Author
|
Thread |
|
|
|
Chris Klaren
Joined: 13 Jan 2004
Posts: 82
Location: Iowa2/17/15 8:58 AM |
How can anyone really be surprised? The boundaries of privacy were ripped down with the Patriot Act, and this is just a logical continuance (unfortunately not even a conclusion) of it.
|
|
|
|
|
|
|
|
walter
Joined: 11 Jan 2004
Posts: 4391
Location: metro-motown-area2/17/15 9:09 AM |
for me it's not about the privacy
privacy is a myth.
i'm amazed at how far they've taken this capability and how far back it goes.
|
|
|
|
|
|
|
|
dddd
Joined: 11 Jan 2004
Posts: 3345
Location: NorCal2/17/15 1:07 PM |
When stories like this hit such mainstream news outlets as this one, it's all about some message being sent, not about "reporting news".
So it's up to the imagination to proffer a reason for any story's content and timing.
Who knows, maybe they're trying to scare who-knows-who.
|
|
|
|
|
|
|
|
cranky
Joined: 20 May 2004
Posts: 146
2/17/15 4:25 PM |
Reminds me of something Wayne Lim wrote here years ago: "Privacy is a discipline, not a right." Not saying he's correct, but I will say it's a practical way of thinking.
--Cranky
|
|
|
|
|
|
|
|
sandiway
Joined: 15 Dec 2003
Posts: 4902
Location: back in Tucson2/17/15 4:53 PM |
lack of detail
There is a lack of detail in the report. And I read the Kaspersky lab report.
There is a lack of detail there too.
I want to know how compromising the HDD firmware can lead to the computer being taken over but it's not clear how this works, new ATA functionality or commands perhaps?
It seems most of the NSA code is Windows-specific. Terrorists, please take note and use a Mac.
However, there is some evidence from the browser compromises, DOUBLEFANTASY works on both macs and windows. Is Webkit itself compromised? But again, there is a lack of detail for me to see what exactly happens.
Frustrating...
Sandiway
|
|
|
|
|
|
|
|
Steve B.
Joined: 19 Jan 2004
Posts: 769
Location: Long Island, NY2/17/15 8:19 PM |
I think the bigger question is not how compromising a machines "DOS" allows the computer to be be compromised, but whether your basic anti-virus looks at the computer BIOS or DOS at all, to determine whether a machine is infected. Or is it only looking at the OS and software.
It seems a simple matter that once you've taken control of the DOS, you now can examine what's stored, as well as where and how.
If they did this to countless disk manufacturers DOS, did they also do this to many fewer manufacturers BIOS.
|
|
|
|
|
|
|
|
|
dddd
Joined: 11 Jan 2004
Posts: 3345
Location: NorCal2/17/15 10:16 PM |
I don't remember what agency that it was reported had forced printer manufacturers to include stealth owner identification algorithm that put i.d. markes on each printout, but it seems to me that if they could similarly require OS vendors to include back-door weaknesses that allow this kind of snooping, then here we are.
But the most powerful snooping capability is going to be the one that WaPo or whoever won't be telling us about.
|
|
|
|
|
|
|
|
Brian Nystrom
Joined: 26 Jan 2004
Posts: 5101
Location: Nashua, NH2/18/15 6:25 AM |
Are SSDs susceptible, too?
Is there enough of a difference in their code to avoid infection?
|
|
|
|
|
|
|
|
Jesus Saves
Joined: 16 Jun 2005
Posts: 1150
Location: South of Heaven2/18/15 9:22 AM |
China's 2 leading tech firms, Huawei & ZTE, security thr
It's not just the USA, but other countries like China, too.
Just think of all of the domestic branded electronics that are actually manufactured overseas. Imagine that?!?
News circa 2012...
http://www.theguardian.com/technology/2012/oct/08/china-huawei-zte-security-threat
Is this jingoism or a real threat? You decide, but if it is the latter, I recommend you don't reply so on your Android device. I am amazed at how much information Google collects from me using my phone.
Maybe we should all start to consider living off the grid like Jimmy McGill's brother. Or not.
|
|
|
|
|
|
|
|
ErikS
Joined: 19 May 2005
Posts: 8337
Location: Slowing boiling over in the steamy south, Global Warming is real2/18/15 6:23 PM |
DOD
We have ripped out all kinds of tech because of where the boards where made. From simple VGA projectors to entire desktops, even interior office lighting timer/controllers.
We buy only approved IT from very limited suppliers and none of it gets delivered to the end users until the cyber geeks have it for quite some time. I am sure to take the consumer spyware off and to put DOD stuff on there. The end user has NO control of the machine. I can't even install an approved printer.
|
|
|
|
|
|
|
|
April
Joined: 13 Dec 2003
Posts: 6593
Location: Westchester/NYC2/18/15 8:47 PM |
quote:
Is this jingoism or a real threat?
