Untrustworthy Computing

“To target this vulnerability, an attacker must convince a user to visit a specially crafted malicious Web page, or to open a malicious Word or PowerPoint file.

Angela Gunn

Sr. Marketing Communications Manager, Trustworthy Computing”

So, using the web as intended by visiting websites or using productivity software as intended by opening documents gets your computer owned by badguys. How is that “trustworthy” computing? Seem “untrustworthy” to me.

This is the latest example of how that other OS hides an endless stream of problems in its bloat. This is about displaying an image on your computer screen and compromising security. It is another example of how an OS designed by salesmen to sell in a desktop monopoly was not designed to deal with a hostile environment on the network and should be avoided like the plague.

At the same time, IE has been blown wide open. Using that other OS and M$’s software is like smoking inside a huge keg of black powder. No good comes of it. Use Free Software designed to work for you and not some corporation that does not care about your security.
“We will be guided by the needs of our users and the free software community. We will place their interests first in our priorities. We will support the needs of our users for operation in many different kinds of computing environments.”

see The Debian Social Contract

Isn’t that how you would like to do your computing?

About Robert Pogson

I am a retired teacher in Canada. I taught in the subject areas where I have worked for almost forty years: maths, physics, chemistry and computers. I love hunting, fishing, picking berries and mushrooms, too.
This entry was posted in technology. Bookmark the permalink.

4 Responses to Untrustworthy Computing

  1. Richard Chapman says:

    I was doing a search the other day. It was for something very odd, I don’t remember what. The search had nothing to do with celebrities, porn, fail, or anything of the sort. About 15 entries down I hit one of those “Scanning for computer viruses… FOUND 108 COMPUTER VIRUSES.” sites (Apparently it blew right by NoScript). I killed Firefox with the “Scull and Cross Bones”.

    “Trustworthy Computing” puts the exploit in the light of someone knocking on your door saying “Hey, come look at this site, now.”. Sure, there will be some of that but it’s not needed. Anything that will show up on a Google search will work.

  2. Ray says:

    But it would also make it harder to create software for other computer

  3. Much of the exploiting could come from any website with an “IMG” tag. Are we to go back to ftp to avoid that? Sites with no images are very rare these days. It just takes an IMG anywhere on a page on any website.

    The world spend $billions annually fighting malware for that other OS. Even a year free of malware in a mass migration would be worth it assuming GNU/Linux is a pushover. It’s not. That other OS tries to harden itself by randomizing locations. GNU/Linux actually puts different software in locations on a system so the malware artist has to be lucky multiple times to get in. With M$, the malware artist can count on hundreds of millions of willing victims for any recipe.

  4. oldman says:

    “So, using the web as intended by visiting websites or using productivity software as intended by opening documents gets your computer owned by badguys. How is that “trustworthy” computing. Seem “untrustworthy” to me.”

    The simple fact is, that much of the exploiting come from sites that are suspectand probably shouldnt be visited anyway. This may be an inconvenience, but it is less of an inconvenience that the forklift upgrade to completely different software running on a completely different OS that you propose as the solution.

    The irony IMHO is that it doesn’t solve the problem, just changes from one set of exploits (on windows) to another (on Linux).

Leave a Reply