07.07.14

Gemini version available ♊︎

Microsoft’s Propaganda Machine Tries to Shift Security Debate Amid Serious Catastrophes

Posted in Deception, Microsoft, Security, Site News at 5:34 pm by Dr. Roy Schestowitz

Summary: Observations and analysis of some recent deception in corporate news sites (like Condé Nasty), trying to pretend that Microsoft is secure, that Microsoft is pursuing security, and that FOSS and Android security or privacy are inherently poor

THE KARMA (or blowback) that Microsoft is meeting right now is a result of it sucking up (for government subsidies) to the NSA et al. for a decade and a half. Putting back doors in one’s software is not a safe bet for a business.

As longtime Internet saboteur (most recently Microsoft broke No-IP and offered no real apology, knowing perhaps it would fuel lawsuits by admission) Microsoft should never be trusted for anything Web-based. This is perhaps why China has put Microsoft’s latest Office push on the blacklist. “Yesterday,” said one article “Microsoft convinced a judge to let it take over No-IP’s DNS service, shutting down name service for many websites, in order to stop a malware attack. Today, the company fake-pologized.”

Never mind the fact that, as we explained before, the malware was partly Microsoft’s fault, for making a piece of software that’s insecure by design (and with back doors). “Microsoft’s PR mailout says that “some customers” experienced “temporary” loss of service but that everything was fine now; shortly after, the company’s PR emailed journalists again to say that things were still massively screwed up. It blamed the whole mess on a “technical error,” but when you look at what the judge believed about No-IP when the order came down, it’s clear that the “technical error” was a gross overstatement of both No-IP’s involvement in Microsoft’s woes, and the best way to sort them out.”

Notice how Microsoft is rallying so-called journalists. It is a company of liars and cover-ups. Why would anyone believe a single word?

The very fact that Microsoft was able to shut down millions of legitimate services shows just how much Microsoft corrupted its government. It used the Court for powers like hijacking a whole network. The No-IP story turned out to be far more outrageous than most people realised, as the press had been deceiving them at Microsoft’s behest. People should be fuming and Microsoft sued out of existence, but we just don’t know if this is actually going to happen. If Tux Machines was still on No-IP (as it had been for year, until recently), then it would have been one among millions of victims, potentially down for days.

Now, watch the audacity of Microsoft. With help from Gates’ fan press it pretends to be “against the NSA” and “transparent”. A lie bigger than that is hard to imagine, but this is marketing. This is part of a propaganda campaign which is going on at the moment (in many countries) and would have the gullible believe that Microsoft ‘fights back’ against the NSA, or something along those lines. One piece of propaganda was titled “Microsoft mocks NSA” and another doubts that it is “NSA-proof” (it is not, as with PRISM Microsoft can provide direct access, never mind NSLs).

Corporate media is meanwhile trying hard to push FOSS as “insecure” back into the debate. Gates’ fan press recently did this (citing familiar FOSS-hostile firms) and ‘Information’ Age conflates “proprietary” with “enterprise”, insinuating that FOSS is inherently not for enterprises (this is another type of FUD). Apparently, in addition to all that, a few lines of code (one bug) are the beginning of a new world. It’s that “Heartbleed” nonsense — a word coined by a Microsoft-linked firm for greater impact in an already-FOSS-hostile media (here is Adrian Bridgwater’s cheeky attacks on FOSS, using/exploiting news from 3 months ago, and here is another example). What corporate press rarely tells reader about “Heartbleed” is the insidious connection to Microsoft. There are those who look for bugs in old versions of Android which can leak location data because of the Wi-Fi stack, but these are not critical. “Android phones running 3.1 and newer versions of Google’s mobile operating system are leaking Wi-Fi connection histories, the Electronic Frontier Foundation has discovered,” says one source. Furthermore, says The Mukt, “Android seems to be the center of attention when it comes to mobile security concerns. In the latest, Electronic Frontier Foundation (EFF) has made claims that if you are an Android smartphones user, there is a high risk that your location history is being broadcasted to those within your Wi-Fi range.”

