he wouldn’t be able to inject backdoors even if he wanted to, since the source code is open
Jia Tan has entered the chat
The project contains binary blobs anyway so theoretically it wouldn’t be super hard
The story does not tell us how Linus Torvalds responded to the NSA, but I’m guessing he told them he wouldn’t be able to inject backdoors even if he wanted to, since the source code is open, and all changes to it are reviewed by many independent people.
Yeah I’m guessing the answer would be more colorful based on the historical data we have
based on the historical data
There aren’t enough swear-words in the English language, so now I’ll have to call you perkeleen vittupää just to express my disgust and frustration with this crap.
Beautiful
It’s like our very own Gordon Ramsay
Also experience shows that it’s possible to backdoor software in very subtle ways that could go years without anyone spotting them. So if he had decided to he probably could have done it, despite Linux being open source.
Oh man would die to see his reply. It would probably start with something like
“The fact that I have to explain this to a person who works in a national security agency makes me really worried…”
I would pay money to see daddy Linus flip off some big shot intelligence official
Years ago there was a commit to the Linux kernal that strangly had no author. This got some attention of several of the developers.
Looking into the code that had to deal with network transmission. there was a section that if you tried to get network access in a unusual way had a check that was written something like this.
If (usr_permission = ROOT) … Instead of If (usr_permission == ROOT) …
The first giving the user root if invoked and the second checking to see if the user was root.
It’s widely thought this was the NSA or some other intelligence agency trying to backdoor lin Linux.
Or it could of been any person or country. It was a nothing burger and is still a nothing burger
speaking in burger terms as any good american
The other side of that coin is the NSA developing SELinux
This is because NSA has two roles: eavesdropping on foreign adversaries, and protecting our internal systems from adversaries. Under the first role, they might introduce an exploit known only to themselves. Under the second, they help protect US systems from exploits known to others.
And because of this it makes whatever they fuck with have unnecessary security issues.
Also though they are using it to straight up spy on you whether foreign or not. They got in “trouble” for it once and pinky swore not to do it again.
Fuck the NSA
Now they get the Brits and Aussies to do it and give them the reports.
Circa 1975, IBM proposed the cipher now called DES, the Data Encryption Standard. It became a worldwide standard for secret key encryption. As IBM originally designed it, DES had a 64-bit key. The National Security Agency (NSA) required that the key be reduced from 64 bits to 56 bits, with the other 8 bits used as a checksum. This made no sense. If a checksum were really needed, then the key could be increased from 64 to 72 bits. It was widely believed that the real reason the NSA made this demand was that it knew how to crack messages using a 56-bit key, but not messages using a 64-bit key. This proved to be true.
Secret Key Cryptography by Frank Rubin
I somehow misread that as NBA, and was very confused what basketball had to do with OS backdoors
NSA makes
WAY more sense
A OS backdoor is very simular to a backdoor cut, which allows a player to sneak behind defenders when they are focused on the ball or player with a ball.
NBA coaches have taken inspiration from many different places to perfect their plays. Computer security is just another step.
Michel jordan want to look at your browser history :D
Nope this has Kareem written all over it
good thing he’s not an American citizen
Except he is. He lives in portland now afaik
it’s over
Ohh so it’s the NSA that my failed sudos are reported to!
Recent versions of sudo changed that message and now I’m sad 😢
Damn, I’m going to miss those messages one day on my Debian stable server.
Switch to doas so feds don’t get any more reports!
nah, we have run0 at home
But nobody’s going to give them any sentence for that unfortunately.
I wouldn’t be surprised if I knew that the backdoors that appear in Windows were designed by someone. I didn’t know they were this brazen.
chips too
Examples ?
exploits regularly found in AMD and intel consumer chips
didn’t apple chips get spotted with a vulnerability also? m2s?
That’s not a hard proof, people keep saying Intel ME and AMD PSP are potential backdoors ( key word: potential ) and this argument is good if we’re arguing about: which is the best ISA, an Open ISA ( RiscV ) or closed ISA ( x86 )
I was asking for a general example, I know that Mediatek chips included a backdoor but I only found one article that talked about it … In french…
Mobos : I think it’s MSI ( I could be wrong ) that installed a piece of software through a Bios update, which showed they have privileged remote access capabilities ( I couldn’t find that source, sorry )
Another example would be ASUS and Gigabyte Mobos, now the initial source says it came from the second hand resellers, but no one confirmed that… which is scary… because that would mean it came straight from ASUS and/or Gigabyte
I was asking for incidents that you came across that could demonstrate the presence of firmware backdoors, saying having too many bugs is not a good argument, because all software has bugs.