If this is your first visit, be sure to
check out the FAQ by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.
Also, anyone know how this affects linux? Is the same code used somewhere?
This affects all open-source projects by implication, even if they do not use the same source-code. The main issue is that the open-source model is based on trust (or the illusion of trust). Take that away and it doesn't work nearly as well.
The linux kernel weights at 13500000 lines of code developed by hundreds (if not thousands) of individuals, so even with peer-reviewed patches and dedicated commiters, attackers have a good chance of hiding compromising code somewhere in there. (It doesn't help that C is insecure and unverifiable by default, either).
I'm not sure what can be done about this. It might be interesting to have a few high-profile contributors inject "evil" code to test the peer-review system and then use the results to tighten security - but this also involves a loss of trust in the process.
Edit: someone should really file for a patent on backdoors. Steps:
1. file for a nice, vague patent, e.g. "a secure software system or module for enabling and managing system communication" (sounds good, doesn't it?)
2. set up a troll company
3. sue FBI, CIA, M5, Microsoft, Crypto AG and everyone else you can think of
4. deny rape allegations
5. profit!
Why not? Who can stop me from adding backdoors in my proprietary code?
This means you can't trust it, period.
Exactly. That's what we get from that. If such things happen in open code, we can not, never ever, trust code we can't see. That's why is the most stupid thing ever that the greek army (and a lot of others) uses windows as it's main platform
Why not? Who can stop me from adding backdoors in my proprietary code?
The only difference is that you (the evil attacker) cannot submit a patch directly to Microsoft unless you work there already.
The fact is that users with high security requirements cannot reasonably trust either open-source or closed-source code without a security audit. This is generally simpler to perform on open-source software and you benefit from the fact that multiple eyes have looked at the source code before (security through transparency, all crypto is based on this).
Exactly. That's what we get from that. If such things happen in open code, we can not, never ever, trust code we can't see. That's why is the most stupid thing ever that the greek army (and a lot of others) uses windows as it's main platform
I'd say that the OS is the least of the problems with this army but yeah, building all government infrastructure on closed-source code controlled by another country is probably not the brightest idea.
In this video I demonstrate a different method of exploiting the recent perf_counter vulnerability where it doesn't require a NULL mapping. The technique is...
and here is the guys Youtube channel. Phoronix should interview him.
Comment