“8” Is Insecure By Design

Security is dependent on whose security matters. Apparently yours doesn’t if you use M$’s “8”.
“According to leaked internal documents from the German Federal Office for Information Security (BSI) that Die Zeit obtained, IT experts figured out that Windows 8, the touch-screen enabled, super-duper, but sales-challenged Microsoft operating system is outright dangerous for data security. It allows Microsoft to control the computer remotely through a built-in backdoor. Keys to that backdoor are likely accessible to the NSA – and in an unintended ironic twist, perhaps even to the Chinese.”

see LEAKED: German Government Warns Key Entities Not To Use Windows 8 – Links The NSA.

So, for all those who claim price, performance, malware, complexity and history of M$ don’t matter, how about a BIG BACK DOOR?

I recommend Debian GNU/Linux, the universal OS, that works for you, not M$ nor the NSA.

About Robert Pogson

I am a retired teacher in Canada. I taught in the subject areas where I have worked for almost forty years: maths, physics, chemistry and computers. I love hunting, fishing, picking berries and mushrooms, too.
This entry was posted in technology and tagged , , , . Bookmark the permalink.

3 Responses to “8” Is Insecure By Design

  1. dougman says:

    Its Windows, of course its insecure, all versions of Windows are insecure, otherwise why call it Windows?



    Reminds me of the hidden Admin account in Windows 7, have a surprised a few people with my ability to jump on their computer by just walking up to it and, BAM! I am in PWN’n it. 🙂


  2. oiaohm says:

    There is a lot wrong in that quoted artical about Linux. Robert.

    TPM 2.0 covers secure boot in uefi. Yes Linux foundation can support this. Yes Linux foundation did provide a keytool to replace platform key. Microsoft rejected this.

    NSA threat is mostly to Windows RT style devices where you cannot turn off platform signing or insert your own platform key. So its possible on those platforms to insert malware in the boot process that hides itself to the running OS.

    Linux does support TPM 2.0 by http://trousers.sourceforge.net/faq.html The difference is Linux world does attempt to provide end users with the tools to take complete control of it.

    The key things with TPM and Secureboot is who is in charge of the master signing keys. Governments themselves need to be.

    Yes the fact of the issue is malware bios/efi level is the worst kind of malware.

    Yes the NSA can already sign there own windows updates the key to approve those updates is in every windows computer by default. Yep run windows update get what looks like a important update apply update it loads something into your firmware/efi. The machine happens to be secureboot like Windows RT where you cannot turn it off to scan or switch to alternative boot process. You are really up the creek.

    Windows 8 default only way to unlock firmware without booting into windows is pull the harddrive if that is possible.

    bw also you might say chicken little but something strange is going on with the number of governments going Linux. They are not liking what Microsoft and OEM has done.

    OEM’s wanted lazy signing. Governments really do want full control of the hardware.

  3. bw says:

    how about a BIG BACK DOOR?

    Chicken Little ran around claiming that the sky was falling, but nobody paid any attention to him either.

    Are you seriously posing this tarbaby site as something credible? I’m ashamed of you.

Leave a Reply