01.28.14

Gemini version available ♊︎

Microsoft’s Role in Political and Industrial Espionage Concealed

Posted in Microsoft at 3:15 pm by Dr. Roy Schestowitz

CCTV

Summary: Leaks reveal that Microsoft is violating the privacy of people (including politicians) while using carefully-worded responses to hide these violations

NO politician should ever use Windows and no section of the public sector should touch it in any way. It’s a huge espionage risk. Stuxnet has been sufficient proof that Microsoft is a colossal threat to one’s national sovereignty and security. Not even the US public deserves the punishment of using software with NSA back doors and quick access to one’s webcam, microphone, etc. In fact, any state CIO that chooses to go with Microsoft is either foolish or bribed (and we know for sure that Microsoft bribes people in such positions, as they are occasionally getting caught).

Earlier today, filed under “Espionage” in the Bill Gates-funded paper which seems to be more interested in protecting Microsoft much of the time (while demonising Google every day), was this article that gives Microsoft a platform. Microsoft is trying to intercept recent allegations from Australian MPs. To quote the Microsoft placement: “Parliamentary officials say Microsoft has given some assurances that electronic communications by MPs are not being accessed by American intelligence agencies through a “back door” in the IT operating systems.

“Last November during a Senate estimates hearing a senior parliamentary official left open the prospect that parliamentary communications in Australia could be monitored by US intelligence through a “back door” provided by Microsoft operating systems.”

Microsoft says there are no back doors. “OK,” says iophk, “authorized access then. It’s probably right there in the EULA” (users do offer consent for remote access). Vandalising machines would be a crime, so Microsoft just lets the thugs (FBI, NSA, CIA, police etc.) get in and do their deeds. Quoting the recent article from the Guardian and the article “Worst CIO job in Australia” iophk provides this quote: “We know that Microsoft software contains a back door which is utilised by the US NSA and Microsoft has been very active in assisting the NSA to circumvent the company’s own encryption standards.”

Yes, indeed. And how timely is this new report from IDG, quoting someone from something Microsoft calls “Trustworthy Computing” (Orwellian language). To quote: “On Friday, Adrienne Hall, general manager in Microsoft’s Trustworthy Computing Group, said in a blog post that it appeared that documents associated with law enforcement inquiries were stolen. “If we find that customer information related to those requests has been compromised, we will take appropriate action,” Hall said.

“The company will, however, not comment on the validity of any stolen emails or documents in deference to “the privacy of our employees and customers — as well as the sensitivity of law enforcement inquiries,” she added.”

OK then, so it’s confirmed. Microsoft is handing data of customers, employees, etc. to secret agencies. When this is discovered Microsoft calls it a violation (comparing it to “theft” or “stealing”), ignoring its own violations.

Let’s face it: Microsoft is an espionage company and it's a Trojan horse for the NSA. In a tyrant’s hand, Microsoft is a dream partner.

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Reddit
  • email

Decor ᶃ Gemini Space

Below is a Web proxy. We recommend getting a Gemini client/browser.

Black/white/grey bullet button This post is also available in Gemini over at this address (requires a Gemini client/browser to open).

Decor ✐ Cross-references

Black/white/grey bullet button Pages that cross-reference this one, if any exist, are listed below or will be listed below over time.

Decor ▢ Respond and Discuss

Black/white/grey bullet button If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

DecorWhat Else is New


  1. Links 22/1/2022: Skrooge 2.27.0 and Ray-Tracing Stuff

    Links for the day



  2. IRC Proceedings: Friday, January 21, 2022

    IRC logs for Friday, January 21, 2022



  3. Peak Code — Part II: Lost Source

    "Debian and Mozilla played along. They were made “Yeoman Freeholders” in return for rewriting their charters to “work closely with the new Ministry in the interests of all stakeholders” – or some-such vacuous spout… because no one remembers… after that it started."



  4. Links 22/1/2022: Ubuntu MATE 21.10 for GPD Pocket 3, MINISFORUM Preloads GNU/Linux

    Links for the day



  5. Computer Users Should be Operators, But Instead They're Being Operated by Vendors and Governments

    Computers have been turned into hostile black boxes (unlike Blackbox) that distrust the person who purchased them; moreover, from a legislative point of view, encryption (i.e. computer security) is perceived and treated by governments like a threat instead of something imperative — a necessity for society’s empowerment (privacy is about control and people in positions of unjust power want total and complete control)



  6. Peak Code — Part I: Before the Wars

    Article/series by Dr. Andy Farnell: "in the period between 1960 and 2060 people had mistaken what they called "The Internet" for a communications system, when it had in fact been an Ideal and a Battleground all along - the site of the 100 years info-war."