So basically, when it comes to FOSS there is nothing to really complain about except privacy bugs and some security bug from three months ago. As Ryan pointed out some days ago in IRC (citing IDG): “UPDATE: IBM on Monday corrected its report to say that the problem is not as widespread as originally thought. “The vulnerability affects Android 4.3 only. Thanks for the Android Security Team for correcting our advisory,” IBM said. About 10.3 percent of Android devices run Android 4.3.”

“That’s some sloppy reporting,” Ryan wrote. “First they reported that 86% of Android devices were affected by a critical security hole. Then they issued a correction, that it was only one version of Android that represents 10% of devices, and not even the latest version. We also don’t know that all Android 4.3 devices are affected, because OEMs can backport patches to their current firmware even when they don’t want to do a major Android upgrade at the moment. Archos kept backporting patches to Android 4.0 for a long time.

The original report, as far as we can tell, came from Android and Linux basher Dan Goodin. He led the way for writers, including in his former employer, to hide up an Android vulnerability. “It’s hard to exploit,” said his former employer, but in Condé Nasty it is called “serious”. This, in our view, is part of the hype which seeks to paint FOSS as ” insecure”, never mind the many back doors we now know of in proprietary software like Microsoft’s.

Just remember that Condé Nasty, and especially its writer Dan Goodin, has been on some kind of villainous Jihad against GNU/Linux for months now, distorting facts to make it seem as thought FOSS cannot be trusted.

To us it seems clear why all this FUD is being disseminated. Citing security concerns, large governments are moving away from pricey proprietary software with back doors, notably Microsoft’s. Watch Microsoft lying to governments of the world:

No backdoors in our code: Microsoft bid to convince governments

[...]

In yet another sign that the revelations about blanket NSA spying are biting into business revenue, Microsoft is offering to open up its source code to governments so they can satisfy themselves that there are no backdoors implanted.

[...]

There appears to be a fear among technology companies that if Microsoft is forced to do the government’s bidding, then American cloud businesses which operate in other countries could stand to lose a lot of business.

Snowden’s revelations have led to a drop in overseas business for at least two technology firms – Cisco and IBM. Additionally, the Boeing company lost an order from Brazil, which opted to go with Sweden’s Saab for $US4.5 billion worth of aircraft.

These are lies and Snowden’s revelations provided enough hard evidence to prove this. Expect many more attacks on FOSS from a security angle. Microsoft will try to save its cash cows, using a new ‘flavour’ of disinformation, as usual.

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Reddit
  • email

Decor ᶃ Gemini Space

Below is a Web proxy. We recommend getting a Gemini client/browser.

Black/white/grey bullet button This post is also available in Gemini over at this address (requires a Gemini client/browser to open).

Decor ✐ Cross-references

Black/white/grey bullet button Pages that cross-reference this one, if any exist, are listed below or will be listed below over time.

Decor ▢ Respond and Discuss

Black/white/grey bullet button If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

DecorWhat Else is New


  1. Links 16/1/2022: Tsunami and Patents

    Links for the day



  2. IRC Proceedings: Saturday, January 15, 2022

    IRC logs for Saturday, January 15, 2022



  3. Links 16/1/2022: Year of the GNU/Linux Desktop and Catch-up With Patent Misinformation

    Links for the day



  4. Patrick Breyer, Unlike Most German Politicians, Highlights the Fact That Unified Patent Court (UPC) and Unitary Patent Are Incompatible With EU Law

    A longtime critic of EPO abuses (under both Benoît Battistelli and António Campinos leadership), as well as a vocal critic of software patents, steps in to point out the very obvious



  5. Links 15/1/2022: Flameshot 11.0 and Libvirt 8.0

    Links for the day



  6. Blogging and Microblogging in Geminispace With Gemini Protocol

    Writing one’s thoughts and other things in Geminispace — even without setting up a Gemini server — is totally possible; gateways and services do exist for this purpose



  7. Links 15/1/2022: Raspberry Pi in Business

    Links for the day



  8. IRC Proceedings: Friday, January 14, 2022

    IRC logs for Friday, January 14, 2022



  9. Gemini Clients: Comparing Moonlander, Telescope, Amfora, Kristall, and Lagrange (Newer and Older)

    There are many independent implementations of clients (similar to Web browsers) that deal with Gemini protocol and today we compare them visually, using Techrights as a test case/capsule



