Skip to comments.Germany Warns Windows 8 is Dangerous – Is Microsoft a Giant Short?
Posted on 08/22/2013 8:19:40 AM PDT by aMorePerfectUnion
"I reported that Windows 8 was dangerous. Some wrote to argue I was wrong. I wrote why NASA announced it was dumping Windows 8 and that even Skype should not be used. Microsoft has been criticized for the Prism affair."
"Now appears that Windows 8 is especially dangerous. The German government warns against Microsoft program because it has the ability to control the hardware and software of the computer. The NSA can enter you computer remotely. Has Microsoft created economic suicide?"
(Excerpt) Read more at armstrongeconomics.com ...
"Explosive, for example, the fact that the secret key generated during the manufacturing process, external to the chip and then transferred into the chip. Here it is trivial to produce a copy of all keys. It is not excluded that such laws exist and this must not be reported. The TPM chip is a dream for the NSA. Also, the other realistic scenario is that the TPM manufacturers do not sit in the range of the NSA but in China, can not really calm down. "
had to check for the humor tag
i mean, seriously. do users think operating systems are magic?
what do you think an OS does if not control the hardware and software??
Care to expand on that? I have a TPM in my machine. A TPM is an encryption device that creates a unique hash based on the configuration of the hardware in the system. That hash is 1024-bit (or longer) and is impossible to crack in any realistic or near-term time frame. If you enable the TPM with a unique password, it's more secure than any certificate or password ever could be.
Microsoft doesn't take over the TPM. The TPM is user-addressable but useless without the hardware its plugged into. Windows 8 takes over the EFI boot system, meaning you can't dual-boot your machine. That's it.
I run Linux myself. I have a Win7 machine for gaming, but I'll never upgrade to Win8. This is a bit more hysterical than technical. The BANE of the NSA is someone who uses a TPM properly. Most people don't realize they have a TPM installed in their machine. It's a personal encryption system if you know how to activate and utilize it.
Unless there's a back door you don't know about.
I've purchased my last MS OS, switching to Linux Mint.
The obvious translation is bad (hard to read).
If I understand correctly, Windows 8 comes complete with an extra part that makes remote control of the machine possible whether the device is on or off? The implication here is that this has been incorporated to better assist NSA spying. I’m sure (maybe not so sure) that, if true, Microsoft must have had other intentions for the “upgrade”. But those are not mentioned.
Microsoft is not advertising, “Let’s help the government prevent terrorism by helping themselves to all your data.” The financial suicide angle discredits the piece even if there is some validity to the claim.
I don’t doubt that Microsoft and their lobbying efforts have yielded some sack time with the devil (government). There must be more facts and info about this beyond why the German Government won’t be using Windows 8 in order to hamper NSA Spying efforts.
The only place your are safe from the NSA.
I stopped using Skype, even before the Snowden fiasco, as there was an FR article I read sometime ago that MS provided the courts with info of a Skype user w/o a warrant. When we speak to our employees in the Philippines, they use Viber and we sort of started using it.
Again, it’s not even technically feasible. The salt and hash are generated upon first power up. You can even go into your TPM mastering settings and re-generate the salt and hash. It’s a push/pop system, not FIFO, so you can’t create a secondary tunnel. It’s as secure as a VPN connection, because even sniffing the channel causes the tunnel to collapse.
I’m an Ubuntu fanboy!
Dave: Hello, HAL. Do you read me, HAL? HAL: Affirmative, Dave. I read you. Dave: Open the pod bay doors, HAL. HAL: I’m sorry, Dave. I’m afraid I can’t do that........
With an unlimited budget and access to the biggest brains in the world, you think the word impossible has any meaning?
Microsoft has had a CAPI key in their operating systems since XP. It is, ironically, called _NSAKEY. While there’s widespread speculation about its use, the naming and even the key itself is suspect. Microsoft’s had backdoors built into their systems for years. Truth is that you’re not truly safe from prying eyes unless you’re building your own OS from scratch. Next best thing: Linux!
>Most people don’t realize they have a TPM installed in their machine.
Which machines are those?
My laptop died months ago and Dells stuck W8 on it as with all the others, it is terrible.
Windows 7 was a major fix to Visa, now windows 8 is crap again
Because of its touch screen features even in non-touch the screen platforms like mine its seems to be haunted as it opens and closes windows and moves the cursor when you dont want it too, and explorer gives me endless suspicious popups .
telling you to dowload new versions of programs at link provided.
Its very difficult to tell what is going on as it was designed for a 5 year old.
McFee says everythings fine.
