Posted on 08/01/2017 1:50:54 AM PDT by Swordmaker
WikiLeaks latest release in their CIA Vault 7 series details a number of advanced hacking tools that fall under the title of Project Imperial. The programs Achilles and SeaPea both target MacOS while the Aeris program targets Linux based systems. The WikiLeaks release page states that CIA agents can use Achilles to, Trojan an OS X disk image (.dmg) installer with one or more desired operator specified executables for a one-time execution.
SeaPea however, acts as a MacOS rootkit, infiltrating OSX systems once theyre rebooted. WikiLeaks states that SeaPea, provides stealth and tool-launching capabilities, allowing CIA agents to infiltrate and control targets computers without their knowledge. The Linux Aeris program is a malware that attacks Linux distributions such as Debian, CentOS, Red Hat, FreeBSD and Solaris Unix. The Linux malware includes data transferring capabilities and can commit custom attacks.
(Excerpt) Read more at breitbart.com ...
Thanks to Amigatec for the headsup.
The latest Apple/Mac/iOS Pings can be found by searching Keyword "ApplePingList" on FreeRepublic's Search.
If you want on or off the Mac Ping List, Freepmail me
In english....lol what does it mean...for those of us who don’t speak computer.
>
In english....lol what does it mean...for those of us who dont speak computer.
>
It means there’s still been no arrests and convictions, let alone removal\firings of Deep State members.
Oh, you mean the toys and tools? Means no OS is safe from stupidity and a corrupt govt.
We are doomed!
No doubt, they are obeying the Constitution and obtaining warrants first...
I know just enough to be dangerous, but here goes:
- Every computer is too excruciatingly complex for human beings to efficiently control. This has been true since the advent of the digital computer in the vacuum tube era of electronics. The solution to this problem is to create programs which translate a general human command, such as store this number in that place or display this number on the screen into the excruciatingly detailed instructions required to accomplish your purpose. Such programs have to have a base of the most detailed, binary coded, instructions, and more and more general instructions which use the more detailed ones.
- The upshot is that every computer has an operating system and applications programs which make use of the functions provided by the operating system (OS) to, say, run your word processing program or your browser. There are any number of different operating systems which have been developed and used.
The simplest operating systems are made to run a single program at any one time, doing exactly what the instructions from a single user imply. You have your own computer, and you tell it what to do, right? Well, in the early days computers were big and very expensive, and if you wanted to be able to use it, you had to wait your turn. At the same time, computers were geometrically getting faster (a process described by "Moores Law but actually caused by the elasticity of the demand curve for digital electronics - and the elasticity, over time, of the supply curve). To satisfy the demand for computer time, the complexity of multi-user, multitasking was added to the criteria of what constituted a good operating system.
But the multiuser criterion in particular was a challenge, because each user needed to be able to trust all other users not to cause problems for him. Thus, the multiuser criterion added not only the requirement to rapidly switch from one task to another and another and back to the first. The multiuser criterion also added the requirement that those tasks be compartmentalized so that nothing I did as a user affected anything the computer did for you. That is, the design of a multiuser operating system requires a heightened level of paranoia on the part of the designer. And that is a good thing, for you the user. Even if you think that you alone command your computer, the robust multiuser OS is looking for trouble all the time, and trying to handle it.
And when your computer is in a network, with files (e.g., email) coming in which you do not directly supervise, the potential exists for programs to come into your computer uninvited, and to be recognized as legitimate instructions and be executed by your computer. This kind of thing even cropped up in PCs before the Internet boom put virtually all computers on a single network. In principle it is impossible to know that your computer on the web is not being spied on. You have to trust the robustness of the design of the operating system, and thus you want the most robust OS on offer for your computer. If the designer of the OS on your computer was not paranoid, you wont have the trust you need and you will be paranoid yourself. Worse, the same people who try to smuggle instructions into your computer to do nefarious things on it may attempt to practice on your paranoia to induce you to voluntarily do things on your own initiative which compromise your computer. That is called a phishing attack, and when I was using a PC I suckered for one of them, which was innocently perpetrated against me by a trusted individual who himself fell for it first.
- By far the predominant multitasking, multiuser operating system today is Unix, and derivatives thereof. Apples MacOS, also known as OS X, is Unix with an elegant graphical user interface built on top of it. Linux originated with a successful effort (by Linus Torvold) to create a version of Unix for the garden-variety PC which typically comes with Windows as its default operating system. Linux may not actually be Unix but it is a reasonable facsimile thereto. As far as is known, Unix (and its derivative, Linux) successfully prevent the network from inserting malicious code into your computer and automatically executing it.
That was far from the case with the old DOS which ran on the IBM PC and compatibles, and extending to (all 20th century?) versions of Windows which operated on top of DOS as OS X runs on top of Unix. A single user OS designed without any paranoia about malicious code being injected into the computer, DOS was a sitting duck. Anyone, let alone any government, could use malicious software to make your computer give up its secrets.
- Malicious code which can self-activate without explicit user command, and which can propagate itself from your computer to others, is called a virus. Malicious code which requires the user to give permission for it to run is called a Trojan (horse). The Mac OS is designed to give ample warning when a Trojan tries to execute. If one somehow arrives and tries to execute, you will be asked explicitly for permission to execute the program. If the Trojan is not new to Apple engineers but has been identified and its signature has been published to all Macs online, a Mac user may be explicitly warned not to run the program. Of course, people who research such things have to be able to override that warning. But for most of us it is industrial-strength stupidity to do that.
- Swordmakers point is that the revelations in the article do not change his assessment that the only way to get malicious code to run in a Mac - or a Linux box - is by physical access to the box. Either by physical intrusion, or by psychological stealth that cons the user into physically doing what prudence demands that he refrain from.
Any description of Swordmaker's prescription for malware security should include his recommendations
- that Flash be uninstalled, and
- that users of Macs should change their accounts such that they can use their Admin privilege account - which is the default account you will create on a Mac straight out of the box - only on an as-needed basis.
In http://www.freerepublic.com/focus/f-chat/2716314/posts?page=11#11 Swordmaker lays out the process to transition to operating by default in a user, rather than an admin, account.
PS: my cat also added her admiration just after I typed that, but I had to remove what she added, as her comments were untranslatable, seeing as how she inserted them into the middle of what I typed by the catly means of walking across the keyboard. Too bad, because, as usual, she was quite eloquent, and I am certain you would have liked enjoyed her feline comments.
Thank you, SM. For adding value to society by helping businessmen (is it dentists exclusively?) keep their computers up and running. And by raising the computer competence of those of us FReepers who do - or should - use Macs.Im glad you took my explanation to be reasonably accurate. I was pretty certain that I would either find a gaffe in it, or miss something that I should have said. And the latter is certainly true of my summary of your security recommendations; I should have added
I wonder what else I forgot?
- that Apple/Unix security provisions should be trusted more than available third-party security software products, such as "MacSweeper. Because third-party antivirus software does not simply add to Apple/Unix security, it requires that you turn off Apple security. It is either Apple security or Third-party security - it isnt simple addition.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.