This page permanently redirects to gemini://gemini.techrights.org/2011/01/06/dependence-on-software-master/.

● 01.06.11

●● Use Microsoft Windows, Get Assassinated

Posted in Free/Libre Software, GNU/Linux, Microsoft, Windows at 10:38 am by Dr. Roy Schestowitz

The Homepage of Julian Assange

=> ↺ Homepage of Julian Assange

Summary: News reports from around the world illustrate the effect of one’s dependence on a software ‘master’

ACTIVISTS who include folks like the Wikileaks hackers tend to use Free software. Encrypted decentralisation is what keeps them alive (no incentive to engage in targeted killings). Free software ensures that those who defend freedom have the necessary tools to not only work but also to defend themselves, using deterrents, anonymity, and privacy. It’s not only an idealogical choice; Free software is technically better a lot of the time, but more importantly, it has no master who wields an axe over the users. Over the years we wrote several posts explaining why those who challenge an authority — any authority for that matter — should avoid proprietary software even if it’s offered as a ‘gift’. No authority is 100% benign and history teaches that even the Nazis were under attack by some German intellectuals in the early days, before they become powerful enough to squash/imprison/assassinate/drive away all opposition.

A few days ago we found and shared a report about Iran building its own operating system, which some people suspect will be based on GNU/Linux. Now, without going into all the politics, what Iran does ought to show that the independence factor is a matter of control.

“This is Cyberwar,” writes Jan Wildeboer, “not Wikileaks.” He links to this Symantec paper about Stuxnet [PDF] (synopsis available as HTML too), which we covered in posts such as:

=> ↺ this Symantec paper about Stuxnet | ↺ available as HTML

Ralph Langner Says Windows Malware Possibly Designed to Derail Iran’s Nuclear ProgrammeWindows Viruses Can be Politically Motivated SometimesWho Needs Windows Back Doors When It’s So Insecure?Windows Insecurity Becomes a Political IssueWindows, Stuxnet, and Public StoningStuxnet Grows Beyond Siemens-Windows InfectionsHas BP Already Abandoned Windows?Reports: Apple to Charge for (Security) UpdatesWindows Viruses Can be Politically Motivated SometimesNew Flaw in Windows Facilitates More DDOS AttacksSiemens is Bad for Industry, Partly Due to MicrosoftMicrosoft Security Issues in The British Press, Vista and Vista 7 No PanaceaMicrosoft’s Negligence in Patching (Worst Amongst All Companies) to Blame for StuxnetMicrosoft Software: a Darwin Test for IncompetenceBad September for Microsoft Security, Symantec Buyout RumoursMicrosoft Claims Credit for Failing in SecurityMany Windows Servers Being Abandoned; Minnesota Goes the Opposite Direction by Giving Microsoft Its DataWindows Users Still Under Attack From Stuxnet, Halo, and ZeusSecurity Propaganda From Microsoft: Villains Become HeroesSecurity Problems in iOS and WindowsEye on Security: BBC Propaganda, Rootkits, and Stuxnet in Iran’s Nuclear FacilitiesEye on Security: ClamAV Says Windows is a Virus, Microsoft Compromises Mac OS X, and Stuxnet Runs WildWindows Kernel Vulnerability for Thanksgiving, Insecurity Used for Surveillance AgainCablegate Reveals Government Requesting Access to Microsoft Data, Kill Switches

In some of the posts above experts argued that sabotage of Iran’s nuclear programme using Stuxnet suggested a link to Israel. Given that Microsoft gives Chinese hackers access to its source code, the explanation can be even simpler than that and now that “Microsoft confirms [yet another] code execution bug in Windows” it ought to be evident that no back door is needed; there are just too many severe flaws.

=> Microsoft gives Chinese hackers access to its source code | ↺ “Microsoft confirms [yet another] code execution bug in Windows”

Microsoft has confirmed reports that several versions of Windows are vulnerable to exploits that allow remote attackers to take full control of users’ computers using booby-trapped emails and websites.In an advisory issued Tuesday, Microsoft said it was investigating “new public reports” of vulnerability in the XP, Server 2003, Vista, and Server 2008 versions of Windows. In fact, the first known report of the bug in the way those operating systems process thumbnail images came on December 15 at a security conference in South Korea. On Tuesday, exploit code was added to the Metasploit software framework for hackers.

“Dubai assassins used email trojan to track Hamas victim” says this new report from The Register around the same time that a Norwegian newspaper with access to all the raw cables from Wikileaks reveals more Israeli scandals.

=> ↺ this new report

The successful operation to kill a Hamas commander in Dubai in January 2010 followed a botched attempt by the same Israeli hit squad to kill the same target two months previously, according to reports.Assassins tried to poison Mahmud al-Mabhouh in Dubai in November 2009, but even though the unknown poison was administered it proved only debilitating and not fatal. al-Mabhouh recovered from what he thought was an illness only to be killed two months later, according to a new investigation by investigative journalist Ronen Bergman published in GQ magazine.

In response to this posting (via Glyn Moody), Wildeboer wrote: “And now Microsoft gives away free licenses to NGOs … draw your own conclusions”

Yes, we wrote about that yesterday. Activists must not use proprietary software because of the proprietor. In other security news:

=> we wrote about that yesterday | ↺ other security news

Virus writers are still sticking to the oldest tricks in the book to sucker people into downloading their malware,An email, which claims to come from Microsoft, has an attachment that says it is a Windows patch.

Never expect security from Microsoft, especially for people who are witch-hunted by those in power. The FBI too has its tool for penetrating Windows remotely and it's called CIPAV. █

=> has its tool for penetrating Windows remotely and it's called CIPAV

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.

Permalink  Send this to a friend

=> Permalink | ↺ Send this to a friend


=> Techrights

➮ Sharing is caring. Content is available under CC-BY-SA.

Proxy Information
Original URL
gemini://gemini.techrights.org/2011/01/06/dependence-on-software-master
Status Code
Success (20)
Meta
text/gemini;lang=en-GB
Capsule Response Time
281.305904 milliseconds
Gemini-to-HTML Time
1.693937 milliseconds

This content has been proxied by September (ba2dc).