I have been a software engineer for over 20 years
Microsoft 8 is the first product that made me want to get violent.
Imagine if you were a garage mechanic and when you showed up for work tomorrow your boss said you had to keep getting everything done but we took all your tools and you only this hammer and this screwdriver to work with.
They were ABSOLUTE IDIOTS when they released this pice of crap.
The CLEARLY did NO comsumer product testing. NONE~!
If they had given this to a room full of secretaries and business people and said “go do what you normally do at work” they would have had people throwing chairs at them in a half an hour.
Then... when you get stuck buyin this crapware and hate it, they tell you that you can BUY a previous version of Windows 7- but you have to BUY an ‘upgrade’ to windows 8 that will let you remove it, so you can install Windows 7
I am surprised the stock has not already nose-dived
I loathe, dispose, hate, and f*rt in the general direction of Microsoft.
Gate’s only talent was that he was a very good crook.
Let me break this down.
A 1024-bit key means there are 2^1024 possible combinations of keys/codes. That’s 1.797693e^308 possible permutations. So move that decimal point to the right over 300 places.
Now, with a 2.2 Ghz Xeon processor, that’s 2.2 billion processes per second which brings us down to 8.17133^e298 seconds to process the total number of possible codes. That’s 1.3618887^e297 minutes or 2.269814^e295 hours which is 9.45756^e293 days or 2.59111^e291 years. It would take longer than the history of the universe to decrypt it assuming the last key used is the one.
Okay, so to do this in anywhere near-term, you would have to have a QUANTUM computer that could do hundreds of quadrillions of cycles per second to even come close to cracking that in a short term. There aren’t enough computers on the planet to do that at present. Do you honestly believe they’re going to waste time trying to crack a TPM key to get into your computer to find out what porn your looking at?
Actually, it may have been created by a 5 year old.
I once had lunch at a Microsoft building near Seattle. All the staff was in their 20's, with no real world experience. It was like being at a college campus.
The French police are apparently switching all their PC’s over to Ubuntu Linux.
The Federal Government is not going to allow a manufacturer to sell something they can’t hack. That is just a fact in 2013.
If you’re using Windows, go to Start > Run > type ‘mmc’
In the management console hit Ctrl+M or go to File > Add/Remove snap-in.
On the left-hand side of the list, scroll to the bottom and find TPM Management. If it’s in the list, you have a TPM.
Every motherboard from every manufacturer distributed since 2008 has one installed. They used to be optional add-on chips, now they’re soldered to the boards.
Server 2012 isn’t much better.
My Ubuntu Linux is incredibly stable, so far
Maybe, if I was foolish enough to say what I really think about things.
burn an Ubunti Linux live CD and try it out
I’ve always preferred to use Windows. But I must say, Windows 8 is their worst product yet. And the 8.1 update really does nothing to fix it.
I’m sticking with Windows 7, and hoping that they get their act together before this computer gives out.
My XP has an empty Standalone list. That’s good — right ?
With only brute force as an attack method, even 256 bit is likely forever impossible even with quantum.
However, there could always be backdoors and ‘cracks’ that make searching all permutations not necessary.
It’s technologically impossible. The IT Security industry RELIES on the defensible nature of technology. It’s why large corporations like Google are getting nervous with the Feds asking for their salt and hash algorithms.
Realize if ANY of the Class A certification authorities gave into the government, the ENTIRE cryptography industry would crumble. There’s a reason certification authorities pride themselves on trust. If any of them are cracked or hacked, they lose everything. Entrust, Thawte, Verisign: they ALL rely on the stability of their encryption algorithms.
I’ve studied cryptography for over a decade. The conspiracy theorists may be partially correct with pre-configured chipsets such as those in Cisco network hardware, but when it comes to certificates, VPN, and things like TPMs, the managers and “key holders” MUST be trustworthy or their entire network of trust collapses.
At this point, we can’t answer some pretty fundamental questions about the Universe. Where does lightning come from? Explain magnetism, and why it happens.
We aren’t as smart as you might think. We don’t know that diabetes (type 1) actually destroys islet of langerhorn cells in the pancreas. That may seem random, but I hear people RAVE about new insulins, pumps, and sensors, but the brightest minds in the space haven’t a clue about the root cause of the disease.
While I realize there is exactly ZERO shareholder interest in plumbing such a question, there are others you’d think that would be motivated to answer such a thing. I don’t see a lot of that.
In any black box created by men, and that’s what a computer is, I would agree that anything is possible.
Not sure what you mean by “standalone” list?
Now the French Police can continue with keeping secrets.
