Skip to main content

View Diary: Linux Creator Admits NSA Demanded Backdoor (43 comments)

Comment Preferences

  •  Here's how open the NSA is about this (3+ / 0-)
    Recommended by:
    nickrud, Deep Texan, Hey338Too

    rarely-used optional extra layer that really does provide enhanced security features for Linux.

    None of this directed to this commenter, rather it's meant to supplement the points made about open source software and to defuse the nonsensical claims in the diary.

    Discussing the pros and cons about the merits of selinux is like teaching a fish how to climb trees.

    This isn't a conspiracy, even though there's rock solid evidence because Linus once winked his eye during an obscure meeting somewhere. (Linus happens to have a wonderful sense of humor)

    The NSA happens to be one of the best sources of information for finding security holes in many varieties of software. How do you think Microsoft comes up with the tens of thousands of security fixes they've distributed over the years. It's the NSA and NIST computer security task forces and their expert partners who identify these holes. You think Microsoft would ever admit they sold you crappy and insecure software? No way in hell. This wasn't voluntary. It was because light was shined on the wide-open nature of Windoze itself. I still believe that Windows is a virus. The NSA was instrumental in publicly exposing the security flaws.

    The NSA defends the US from cyber attacks.

    So here ya go. It says NSA right here in the selinux linux kernel  preface found in hooks.c source code. And ncsc.mil is the National Computer Security Center inside the NSA! Obviously, it's an evil back door meant to spy on everyone. And airplanes will fall out of the sky on Jan 1, 2000.

     NSA Security-Enhanced Linux (SELinux) security module

      This file contains the SELinux hook function implementations.

      Authors:  Stephen Smalley, <sds@epoch.ncsc.mil>
              Chris Vance, <cvance@nai.com>
              Wayne Salamon, <wsalamon@nai.com>
              James Morris <jmorris@redhat.com>

      Copyright (C) 2001,2002 Networks Associates Technology, Inc.
      Copyright (C) 2003-2008 Red Hat, Inc., James Morris <jmorris@redhat.com>
                           Eric Paris <eparis@redhat.com>
      Copyright (C) 2004-2005 Trusted Computer Solutions, Inc.
                    <dgoeddel@trustedcs.com>
      Copyright (C) 2006, 2007 Hewlett-Packard Development Company, L.P.
            Paul Moore <paul.moore@hp.com>
      Copyright (C) 2007 Hitachi Software Engineering Co., Ltd.
                   Yuichi Nakamura <ynakam@hitachisoft.jp>

        This program is free software; you can redistribute it and/or modify
        it under the terms of the GNU General Public License version 2,
        as published by the Free Software Foundation.

    Of course, this is just more "evidence" for die-hard paranoid conspiracy theorists who just "know" that everyone else always lies about everything...

    Writing things about which one knows nothing whatsoever just isn't going to work out very well.

    Source code is transparency on steroids. Open source is a disinfectant. The NSA and all government agencies are stongly encouraged to use open-source solutions for just about everything they implement on computers. People just don't know this, I guess.

    "Never wrestle with a pig: you get dirty and the pig enjoys it"

    by GrumpyOldGeek on Mon Sep 23, 2013 at 05:41:20 PM PDT

    [ Parent ]

    •  There's something brown on your nose, (0+ / 0-)

      and it reeks like n.
      sa.

      "So what if a guy threw a shoe at me!"

      by FoodChillinMFr on Mon Sep 23, 2013 at 10:00:32 PM PDT

      [ Parent ]

      •  The fish isn't climbing the tree (0+ / 0-)

        The FBI is spying on you. Getting a warrant isn't as complicated. They don't need or use the NSA, except for foreign traffic.

        Maybe your focus on the NSA is a distraction created by the FBI.

        The NSA can and does hove the ability to decipher most security methods. This is their mission. I know how this is done, too. They don't need a warrent to examine foreign intelligence. I don't need a warrant at all.

        There's no need for back doors. This has been superceded and is obsolete. Years ago.

        Assume that the public Internet is not secure. Everything connected to the public Internet is vulnerable. Everything.

        All of the major "free" email services store your mail on their servers. They scan everything electronically. Read their terms. They OWN your email. You can't even figure out where your email is stored.

        All wireless communications is vulnerable and is massively compromised all the time. USA and everywhere else. The technology is simple, cheap, and ubiquitous. Cell phones are wide open and in the clear.

        Credit card and ATM transactions are easy pickings. Your PIN number doesn't protect anything. It's ridiculously easy to crack the codes implemented by most banks.

        Chinese spying on the US amounts to billions of Internet messages every hour. I measured my tiny segment of my Internet connection and traffic from China to my one personal Internet IP address was over 60 per second. Korea was second highest, Russia shows up at the top often. People have no clue about how much spy traffic flows through the US Internet.

        These are facts. You ARE being spied on. It's just not by the NSA.

        All of these violations of your privacy are real.

        Your "proof" that the gubmint spies on you is that Linus shook his head. I'm afraid. I'm very afraid.

        You're focusing on an imaginary threat.

        "Never wrestle with a pig: you get dirty and the pig enjoys it"

        by GrumpyOldGeek on Tue Sep 24, 2013 at 04:10:43 AM PDT

        [ Parent ]

      •  Yeah, but how do we know you're not an NSA agent (0+ / 0-)

        just trying to ingratiate yourself? What if you're trying to distract us from the NSA's real and documented nefarious activities? How do we know you're not a mind-controlled Illuminati lizard mass stalker Grey? Answer me that. Or don't.

        •  You'll have to match the footprint on your door to (0+ / 0-)

          my shoes (assuming you get out of prison).  Only then will you know my secret.

          We don't knock.

          Kisses :).

          "So what if a guy threw a shoe at me!"

          by FoodChillinMFr on Wed Sep 25, 2013 at 02:03:35 AM PDT

          [ Parent ]

Subscribe or Donate to support Daily Kos.

Click here for the mobile view of the site