Bonum Certa Men Certa

Former Novell Staff Still Pushing the Linux Foundation Into Restricted Boot Territory, Ignoring the Real Threat (Back Doors)

Greg Kroah-Hartman
Photo by Sebastian Oliva



Summary: Back doors in code, embedded in blobs, and even shoehorned into encryption is the overlooked security threat, which gets pushed aside in favour of phantom threats which Microsoft 'sells' through former Novell staff (i.e. funded by Microsoft)

A MONTH or two ago we mostly ignored exaggerated (sexed-up) reports about something called "Hand of Thief". When there's a Windows security threat the press does not call out Windows, but when it relates to GNU/Linux then tabloids like ZDNet scream from the rooftops. This thing called "Hand of Thief" is basically a malicious program which GNU/Linux users need to install themselves in order for it to do malicious things. It is not a virus, it does not spread, and it hardly even uses social engineering to get itself installed. We cited some reports which stress these facts and now comes a belated one too [1]. LynuxWorks is now offering some "Linux rootkit detector" [2] as if rootkits on GNU/Linux are a common issue. In a sense, since the Linux Foundation seems to insist on helping UEFI restricted boot, we are led to the belief that bootkits are a common threat to Linux. As the Linux Foundation's site put it, as in the words of the employee it acquired from Novell:



Now that The Linux Foundation is a member of the UEFI.org group, I’ve been working on the procedures for how to boot a self-signed Linux kernel on a platform so that you do not have to rely on any external signing authority.


Greg K-H has been working on all sorts of other kernel-level projects that help Microsoft. He did this while being paid by Novell, which was in turn being given money by Microsoft. That's the power of money. Other former Novell employees also helped promote UEFI restricted boot, as we showed before. Rogue influence by Novell in the Linux Foundation is a subject we have written about for half a decade, showing numerous examples.

The bigger security issue right now might be back doors, which might also exist in Linux, even in encryption form [3] (giving away passwords over the network for example), so hard-to-crack passwords [4] might not be enough. Microsoft's and Sony's network compromises sure reveal the massive financial effects of system intrusions, so this subject should not be taken lightly.

UEFI restricted boot is actually a security threat, not a security solution, especially when a signature is provided and managed by some rogue company in the United States -- one which has been secretly in bed with the NSA. With UEFI restricted boot, hardware can be bricked remotely. In a way, UEFI restricted boot deserves the name "unsecure boot". In some devices it can block the user from accessing his/her own computer. Nobody should promote such treacherous computing.

Related/contextual items from the news:



  1. Hand of Thief, Not
    Linux's biggest vulnerability is the software that users install with full "superuser" privileges. If you just install applications from your distro's official repository, that's not a problem. But if you download software from dubious web sites, or if you add a mysterious repository to your package manager, you're opening yourself up for an infection. Always, always make sure you know what software you are installing, why you are installing it, and where it's from.


  2. Linux rootkit detector adds hardware punch to security scanning
    LynuxWorks is stepping up the battle with the release of the first hardware-based rootkit detection system powered by the LynxSecure separation kernel. Called the RDS5201, it combats and detects stealthy advanced persistent threats. Built on the LynxSecure 5.2 separation kernel and hypervisor, this small form factor appliance has been designed to offer a unique detection capability that complements traditional security mechanisms as they try to protect against the growing number and complexity of cyber threats.


  3. RSA warns developers not to use RSA products
    In today's news of the weird, RSA (a division of EMC) has recommended that developers desist from using the (allegedly) 'backdoored' Dual_EC_DRBG random number generator -- which happens to be the default in RSA's BSafe cryptographic toolkit. Youch.
  4. How-to make hard-to-crack passwords you can easily remember


  5. Australian who boasted of hacking to plead not guilty to charges stemming from raid
    Dylan Wheeler, who claimed in February to have breached Microsoft's and Sony's networks, has not been charged with hacking




Recent Techrights' Posts

[Video] Richard Stallman on What Patents Would Have Done to Music (Covered by Copyrights)
Our WebM version can be played using Free software, independently of the availability of Invidious mirrors
Our IRC Community Turns 17 Very Shortly
A few years from now our IRC community will turn 20
Linux Foundation Buys Misleading Puff Pieces About Itself, Earns Some LLM Slop to Accompany the PR (Openwashing and Propaganda as a Service, With the Brand "Linux" Needlessly Borrowed)
Isn't it funny that after the "LF" (misusing the brand "Linux") flooded the Web with press releases and fake articles (that it had paid for) it now gets some LLM slop doing the same?
 
Slop Images Are Bad Optics, Including for Perl.org
Slop devalues one's genuine work
What Happened to the Open Source Initiative (OSI) Elections: Proprietary Software Companies in Control, the Scandals Cannot be Hidden Anymore
We'll talk about it later this month and next month
Slopwatch: Fake News About Security Using LLMs That Make Fake 'Articles' About "Linux" (With Slop for Images)
This cannot end well
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Saturday, March 22, 2025
IRC logs for Saturday, March 22, 2025
Gemini Links 22/03/2025: "Ukay Ukay", Microplastics in Tea, Jujutsu, and More
Links for the day
Links 22/03/2025: Johor Flooded, Ador Traps Young Musicians With Contract
Links for the day
Microsoft Destroys and Exploits, It Does Not Create
A race to nowhere
It's About So Much More Than 2 Microsofters, It's About Freedom to Speak About Crimes at Microsoft
Suffice to say, if some people related to our professional field attack women and get arrested for it, then there's nothing immoral about relaying this information
Links 22/03/2025: Social Security Attacks and More Attacks on the Press
Links for the day
Gemini Links 22/03/2025: INTERPOL, DDoS by "Hey Hi" Hype, and RSS/Feed Readers
Links for the day
Links 22/03/2025: Alzheimer Research and Mega-breaches in the US
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, March 21, 2025
IRC logs for Friday, March 21, 2025
Gemini Links 21/03/2025: Leasehold, LOTI, and Project Managers
Links for the day
Links 21/03/2025: Energy Facilities Under Fire (or on Fire), EU "Solidarity with Ukraine" and First Console
Links for the day
Links 21/03/2025: "IBM cuts Thousands" and Outlook Outage Again (Microsoft Looks for Excuses)
Links for the day
Gemini Links 21/03/2025: "Happy Spring" and Leaving "The Enterprise"
Links for the day
Many Articles About Layoffs Are Still Fake, Still LLM Slop, Even About IBM Layoffs
No wonder tech and tech journalism are getting so much worse
Speak More About the GNU Manifesto (40 Years Old This Month), It Helps Remind People That GNU/Linux Was Started by Richard Stallman and the Ultimate Goal is Freedom
We generally encourage people to speak about Software Freedom
Slappification: Using More SLAPP to Cover Up SLAPP and Chaining SLAPPs (From Microsoft) in a Failed Bid to Censor Techrights
How low can a person with a law degree stoop?
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, March 20, 2025
IRC logs for Thursday, March 20, 2025
Hidden from coroners and the public: tech industry cultural contagion
Reprinted with permission from Daniel Pocock