I understand you can create systems that are unbreakable with current technology. I also understand the Feds lean on manufacturers to add channels to bypass the unbreakable systems.
Call me a conspiracy theorist. I don’t care.
Being in the IT industry, I always had access to Windows server. I recently re-deployed my home network with a free copy of VMware ESXi and nothing but Ubuntu Server for my home infrastructure. I am beyond ecstatic!
No dealing with BS Windows update out of box, no dealing with malware or spyware thanks to a poorly-protected kernel. Just the core OS components I need, a natively-encrypted /home partition, and NO GUI!
I LOVE bursting the bubbles of Windows and Apple people who rely on a GUI. They ask, “How do you get to the desktop?” Ahh, the evil laugh is perfect.
I cant imagine businesses using it. It crap.
Businesses avoided vista and waited till windows 7 before upgrading XPs.
With all the problems computers can have with the internet and complexity its key to be able to have easy control over the programs and OS features on a PC.
But this kids toy appears to be a hackers dream.
Download Adobe flash player new version and who knows where it goes, I still cant get real player video free downloader to work with Firefox flash player plugin as I did before on W7, and as it works on IE.
You can find most stuff but they made it as difficult as possible
No no, I’m not saying your conspiracy theories aren’t unfounded. As a matter of fact, there was a HUGE hullabaloo a few years ago when it was revealed that Cisco’s Chinese manufacturer was installing modified iOS distros with backdoors for Chinese hackers. Cisco released several emergency updates to fix those backdoors, but the cat was out of the bag.
I agree that network hardware, most operating systems, and even your network-connected devices (laptops, tablets, phones, TVs, your FRIDGE) have backdoors. What I’m saying is that cryptography is an industry that absolutely MUST be secure. Entire industries, including the government, relies on authorities like Thawte and Verisign to provide certificates and secure connections. I’m not saying that they can’t intercept that traffic, but if it’s encrypted, it’s easy pickins for them.
The NSA even admitted that MOST of their data logging occurs on websites without SSL. I worry about FR sometimes for that reason. We’re all chatting on HTTP here at FR. That means when you login, your username and password are passed to the FR servers in cleartext. Someone could easily login as you if they wanted.
I have a touch screen and if I don’t turn it off at night, the next morning it has come out of sleep mode and zoomed in to 400%. Sometimes it switches to a different tab. I was thinking it was being remotely controlled even before all this NSA spying had been revealed.
I worked for a large medical center’s IT department. We spent weeks planning to implement a patch to the company’s thousands of XP boxes. And then we had a week of putting out fires.
The idea of upgrading to Win 7 or 8 boggles my mind.
“if it’s NOT encrypted, it’s easy pickin’s.”
Thanks. Found it.
Now what can I do with it?
“Do you honestly believe theyre going to waste time trying to crack a TPM key to get into your computer to find out what porn your looking at?”
My understanding of the article is that the key is given to them so they do not have to crack it.
The NSA controversy may have killed Silicon Valley.
Interesting. If someone wanted to destroy the American Capitalist System seems like taking out Microsoft and Apple and Google and Facebook would be an good start.
Things that make you go Hmmmmmm....
My main complaint is that XP has the familiar file search dialog (window like) box that is easy to use with lots of useful features, W7 has a moron text search box with one or two cryptic controls, and you have to do a full filename search before it gives you a 'search for text inside file' option. . I hate it.
but W7 (and W8) have a built in recorder so you can create audio files from the speaker sound lines, great for recording songs from online stations.
W8 is even LESS control friendly and more idiot appealing I suppose, and like Rusty notes it does stuff you dont want it to.
I try to move a window out of the way of another (to see both) with cursor and it maximizes it on its own blocking all the others, about five times before it does what I want..
Its like a gun that goes off based on sounds.
Try upgrading a thousand computers with hundreds of custom applications (and god knows how many private things people sneak in behind the techies backs).
You must know that MS will not be supporting XP any longer.
So they must all be upgraded, I think they call it ‘rebuilt’.
That would be a huge chore but at least you are employed and needed.
You ever think of a IA (cyber attack protection) degree to add to your work experience? Its gold.
They probably did make the switch by now. I’m glad I wasn’t there when they did.
The primary purpose is for drive encryption. I have an encrypted partition on my hard drive to which I save personal data such as bank statements, pay stubs, tax documents, etc. I also have my Firefox profile pointed to it, so if the Feds wanted to see where I’ve been browsing from my hard drive, they’d have to decrypt it first.
You can also use it to generate self-signed certificates for email non-repudiation and signing.