Free Software and Security under the #NSA

Anyone claiming Free Software “does not magically make things more secure – never has, never will” without explaining how you’re so much better off at securing yourself is using truths to lie to you.

Here’s an example:

Explicit truth: it doesn’t “magically make things more secure
Hidden truth: it technically and scientifically does by exposure to peer review and the scientific method, the end results have definitely been proved more secure in average than the proprietary “alternatives”
Hidden lie: “never has, never will” It’s just piggy backing on the explicit truth in order to hide (using a true statement) that in average it does and that you’re better off.

So, if someone is lying to you so straight faced, how can you trust that person when he’s been claiming badBIOS is a myth?

The fact is it is possible, it’s installed code running on chips and it can be updated. Didn’t he himself just say that all software has security bugs when he told that being Free Software doesn’t “magically make things more secure“?

So why couldn’t these computers be compromised in such ways? In fact the NSA backdoor catalogue explicitly details BIOS level security compromises and implants! Go read this list, specially the BIOS level attacks then think for yourself upon badBIOS rather than trust people who tell you “no, that’s not it” or “just conspiracy theories”.

Those people are lying to you and they have hired a lot of security people under their wing, so of course they’d use these hired high tech spooks in order to try to discredit you…

So go watch Jacob Applebaum’s talk at 30C3, To protect and infect, part 2, rather than believing someone calling him a conspiracy theorist.

He’s publishing these findings at a respectable newspaper (Der Spiegel), the other guy is just name calling.

Which one deserves more credit? You decide.

Me, I’ll be trusting Free Software security, if anything, these NSA scandals have proven my reason, and sure they could try to insert backdoors in Free Software, but tell me, how easily can you put a backdoor where anyone can see?

Not. Easily. Not at all.

What about when most people are blinded except from the builders?

Riiight…

Here’s an example, from Jacob’s talk: Jake tells about those little USB dongles that randomly move your mouse in order to prevent the screensaver from launching… you know what Systemd now does when it finds one? Automatically locks the screen. What do Windows or MacOS do?

Riiight… you guessed it, move the mouse and prevent the screensaver from launching.

I’ll be using Free Software and so should you, but you’re your own boss.

You can choose a greater likelihood of being infected.

Could security agencies be snuffing out inconvenient people? Why wouldn’t they, huh? #nsa #truepiracy

Like Jan Wildeboer sez:

«Obviously suicide. Just two days before he would have presented how to hack pacemakers.

Too many hackers have accidentally run into such things in the past years. It’s a pattern that screams counterintelligence.»

A comment on his post on Google+ with which I agree wholeheartedly.

Counter intelligence has a history of snuffing out inconvenient people, that’s undeniable. There have been too many incidents (suicides, deaths, etc…) recently in our communities…

#lesigh… Random idiot speculates #systemd was compromised by Red Hat for the #NSA

Le sigh… it seems that in the discussion between SystemD or Upstart in Debian, a random idiot speculated that SystemD would have been adultered by Red Hat for the NSA.

Bravo, what a way to poison a sane discussion, troll.

Since it’s Free Software, how about you rebuild it from scratch and you check it out yourself whether it really and you better post some evidence, alright?

Speculating such garbage is not helpful.