  7. Links 21/1/2022: RISC-V Development Board and Rust 1.58.1

    Links for the day



  8. IRC Proceedings: Thursday, January 20, 2022

    IRC logs for Thursday, January 20, 2022



  9. Gemini Lets You Control the Presentation Layer to Suit Your Own Needs

    In Gemini (or the Web as seen through Gemini clients such as Kristall) the user comes first; it's not sites/capsules that tell the user how pages are presented/rendered, as they decide only on structural/semantic aspects



  10. The Future of Techrights

    Futures are difficult to predict, but our general vision for the years ahead revolves around more community involvement and less (none or decreased) reliance on third parties, especially monopolistic corporations, mostly because they oppress the population via the network and via electronic devices



  11. [Meme] UPC for CJEU

    When you do illegal things and knowingly break the law to get started with a “legal” system you know it’ll end up in tears… or the CJEU



  12. Links 20/1/2022: 'Pluton' Pushback and Red Hat Satellite 6.10.2

    Links for the day



  13. The Web is a Corporate Misinformation/Disinformation Platform, Biased Against Communities, Facts, and Science

    Misinformation/disinformation in so-called 'news' sites is a pandemic which spreads; in the process, the founder of GNU/Linux gets defamed and GNU/Linux itself is described as the problem, not the solution to the actual problems



  14. Links 20/1/2022: McKinsey Openwashing and Stable Kernels

    Links for the day



  15. IRC Proceedings: Wednesday, January 19, 2022

    IRC logs for Wednesday, January 19, 2022



  16. Links 20/1/2022: Linuxfx 11.1 WxDesktop 11.0.3 and FreeIPMI 1.6.9 Released

    Links for the day



  17. Links 19/1/2022: XWayland 22.1 RC1 and OnlyOffice 7.0 Release

    Links for the day



  18. Links 19/1/2022: ArchLabs 2022.01.18 and KDE's 15-Minute Bug Initiative

    Links for the day



  19. When Twitter Protects Abusers and Abuse (and Twitter's Sponsors)

    Twitter is an out-of-control censorship machine and it should be treated accordingly even by those who merely "read" or "follow" Twitter accounts; Twitter is a filter, not a news/media platform or even means of communication



  20. IRC Proceedings: Tuesday, January 18, 2022

    IRC logs for Tuesday, January 18, 2022



  21. Links 19/1/2022: Wine 7.x Era Begins and Istio 1.12.2 is Out

    Links for the day



  22. Another Video IBM Does Not Want You to Watch

    It seems very much possible that IBM (or someone close to IBM) is trying to purge me from Twitter, so let’s examine what they may be trying to distract from. As we put it 2 years ago, "Watson" is a lot more offensive than those supposedly offensive words IBM is working to purge; think about those hundreds of Red Hat workers who are black and were never told about ethnic purges of blacks facilitated by IBM (their new boss).



  23. What IBM Does Not Want You to Watch

    Let's 'Streisand it'...



  24. Good News, Bad News (and Back to Normal)

    When many services are reliant on the integrity of a single, very tiny MicroSD card you're only moments away from 2 days of intensive labour (recovery, investigation, migration, and further coding); we've learned our lessons and took advantage of this incident to upgrade the operating system, double the storage space, even improve the code slightly (for compatibility with newer systems)



  25. Someone Is Very Desperate to Knock My Account Off Twitter

    Many reports against me — some successful — are putting my free speech (and factual statements) at risk



  26. Links 18/1/2022: Deepin 20.4 and Qubes OS 4.1.0 RC4

    Links for the day



  27. Links 18/1/2022: GNOME 42 Alpha and KStars 3.5.7

    Links for the day



  28. IRC Proceedings: Monday, January 17, 2022

    IRC logs for Monday, January 17, 2022



  29. Links 17/1/2022: More Microsoft-Connected FUD Against Linux as Its Share Continues to Fall

    Links for the day



  30. The GUI Challenge

    The latest article from Andy concerns the Command Line Challenge


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts