet"
Links for the day
The EPO's President, Who Covers Up Cocaine Use, is Trying to Suppress Communication Between EPO Staff Under the Guise of 'Privacy' (and in Defiance of a Court Ruling)
Why does Europe's second-largest institution: 1) curtail communication among staff (including union) and 2) go out of its way to avoid obeying a court order from ILOAT in Geneva?
Exactly One Week Before Next EPO Strike, Media Intentionally Not Mentioning EPO Strikes
One form of propaganda technique/s involves the systematic suppression of certain topics, or of particular "narratives"
Suicide of disgruntled employee? Bus fire at Kerzers / Chiètres, Switzerland, at least six dead
Reprinted with permission from Daniel Pocock
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Wednesday, March 11, 2026
IRC logs for Wednesday, March 11, 2026
Gemini Links 12/03/2026: "on Urbit" and the True Cost (or Criticism) of "Social Control Media"
Links for the day
Slop About "linux" in Google News
Once people recognise that those sites are fake it's hard to 'unsee' what they are
An American War on GNU/Linux, Software Freedom, and British Investigative, Science-Based Reporting - Part V - Attempts to Take Down and Suppress Criticism of Back Doors Controlled by Microsoft and the American Government
The cost of maintaining illusions
IBM's Payroll: Cannot Even Pay the People What They're Legally Entitled to
How financially-stressed is IBM at this point?
Slides From the European Patent Office (EPO) Explain Why They're Striking, How They're Striking, and What Comes Next
A week from now the strike will go ahead
GAFAM Datacentres Are Facilities of War, So Risk of Downtime by Missiles or State-Sponsored Cracking Has Vastly Increased
How safe is your business in "clown computing" or DCs marked as some "legitimate targets" at wartime?
Companies That Take Away Blood and Sweat From the Community to Sell a Ponzi Scheme to Everybody
We need Free software that is run by communities
1,234 People Gather Online to Plan Next EPO Strikes and Other Industrial Actions
yesterday an online gathering orchestrated the next moves by EPO staff
Links 11/03/2026: Fake Videos Swarm YouTube, "Ukraine Can Now Manufacture ‘China-Free’ Drones"
Links for the day
Gemini Links 11/03/2026: Lagrange for iOS and Android and "Turning a Folder of Git Repos Into Project Launcher"
Links for the day
Kafkaesque: Unlawful Activities in the UK to Cover Up Unlawful Activities in the United States of America
Why is bribery and even extortion seen is OK? Because rich people do those things?
Former IBM Executive, Ron Hovsepian, Doomed S.u.S.E. (SUSE)
SUSE is like a child nobody wants to raise
Quiet Layoffs or Silent Layoffs Alleged at Microsoft
Will some investigative journalists do their job now and ask Microsoft tough questions?
After a Long Lull LinuxTeck (linuxteck.com) Came Back Only as a Slopfarm
Unlike Linuxiac, LinuxTeck wasn't very active in recent years
Links 11/03/2026: EPO and USPTO Software Patents Thrown Out Again, Copyright Concerns Over Slop (Plagiarism Using Buzzwords)
Links for the day
Microsofters' SLAPP Censorship - Part 9 Out of 200: 5RB Barrister Does Not Even Know the Name of His Own Client (That He Was Paid Well Over $200,000 to 'Speak' or 'Cover' for)
If you assault women in the United States, there's a barrister available for you in the UK
IBM's Fedora is Now Led by GAFAM Slop
The official word of Fedora is partly slop
IBM 'Dinobabies' Speak Out
"They want newbies out of school at a much cheaper rate"
Links 11/03/2026: "Drill, Baby, Drill" and Social Control Media Recognised as Threat to Democracy
Links for the day
5 Years Since Freenode Conflict
IRC isn't going away
A Week Ahead of Next EPO Strike the Staff Representatives Show the Administrative Council That the Office Lost the Best Staff, It's No Longer Attractive
the message circulated regarding the open letter to the Administrative Council
Jeff Bezos as an Individual Said to Have Enough Capital to Buy IBM
Assuming a market capitalisation of 234.70 billion
Starting Soon: Another New Series About Richard Stallman
There are some inside stories we can tell
Gemini Links 11/03/2026: School, Code Slop, and "Fancy Weapons"
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Tuesday, March 10, 2026
IRC logs for Tuesday, March 10, 2026