This page permanently redirects to gemini://gemini.techrights.org/2015/10/08/back-doors-msft/.
Posted in Microsoft at 11:02 am by Dr. Roy Schestowitz
“Our products just aren’t engineered for security.”
–Brian Valentine, Microsoft executive
Windows are famously easy to smash
Summary: Security flaws and even blatantly obvious loopholes for surveillance are identified in several of Microsoft’s so-called ‘products’, which turn users (and their data) into the real product (to be sold to private companies or shared with spies)
THOSE who pay close attention to the news (as we typically do) have lost count of the number of Microsoft back doors, affecting a large number of products and vast number of people. The whole spectrum of application has a plethora of ways to take over PCs and intercept messages. That’s not even an accident.
Neel Gupta wrote a month ago about Microsoft and the NSA, including the way this relates to UEFI (remote takeover at hardware level, aided by secret software and keys). Gupta wrote: “As Microsoft Windows has already lost this ‘trust’ through Spams, Blackmails, _NSAKEY, and not fixing critical bugs. So Microsoft changed it’s definition of ‘trust’ in computing: devices with dedicated microprocessor designed to secure the hardware against consumers, and only allow software signed(authorized) by the device manufacturer to run on the device.”
=> ↺ wrote a month ago | ↺ Microsoft and the NSA | ↺ UEFI
“There is not even a denial that there are back doors and wiretapping (without warrant). They just excuse themselves by saying “law enforcement”.”Curiously enough, based on [1] (below), Microsoft continues to expose users on the Web, making its use of HTTPS a total sham, almost definitely by design (and intention). When users go to Outlook to read their E-mails things get even worse [2,3]. “Backdoor in Outlook Web Application operates inside target’s firewall,” to quote a Microsoft-friendly writer/publication.
Microsoft ‘privacy’ is a lie, as software like Skype serves to demonstrate. There is not even a denial that there are back doors and wiretapping (without warrant). They just excuse themselves by saying “law enforcement”. The FBI never complains about encryption in Microsoft or Windows because there is none that’s truly effective.
=> ↺ Skype
Don’t believe what the media is saying right now about Vista 10 figures (e.g. number of devices or users) because these are lies, as we explained last week (many who tried Vista 10 moved away from it afterwards).
=> ↺ Vista 10 | we explained last week | many who tried Vista 10 moved away from it afterwards
As Gupta’s SAP blog concludes: “Note that Windows XP, Vista, 7, and 8 are all going down. With the exodus from Windows, if we as SAP don’t create solutions on Linux and Mac/iOS, we will loose customers to those who do.” █
Related/contextual items from the news:
Microsoft sites expose visitors’ profile info in plain textIf you think using secure HTTP would be enough to protect your privacy when checking webmail, think again. When users connect to their Microsoft user account page, Outlook.com, or OneDrive.com even when using HTTPS, the connection leaks a unique identifier that can be used to retrieve their name and profile photo in plaintext.A unique identifier called a CID is exposed because it’s sent as part of a Domain Name Service lookup for the address of the storage server containing profile data and as part of the initiation of an encrypted connection. As a result, it could be used to track users when they connect to services from both computers and mobile devices, possibly even identifying users as their requests leave the Tor anonymizing network.Microsoft OWA falls victim to password-pinching APT attackSECURITY RESEARCHERS FROM Cybereason have sounded a klaxon over a problem with the Microsoft Outlook Web Application (OWA) that could let attackers swoop in and tag and bag data and documents through the use of APT techniques.Cybereason discovered the bug when a customer with some 19,000 endpoints suspected that it was the victim of infection.New Outlook mailserver attack steals massive number of passwordsBackdoor in Outlook Web Application operates inside target’s firewall.
Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
Permalink Send this to a friend
=> Permalink | ↺ Send this to a friend
=> Techrights
➮ Sharing is caring. Content is available under CC-BY-SA.
text/gemini;lang=en-GB
This content has been proxied by September (ba2dc).