BOTH!
Just look at what Snowdon's leak taught us. If the US government can try to pressure US companies to add in back doors, why do you think the Chinese government will be any less aggressive?
The Republican-controlled "committee" tried to paint that risk as a result of a few Chinese military engineers. That's laughable. With or without those engineers with military background, the Chinese government could easily "persuade" the company into adding some spyware, just like their US counterpart did!!!
The cynics in me wonders if the "committee" had to go to such length to highlight the so-called military connection in the Chinese companies, because they didn't want the public to get wind of the US government doing the same here.
Until Snowdon blow all that into the clear, that is. WE now know all governments do it!
|
|
|
|
|
|
|
|
PLee
Joined: 08 Dec 2003
Posts: 3713
Location: Brooklyn, NY2/19/15 9:06 AM |
And a major antivirus software supplier is Kaspersky, based out of Russia. Where someone has been hacking major bank systems for a while and have walked away with an estimated $1 billion.
Kaspersky came with my laptop and I didn't bother activating it. When I finally broke down and tried to download it from their website, I got so much crap loading onto my laptop that I killed it and had my IT guy get every last scrap of that program out of my system. I think it's been purged, but who knows what's been left behind . . .
|
|
|
|
|
|
|
|
Jesus Saves
Joined: 16 Jun 2005
Posts: 1150
Location: South of Heaven2/19/15 12:23 PM |
Is your laptop a Lenovo, PLee?
Lenovo to stop pre-installing controversial software
BEIJING (Reuters) - China's Lenovo Group Ltd, the world's largest PC maker, said on Thursday it will no longer pre-install software that cybersecurity experts said was malicious and made devices vulnerable to hacking.
http://finance.yahoo.com/news/lenovo-stop-pre-installing-controversial-152140699.html
|
|
|
|
|
|
|
|
PLee
Joined: 08 Dec 2003
Posts: 3713
Location: Brooklyn, NY2/19/15 1:53 PM |
Nope. Sony VAIO. The problem was that the Kaspersky website was infested with malicious popups that started downloading stuff when you tried to close them.
|
|
|
|
|
|
|
|
April
Joined: 13 Dec 2003
Posts: 6593
Location: Westchester/NYC2/19/15 3:53 PM |
Kind of ironic
...Cyber security software download site infested with malicious software.
|
|
|
|
|
|
|
|
Andy M-S
Joined: 11 Jan 2004
Posts: 3377
Location: Hamden (greater New Haven) CT2/19/15 3:57 PM |
Perhaps
...it's time to re-watch The Net.
|
|
|
|
|
|
|
|
dfcas
Joined: 11 Jan 2004
Posts: 2815
Location: hillbilly heaven2/19/15 7:43 PM |
Nah, it's not historically accurate. :)
|
|
|
|
|
|
|
|
|
ErikS
Joined: 19 May 2005
Posts: 8337
Location: Slowing boiling over in the steamy south, Global Warming is real2/20/15 5:42 AM |
It is embarrassing to learn just how much my government has chosen to ignore the very constitution I swore to give my life to protect and uphold. To blanket hack our devices across the board is not what was intended by the Patriot Act. It was supposed to make it easier to track the bad guys. So the government just attacks everyones' privacy with no reason. It is not right at all.
I have nothing to hide but I do have the right to privacy as granted in the 4th amendment.
Amendment IV
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
|
|
|
|
|
|
|
|
walter
Joined: 11 Jan 2004
Posts: 4391
Location: metro-motown-area2/20/15 7:43 AM |
sadly
the only way to get something that even approaches the appearance of privacy is to operate in paper-only mode. once something is electronic, privacy is no longer possible.
Last edited by walter on 2/20/15 7:54 AM; edited 1 time in total
|
|
|
|
|
|
|
|
dfcas
Joined: 11 Jan 2004
Posts: 2815
Location: hillbilly heaven2/20/15 7:48 AM |
I'm surprised that neither party supports privacy rights in this case. Seems to me there may be a lot of votes available but neither side is willing to give up this invasion of privacy, or throttle it in any way.
To me, electronic invasion is no different than home invasion.
|
|
|
|
|
|
|
|
walter
Joined: 11 Jan 2004
Posts: 4391
Location: metro-motown-area2/20/15 7:53 AM |
the risks from the teabaggers/right are too great...
...of being labeled a traitor and somehow friendly to the extremist islamists.
to face that backlash and fight the well-funded lobbyists of the military-industrial complex, that's sadly a political non-starter.
|
|
|
|
|
|
|
|
dfcas
Joined: 11 Jan 2004
Posts: 2815
Location: hillbilly heaven2/20/15 9:59 AM |
Is it safe to assume they are bugging every land line conversation in the US? Why not...Every fax that is transmitted? I do wonder why fax still exists.
|
|
|
|
|
|
|
|