  10. 2022 Starts With Censorship of Christmas and Other Greetings at the EPO

    The nihilists who run the EPO want a monopoly on holiday greetings; to make matters worse, they’re censoring staff representatives in their intranet whilst inconsistently applying said policies



  11. Links 14/1/2022: FFmpeg 5.0 and Wine 7.0 RC6

    Links for the day



  12. White House Asking Proprietary Software Companies That Add NSA Back Doors About Their Views on 'Open Source' Security

    The US government wants us to think that in order to tackle security issues we need to reach out to the collective 'wisdom' of the very culprits who created the security mess in the first place (even by intention, for imperialistic objectives)



  13. Links 14/1/2022: EasyOS 3.2.1 and Qt 6.3 Alpha

    Links for the day



  14. Scientific Excellence and the Debian Social Contract

    The Debian Project turns 30 next year; in spite of it being so ubiquitous (most of the important distros of GNU/Linux are based on Debian) it is suffering growing pains and some of that boils down to corporate cash and toxic, deeply divisive politics



  15. Links 14/1/2022: openSUSE Leap 15.2 EoL, VFX Designers Are Using GNU/Linux

    Links for the day



  16. IRC Proceedings: Thursday, January 13, 2022

    IRC logs for Thursday, January 13, 2022



  17. 2022 Commences With Microsoft-Themed (and Microsoft-Connected) FUD Against GNU/Linux

    A psychopathic Microsoft, aided by operatives inside the mainstream and so-called 'tech' media, keeps spreading old and invalid stigma about "Linux" and Free software; few people still bother responding to these fact-free FUD campaigns, which boil down to ‘perception management’ PR/propaganda



  18. Between January 2021 and January 2022 the Number of Active Gemini Capsules Nearly Quadrupled Based on Publicly-Available Catalogue of Capsules

    Geminispace has grown to about 2,000 known capsules and 1,600 of them are active, permanently online, fully accessible; in January last year these numbers were about 4 times smaller



  19. Links 13/1/2022: NetworkManager 1.34 and Everett 3.0.0

    Links for the day



  20. Links 13/1/2022: Sparky 5.16, Fwupd 1.7.4, and KDE Plasma 5.24 Beta Released

    Links for the day



  21. Call a Spade a Spade (Microsoft 'Contributions' to Linux)

    Call a spade a spade; Microsoft does not love Linux and doesn’t try to help Linux, as it’s still all about Windows and proprietary software with surveillance, back doors, and worse things



  22. No Excuses for Using GitHub Anymore

    Software developers become living witnesses to more and more reasons to abandon Microsoft for good



  23. Links 13/1/2022: Slackware Linux 15.0 RC3 and More Microsoft Aggression Against Linux

    Links for the day



  24. IRC Proceedings: Wednesday, January 12, 2022

    IRC logs for Wednesday, January 12, 2022



  25. Links 12/1/2022: IPython 8.0, Iranian Attacks on Microsoft Windows

    Links for the day



  26. Non-Fungible Membership in OSI

    The OSI tells us that it got over a thousand members, but that boils down to just people clicking a URL or a button



  27. Computing Security is Being Redefined as 'Controlled by NSA' (and Microsoft)

    The ascent of fake security or the concept that outsourcing trust to Pentagon-connected monopolies is the same as "security" is a real problem because the mindset creeps into new legislation, in effect cementing monopolies and centralisation



  28. Links 12/1/2022: GNOME 42 Alpha Near, Linux App Summit 2022 Set for Italy

    Links for the day



  29. Outsourcing Is Not Smart

    The idea that "Clown Computing" is somehow better than the status quo (of autonomy, control, sometimes self-hosting) is nothing less than pro-surveillance propaganda, which strives to declare stupidity and recklessness the new "smarts"



  30. GitHub is Unsafe: Microsoft GitHub Participation is Still a Massive Liability and a Risk

    Being a user/developer in GitHub means becoming a slave of Microsoft (herded, data-mined, and exploited for free labour); in spite of all the warnings, many people still rely on that site/centralised hub, but the tide seems to be turning


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts