Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Microsoft and Mac OS's are tapped

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU
 
thunder rising Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 06:14 PM
Original message
Microsoft and Mac OS's are tapped
Edited on Mon Aug-06-07 06:37 PM by thunder rising
I'm just going to make the assertion and then let the chips fall where they may.

If ATT, Verison, etc had to cooperate with the Fed, why do you think that Microsoft and Apple are any different?

The Feds don't want to discuss WHAT they are doing 'cause it's sitting on your desk and you own computer is working for them.

Linux...open source...Ubuntu it's the only way to be sure.

The major reason why I make the assertion is the LACK of conversation about it. And indeed, this little entry certainly brought out the nay sayers with just as much proof against the statement as I have for it.

If it is not so let AGAG come out and state under oath that the US Gov has not forced the OS companies to bug their own software.
Printer Friendly | Permalink |  | Top
jgraz Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 06:19 PM
Response to Original message
1. OS X is open source as well
At least up to the core graphics level. If they've tapped it, it's not done in the kernel.
Printer Friendly | Permalink |  | Top
 
Deja Q Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 06:36 PM
Response to Reply #1
7. Wouldn't need to be done in the kernel.
:evilgrin:
Printer Friendly | Permalink |  | Top
 
jgraz Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 06:38 PM
Response to Reply #7
11. They'd have to be verrry sneaky
There's about 800 engineers who have access to every line of that code. I was there through 2003 and we were never kept out of any of the mainline OS code.
Printer Friendly | Permalink |  | Top
 
thunder rising Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 06:44 PM
Response to Reply #11
14. I would think that a fix in the Compile/Link stage could do the trick
And very few people would be wiser. You remember they control the entire process not just the source itself.
Printer Friendly | Permalink |  | Top
 
jgraz Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 06:44 PM
Response to Reply #14
17. That would be news to me
Since I ran the Compiler/Linker team. :rofl:
Printer Friendly | Permalink |  | Top
 
thunder rising Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 06:53 PM
Response to Reply #17
23. And my mother is the Queen of England
Printer Friendly | Permalink |  | Top
 
jgraz Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 07:04 PM
Response to Reply #23
28. This one's a bit out of date, but you get the idea
Edited on Mon Aug-06-07 07:04 PM by jgraz
http://homepage.mac.com/jgraz/jgrazResume.html


I'll say HI to your mom the next time I'm in London. ;)
Printer Friendly | Permalink |  | Top
 
thunder rising Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 07:16 PM
Response to Reply #28
32. AGAG has a resume too. Big deal.
Even if we took your resume at your word.
Does it mean anything to the blog? AGAG has a resume too. Big deal.

Would it not be in your best interest to close this discussion down?

The only way out of this is for AGAG to make a statement that there is no such thing in operation or planning by the US Gov.
Printer Friendly | Permalink |  | Top
 
jgraz Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 07:22 PM
Response to Reply #32
36. Congratulations, you've completely stopped making sense
Must be all that inbreeding in the british royal family.
Printer Friendly | Permalink |  | Top
 
Prisoner_Number_Six Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 07:20 PM
Response to Reply #11
34. Remember the infamous "NSAKey"?
They ARE verrrrrrrrrrrrry sneaky.

http://en.wikipedia.org/wiki/NSAKEY
Printer Friendly | Permalink |  | Top
 
thunder rising Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 06:54 PM
Original message
Agreed! Anthing that gets control of the processor control stream.
Printer Friendly | Permalink |  | Top
 
REP Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 06:20 PM
Response to Original message
2. Explain how that works
I could use a good laugh.
Printer Friendly | Permalink |  | Top
 
skids Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 06:50 PM
Response to Reply #2
20. Well, if you're up for it...
Here's an interesting discussion about how one could even manage to install a back door into an opensource OS, which is why it is important to get your distro files from places/people you feel you can trust, check your MD5s, and why those who really need to be completely confident do as pure a sourcecode bootstrap of their compiler as they can afford to do and run on obscure hardware.

As far as "tapping" goes it is most certainly possible for it to be done both in the network driver layer, and in the network hardware firmware. A simple routine to fire up a paratrace-like mechanism when triggered by odd-but-legal TCP flag combinations on an existing connection would be a pretty subtle method that would elude easily most firewalls, many IDSs, and naivigate NATs with zero effort, and the "magic words" could be injected either by the other endpoint or anywhere packet modification or spoofing capabilities are poorly secured or intentionally available.

How much you worry about it depends entirely on how much tinfoil you care to wear on your head, but by the same token, just because you are paranoid doesn't mean they aren't out to shaft you, and an ounce of prevention is worth a pound of cure.

I don't even trust MS to handle keeping my data safe from its coder's mistakes, much less the NSA, and personally I think people are fools to use that crap. But they seem to think it is intuitive (I find it far from that.) Then of course these are the same people who manage their bank accounts over an unencrypted wireless AP they slapped onto their cable modem with no clue what they were doing.

