Activity Stream
48,167 MEMBERS
62485 ONLINE
besthostingforums On YouTube Subscribe to our Newsletter besthostingforums On Twitter besthostingforums On Facebook besthostingforums On facebook groups

Results 1 to 3 of 3
  1.     
    #1
    Banned
    Website's:
    CuraShare.Net CuraShare.Me CuraShare.Info

    Exclamation FBI Added Secret Backdoors to OpenBSD IPSEC

    Okay, this is potentially very big news that really needs all the exposure it can get. OpenBSD's Theo de Raadt has received an email in which it was revealed to him that ten years ago, the FBI paid several open source developers to implement hidden backdoors in OpenBSD's IPSEC stack. De Raadt decided to publish the email for all to see, so that the code in question can be reviewed. Insane stuff.

    De Raadt received the email from Gregory Perry, currently the CEO of GoVirtual Education. Ten years ago, while he was CTO at NETSEC, Perry did some consulting work for the FBI's GSA Technical Support Center. Perry's NDA expired recently, and as such, he decided to contact De Raadt about what he had learned ten years ago.

    "My NDA with the FBI has recently expired, and I wanted to make you aware of the fact that the FBI implemented a number of backdoors and side channel key leaking mechanisms into the OCF, for the express purpose of monitoring the site to site VPN encryption system implemented by EOUSA, the parent organization to the FBI," Perry details in the email, "Jason Wright and several other developers were responsible for those backdoors, and you would be well advised to review any and all code commits by Wright as well as the other developers he worked with originating from NETSEC."

    "This is also why several inside FBI folks have been recently advocating the use of OpenBSD for VPN and firewalling implementations in virtualized environments," he adds, "For example Scott Lowe is a well respected author in virtualization circles who also happens top be on the FBI payroll, and who has also recently published several tutorials for the use of OpenBSD VMs in enterprise VMware vSphere deployments."

    De Raadt takes these allegations very seriously, and wants the code to be audited as soon as possible. Since the IPSEC stack is already quite old, and the allegations are also old, the code has gone through several revisions and the like, but still, De Raadt wants it analysed.

    "The mail came in privately from a person I have not talked to for nearly 10 years," he details, "I refuse to become part of such a conspiracy, and will not be talking to Gregory Perry about this. Therefore I am making it public so that (a) those who use the code can audit it for these problems, (b) those that are angry at the story can take other actions, (c) if it is not true, those who are being accused can defend themselves."

    If this turns out to be true, you could wonder what else has been put in open source projects. Scary thought.

    Source
    CuraHack Reviewed by CuraHack on . FBI Added Secret Backdoors to OpenBSD IPSEC Okay, this is potentially very big news that really needs all the exposure it can get. OpenBSD's Theo de Raadt has received an email in which it was revealed to him that ten years ago, the FBI paid several open source developers to implement hidden backdoors in OpenBSD's IPSEC stack. De Raadt decided to publish the email for all to see, so that the code in question can be reviewed. Insane stuff. De Raadt received the email from Gregory Perry, currently the CEO of GoVirtual Education. Ten Rating: 5

  2.   Sponsored Links

  3.     
    #2
    Banned
    haha oh wow

  4.     
    #3
    Banned
    Website's:
    CuraShare.Net CuraShare.Me CuraShare.Info

    Exclamation Microsoft Discloses Government Backdoor on Windows Operating Systems

    Here I have a document from may 2008 that shows that M$ added a backdoor for their OS:

    Microsoft Discloses Government Backdoor on Windows Operating Systems
    Posted on May 2, 2008 by zandocomm
    Wednesday, April 30th, 2008 @ 6:00 am | Privacy, News

    Microsoft may have inadvertently disclosed a potential Microsoft backdoor for law enforcement earlier this week. To explain this all, here is the layman term of a backdoor from Wikipedia:

    A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device.

    According to an article on PC World: ?The software vendor is giving law enforcers access to a special tool that keeps tabs on botnets, using data compiled from the 450 million computer users who have installed the Malicious Software Removal tool that ships with Windows.?

    Not a big deal until you keep reading: ?Although Microsoft is reluctant to give out details on its botnet buster ? the company said that even revealing its name could give cyber criminals a clue on how to thwart it?

    Stop the press for second or two and look at this logically: ?users who have installed the Malicious Software Removal tool? followed by ? Microsoft is reluctant to give out details on its botnet buster ? the company said that even revealing its name could give cyber criminals a clue on how to thwart it?, what? This is perhaps the biggest gaffe I?ve read thus far on potential government collusion with Microsoft.

    We then have the following wording: ?Microsoft had not previously talked about its botnet tool, but it turns out that it was used by police in Canada to make a high-profile bust earlier this year.? So again, thinking logically at what has been said so far by Microsoft; ?We have a tool called Malicious Software Removal tool??, ?we can?t tell you the name of this tool since it would undermine our snooping??, ?it?s been used by law enforcement already to make a high-profile bust earlier this year.?

