Bonum Certa Men Certa

Corporate Media Blames 'China' and 'Open Source' for Back Doors in Microsoft's Intentionally Flawed Proprietary Software That's Causing Chaos



Corporate media has long helped Microsoft distract the public, oftentimes leveraging nationalism to achieve this

The red flags



Summary: 'Red Scare' tactics are being used to divert attention away from Microsoft's incompetence and conspiracy with the NSA (to put back doors in everything, essentially making all software inherently vulnerable, by design)

LAST month we published our hospital series. It was about hospital managers and media, in cohesion, blaming or punishing Microsoft's competition for Microsoft's own failings. Hospitals are being taken out of service because of Microsoft and somehow, perhaps miraculously, everything gets blamed except Microsoft. It's part of a media cover-up and hospital blame-shifting pattern.



"It's almost as though someone is in deep denial about the nature of the real culprit, instead blaming people who exploit the holes (as they can)."It's barely surprising to hear -- as I did earlier this week -- that: "An analysis of the ongoing massive cyber attack on Australia finds mostly Microsoft vulnerabilities exploits."

The official page speaks of "tools copied almost identically from open source."

They focus on how the exploits were put together, not the holes that they exploit. But this part is telling: "During investigations, a common issue that reduced the effectiveness and speed of investigative efforts was the lack of comprehensive and historical logging information across a number of areas including web server request logs, Windows event logs and internet proxy logs. The ACSC strongly recommends reviewing and implementing the ACSC guidance on Windows Event Logging and Forwarding and System Monitoring."

This part is pretty clear about Windows being the issue. "Stop public spending on Microsoft," the person who highlighted to to me said. "Public Money, Public Code. Media blames China." The above page also link to this page: "The actor has been identified leveraging a number of initial access vectors, with the most prevalent being the exploitation of public-facing infrastructure — primarily through the use of remote code execution vulnerabilities in unpatched versions of Telerik UI. Other vulnerabilities in public-facing infrastructure leveraged by the actor include exploitation of a deserialisation vulnerability in Microsoft Internet Information Services (IIS), a 2019 SharePoint vulnerability and the 2019 Citrix vulnerability."

IIS, SharePoint, Citrix...

It's almost as though someone is in deep denial about the nature of the real culprit, instead blaming people who exploit the holes (as they can). Not the people are blamed but the tools. Or sometimes the people, especially if they "foreigners"...

Another person highlighted to us this new piece which he says demonstrates "Windows TCO," albeit it is "Microsoft marketeering spam" because it sort of rewrites the history of Maersk incidents, which years ago the media said had a major catastrophe due to Windows. This page entitled "Maersk, me & notPetya" says: "Within a couple of hours, it was clear this had impacted every single domain-joined Windows laptop, desktop, virtual machine and physical server around the planet."

So Windows, with its notorious NSA back doors (for which there are remote access tools -- tools which leaked online), is the actual culprit. Maybe stop using something which you know to be flawed (and often by design)?

Recent Techrights' Posts

Web Monopolist, Google, 'Pulls a Microsoft' by Hijacking/Overriding the Name of Competitor and Alternative to the Web
Gulag 'hijacking' 'Gemini'
Forging IRC Logs and Impersonating Professors: the Lengths to Which Anti-Free Software Militants Would Go
Impersonating people in IRC, too
GNU/Linux Popularity Surging, So Why Did MakeUseOf Quit Covering It About 10 Days Ago?
It's particularly sad because some of the best articles about GNU/Linux came from that site, both technical articles and advocacy-centric pieces
 
Links 05/12/2023: Debt Brake in Germany and Layoffs at Condé Nast (Reddit, Wired, Ars Technica and More)
Links for the day
[Meme] Social Control Media Giants Shaping Debates on BSDs and GNU/Linux
listening to random people in Social Control Media
Reddit (Condé Nast), Which Has Another Round of Layoffs This Month, Incited People Against GNU/Linux Users (Divide and Rule, It's 2003 All Over Again!)
Does somebody (perhaps a third party) fan the flames?
Who Will Hold the Open Source Initiative (OSI) Accountable for Taking Bribes From Microsoft and Selling Out to Enable/Endorse Massive Copyright Infringement?
it does Microsoft advocacy
Using Gemini to Moan About Linux and Spread .NET
Toxic, acidic post in Gemini
Links 04/12/2023: Mass Layoffs at Spotify (Debt, Losses, Bubble) Once Again
Links for the day
ChatGPT Hype/Vapourware (and 'Bing') Has Failed, Google Maintains Dominance in Search
a growing mountain of debt and crises
[Meme] Every Real Paralegal Knows This
how copyright law works
IRC Proceedings: Sunday, December 03, 2023
IRC logs for Sunday, December 03, 2023
Links 04/12/2023: COVID-19 Data Misused Again, Anti-Consumerism Activism
Links for the day
GNOME Foundation is in Reliable Hands (Executive Director)
Growing some good in one's garden
Links 03/12/2023: New 'Hey Hi' (AI) Vapouware and Palantir/NHS Collusion to Spy on Patients Comes Under Legal Challenge
Links for the day
'Confidential Computing'? More Like a Giant Back Door.
CacheWarp AMD CPU Attack Grants Root Access in Linux VMs
IRC Proceedings: Saturday, December 02, 2023
IRC logs for Saturday, December 02, 2023
Links 03/12/2023: CRISPR as Patented Minefield, Lots of Greenwashing Abound
Links for the day