Printer Friendly | Permalink |  | Top
 
thunder rising Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 06:58 PM
Response to Reply #20
26. Thanks for that. Like I said, I'm just making an assertion
that for MS and Apple would be next to impossible to prove.
Printer Friendly | Permalink |  | Top
 
high density Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 06:23 PM
Response to Original message
3. I'm going to assert that...
Edited on Mon Aug-06-07 06:24 PM by high density
... you do not have any idea in regards to what you are talking about.
Printer Friendly | Permalink |  | Top
 
thunder rising Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 06:26 PM
Response to Reply #3
4. TBP TX-Theta '85 do you know what you're talk'n 'bout?
Printer Friendly | Permalink |  | Top
 
high density Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 06:30 PM
Response to Reply #4
5. Why don't your prove your assertion
with things like packet logs or some other proof that Windows and/or Macs are "tapped."
Printer Friendly | Permalink |  | Top
 
thunder rising Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 06:33 PM
Response to Reply #5
6. Why don't they PROVE otherwise
MS and Apple OSs are closed source. It would be hard for me to prove without quite a few years of reverse compiling.

It's the problem with closed source OSs. You never know what your getting.
Printer Friendly | Permalink |  | Top
 
REP Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 06:37 PM
Response to Reply #6
9. you could explain how the "tapping" might work
It would provide moments of amusement.
Printer Friendly | Permalink |  | Top
 
REP Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 06:37 PM
Response to Reply #6
10. you could explain how the "tapping" might work
It would provide moments of amusement.
Printer Friendly | Permalink |  | Top
 
thunder rising Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 06:39 PM
Response to Reply #10
12. Ever get that little dialog that says
An Error has occurred and the OS would like to call home.

What if there's one that doesn't ask?
Printer Friendly | Permalink |  | Top
 
Prisoner_Number_Six Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 07:23 PM
Response to Reply #12
37. That can easily be disabled.
:shrug:
Printer Friendly | Permalink |  | Top
 
LibertyorDeath Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 06:42 PM
Response to Reply #6
13. Correct me if I'm wrong but you're saying

because they're closed source

we should assume that they are tapped.

That's a Wise assumption IMO....

http://www.ubuntu.com/




Printer Friendly | Permalink |  | Top
 
high density Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 06:44 PM
Response to Reply #13
15. Have you guys done a code review on every line of code in every package in Ubuntu?
Edited on Mon Aug-06-07 06:44 PM by high density
And then compiled it yourself? Because if not and at your paranoia level, Ubuntu might as well be as closed as Windows.
Printer Friendly | Permalink |  | Top
 
thunder rising Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 06:51 PM
Response to Reply #15
22. I don't work for or with Ubuntu
It's a Debian distribution. The Debian philosophy is pristine compilation of every unit from the CVS libs. And all over the world every line of code in LINUX is reviewed.
Printer Friendly | Permalink |  | Top
 
thunder rising Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 06:59 PM
Response to Reply #13
27. BINGO!!! And they are used without question all over the world!
Printer Friendly | Permalink |  | Top
 
Deja Q Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 06:36 PM
Response to Reply #5
8. But reality checks are soooooo annoying!
:wow:
Printer Friendly | Permalink |  | Top
 
thunder rising Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 06:46 PM
Response to Reply #5
18. I really don't care if you believe it or not
It's just a credible assertion made by looking at the extent that the FEDs are taking to tap the world.

And let's face it ... this is a BIG JUICY PEACH.
Printer Friendly | Permalink |  | Top
 
high density Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 06:54 PM
Response to Reply #18
24. No, it's not a credible assertion
until you put some FACTS up behind it. I wish the mods would move this BS to the lounge.
Printer Friendly | Permalink |  | Top
 
thunder rising Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 07:05 PM
Response to Reply #24
29. skids up thread has proof it can be done
even on LINUX. So, if not a credible assertion then it is a valid opinion.

Here's a trivia question: why was UNIX designed from the start with multi-user multi-tasking security?

The story has it that Ken Thompson, Dennis Ritchie were playing an interactive game an instead of playing the game they started hacking each other. So they designed in security from the start.
Printer Friendly | Permalink |  | Top
 
high density Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 07:18 PM
Response to Reply #29
33. Of course it CAN be done
Edited on Mon Aug-06-07 07:18 PM by high density
Every spambot out there operates in this fashion. I want the proof that Windows has stuff that is BUILT-IN which "phones home" to the FBI/NSA/whatever.
Printer Friendly | Permalink |  | Top
 
thunder rising Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 07:31 PM
Response to Reply #33
39. QED! checkmate n/t
Printer Friendly | Permalink |  | Top
 
high density Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 07:51 PM
Response to Reply #39
41. I'm still waiting for those packet caps of stuff flowing to the FBI, Mr. Checkmate
:crazy:
Printer Friendly | Permalink |  | Top
 
GoneOffShore Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 08:00 PM
Response to Reply #24
42. Nooooo, don't move it to the Lounge!!
We're having too much fun over there.