    Remember a ?Malicious Software Reporting Tool? is a lot different from a ?Malicious Software Removal Tool?. Understanding networking, computing, botnets, let?s put this concept into a working model to explain how this is nothing more than a backdoor. You have an end user, we?ll create a random Windows XP user: Farmer John in North Dakota. Farmer John in North Dakota uses his machine once a week to read news, send family email, nothing more. He installed Microsoft?s Malicious Removal Tool. Farmer John?s machine becomes infected at some point and sends Microsoft information about the compromise: ?I?m Farmer John?s machine coming from X_IP_Address?.

    A correlation is done with this information and then supposedly used to track where the botnet?s originating IP address is from. From the article: ?Analysis by Microsoft?s software allowed investigators to identify which IP address was being used to operate the botnet, Gaudreau said. And that cracked the case.? This is not difficult, detect a DST (destination) for malware sent from Farmer John?s machine. Simple, good guys win, everyone is happy.

    The concept of Microsoft?s Malicious Software Removal tool not being a backdoor is flawed. For starters, no information is ever disclosed to someone installing the Windows Malicious Software removal tool: ?Windows will now install a program which will report suspicious activity to Microsoft?. As far as I can recall on any Windows update, there has never been any mention of it.

    ?But this is a wonderful tool, why are you being such a troll and knocking Microsoft for doing the right thing!?. The question slash qualm I have about this tool is I?d like to know what, why, when and how things are being done on my machine. It?s not a matter of condemning Microsoft, but what happens if at some point in time Microsoft along with government get an insane idea to branch away from obtaining other data for whatever intents and purposes?

    We?ve seen how the NSA is allowed to gather any kind of information they?d like (http://www.eff.org/issues/nsa-spying), we now have to contend with Microsoft attempting to do the same. Any way you?d like to market this, it reeks of a backdoor: (again pointing to the definition) A backdoor in a computer system ? is a method of bypassing normal authentication, ? obtaining access to ? , and so on, while attempting to remain undetected. There?s no beating around the bush here on what this tool is and does.

    This is reminiscent of the 90?s with the NSA?s ECHELON program. In 1994, the NSA intercepted the faxes and telephone calls of Airbus. What resulted was the information was then forwarded to Boeing and McDonnell-Douglas in which they snagged the contract from under Airbus? feet. In 1996, the CIA hacked into the computers of the Japanese Trade Ministry seeking ?negotiations on import quotas for US cars on the Japanese market?. Resulting with the information being passed off to ?US negotiator Mickey Kantor? who accepted a lower offer.

    As an American you might say ?so what, more power to us? but to think that any government wouldn?t do it to its own citizens for whatever reason would be absurd. There are a lot of horrible routes this could take.

    What happens if slash when for some reason or another the government decides that you should not read a news site, will Microsoft willingly oblige and rewrite the news in accordance to what the government deems readable?

    How about the potential to give Microsoft a warrantless order to discover who doesn?t like a President?s ?health care plan?, or who is irrate and whatever policy; Will Microsoft sift through a machine to retrieve relevant data to disclose to authorities?

    That doesn?t include the potential for say technological espionage and gouging of sorts. What?s to stop Microsoft from say, mapping a network and reporting all ?non-Microsoft? based products back to Microsoft. The information could then be used to say raise support costs, allow Microsoft to offer juicier incentives to rid the network of non MS based products, the scenarios are endless.

    Sadly, most people will shrug and pass it off as nothing. Most security buffs, experts, etc., haven?t mentioned a word of it outside of ?the wonderful method to remove, detect, botnets!? and I don?t necessarily disagree it?s a unique way to detect what is happening, but this could have been done at the ISP and NSP level without installing a backdoor. Why didn?t law enforcement approach botnets from that avenue? Perhaps they have, this I?m actually certain of which leads me to believe this is a prelude of something more secretive that has yet to be disclosed or discovered.
    http://www.pcworld.com/businesscente...t_hackers.html
    http://cryptome.org/echelon-ep-fin.htm (ECHELON MISHAPS)
    MORE ON MICROSOFT?S POTENTIAL GOVERNMENT BACKDOOR

    source: http://www.infiltrated.net/?p=91

    Horrible, talking about crime...

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. Top Secret USB Mole
    By cotufa-ssdd in forum Tutorials and Guides
    Replies: 0
    Last Post: 19th Apr 2012, 01:26 AM
  2. Secret Club Cloud?
    By Prozac88 in forum Webmaster Discussion
    Replies: 0
    Last Post: 25th Jan 2012, 12:14 AM
  3. What Secret Keys For Uploaders
    By Faze-Time in forum Webmasters, Money Making
    Replies: 5
    Last Post: 29th Sep 2011, 03:54 PM
  4. The secret behind LG !!!!
    By cyber-cliff in forum General Discussion
    Replies: 16
    Last Post: 29th Mar 2011, 04:23 PM

Tags for this Thread

BE SOCIAL