I think I'm going to change my sig lines to include: Absence of evidence IS evidence of absence unless you can show me fairy poo and fairy predators as circumstantial evidence.
Printer Friendly | Permalink |  | Top
 
high density Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 08:12 PM
Response to Reply #42
44. Huh?
Edited on Mon Aug-06-07 08:13 PM by high density
"I'm just going to make assertion" from one poster on the internet is enough evidence for you? Sorry, I tend to need a bit more evidence beyond that.

The bullshit flowing through this thread is no different from Bush in 2002 telling us that Iraq is a threat, involved in 9/11, and has WMDs up the ying yang. That was his assertion. It wasn't a correct assertion, but that's how it played out.
Printer Friendly | Permalink |  | Top
 
GoneOffShore Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 09:02 PM
Response to Reply #44
47. You missed the sarcasm didn't you?
I guess that's why you chose the handle you did.
Printer Friendly | Permalink |  | Top
 
MalloyLiberal Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 08:27 PM
Response to Reply #3
46. Recommended 50000 times
Printer Friendly | Permalink |  | Top
 
toddaa Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 06:44 PM
Response to Original message
16. Layer 4 OSI
Do you know what that is?
Printer Friendly | Permalink |  | Top
 
thunder rising Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 06:49 PM
Response to Reply #16
19. The old OSI seven layer model
been there done that. And your point is?

Anybody implement all seven layers yet? I got out of it years ago ... it was boring.
Printer Friendly | Permalink |  | Top
 
toddaa Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 07:05 PM
Response to Reply #19
30. Tech is boring
Fear mongering and unsubstantiated conspiracy theory is a lot more fun.

The quickest way for you to stop looking like an idiot is to post some packet traces from a Windows or Mac proving that there are nefarious bits in the stream.

Put up or shut up.
Printer Friendly | Permalink |  | Top
 
thunder rising Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 07:22 PM
Response to Reply #30
35. Sure is a lot of bating going on
For a bunch of people that would generally state that Gates is evil and MS is the ruin of CS on any other thread.

Like I said it's just an assertion based on the extent that the Feds are going to tap us and "Deep Modems" assertion that "it's not just email", think outside the box for a minute.

The message out could be as simple as a single bit buried in a transmission. You know, one of the "reserved bits" that nobody uses.
Printer Friendly | Permalink |  | Top
 
toddaa Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 07:50 PM
Response to Reply #35
40. That shouldn't take too long
XOR the reserved bits "nobody uses" and post the results. I'm on the edge of my seat.
Printer Friendly | Permalink |  | Top
 
Nomad559 Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 06:51 PM
Response to Original message
21. The NSA has bugged my software
Printer Friendly | Permalink |  | Top
 
MazeRat7 Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 06:58 PM
Response to Original message
25. This is just silly....
Log all your outbound traffic from your net if you think there is something fishy going on with one or more of your systems and be sure to block all inbound requests. I do. We have all three of the OS's mentioned above running here at the house. I routinely check the outbound connections for anything that looks odd and check the dropped packet (connection) list to see who is trying to connect in. I do this mostly to make sure some cleaver soul has not decided to "phone home" as you put it with information I did not authorize to be sent.

That aside, The deal with ATT and Verison is about capturing all that traffic. In effect doing the same thing I do locally (capturing all inbound/outbound headers and packet details before it leaves my net) they can do upstream at the ISP. No need to "tap" my computer when they can get the same information from my ISP and avoid having to be "cleaver" and hide malicious code from us annoying software engineers.

MZr7
Printer Friendly | Permalink |  | Top
 
thunder rising Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 07:12 PM
Response to Reply #25
31. Then you feel safe. Good for you.
I have worked with some very clever people that would be the first to say, "I don't know everything."

The next thing is that the ISP only gets what you transmit. Your OS gets your internal documents, images whatever that are never sent out.


Printer Friendly | Permalink |  | Top
 
karlrschneider Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 07:24 PM
Response to Reply #25
38. I don't think very many folks know what you're even talking about, let alone how to do those checks.
I'm fairly computer savvy but I wouldn't know how to recognize a malicious "outbound packet" from a watermelon.
??
Printer Friendly | Permalink |  | Top
 
toddaa Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 08:01 PM
Response to Reply #38
43. It's actually pretty easy
But that's not the point. The Feds monitor trunk traffic. That's what AT&T is doing because they host a lot of trunk traffic. It doesn't matter if you are using Windows, Mac, Linux, or z/OS, chances are near certain that some of your data goes over AT&T's network. It's a massive amount of data, but it's certainly easier to get away with than what the OP is suggesting.
Printer Friendly | Permalink |  | Top
 
spindoctor Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-06-07 08:23 PM
Response to Original message
45. This UL has been going around for years and it is at best unlikely
But if they can mask traffic going in- and out your PC then they can mask it in the Linux kernel too.

How do you suppose they surpass third-party firewalls?
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Tue May 07th 2024, 02:54 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC