Free Republic
Browse · Search
General/Chat
Topics · Post Article


1 posted on 10/10/2013 12:25:18 PM PDT by ShadowAce
[ Post Reply | Private Reply | View Replies ]


To: rdb3; Calvinist_Dark_Lord; Salo; JosephW; Only1choice____Freedom; amigatec; Still Thinking; ...

2 posted on 10/10/2013 12:25:42 PM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce
China?

/johnny

3 posted on 10/10/2013 12:53:44 PM PDT by JRandomFreeper (Gone Galt)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce

A very clever backdoor indeed. Good plausible deniability too, since this is such a common typo for C programmers, and one that isn’t even caught by syntax checkers, since it is still perfectly valid syntax. If they ever did track down who inserted it, they couldn’t prove that someone didn’t just “goof up” and forget the second equal sign.


5 posted on 10/10/2013 1:02:57 PM PDT by Boogieman
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce

Yep. I looked right at it and didn’t see it. BTT


7 posted on 10/10/2013 1:06:57 PM PDT by Billthedrill
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce

someone should have tested it with the __WCLONE option at least once to see if it returned -EINVAL

was it caught by unit testing? if not, it should have been

could have been sloppy code. that wouldn’t surprise me. better hacks involve pts to functions buried in hex tables of object code


14 posted on 10/10/2013 1:39:38 PM PDT by sten (fighting tyranny never goes out of style)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce

The fact that it was slipped in without approval would draw attention to it.

A smart hacker would realize that.

It’s pretty “ambitous” for a hacker to think they can get a backdoor into code that’s reviewed publicly.

If something is going to slip through, it would have to be very subtle, most certainly involving the interaction between different parts of the system, and these would be probably be maintained by different people.

There was not any sophistication to this attempt.

IMHO, it was either very halfhearted, sort of just poking around, or attempted by someone who’s rather half-witted.

Much more effective hacking would be to not try to put an explicit backdoor into Linux itself but to hack one machine at a time the old fashioned way, using the tools available and inherent weaknesses they imply.

Of course, once an individual computer is compromised, malware can be used for all sorts of things.

Linux, for example, as things like tcpdump that root can use to grab any or all network traffic using only a script, not even compiled programs.


16 posted on 10/10/2013 2:10:13 PM PDT by PieterCasparzen (We have to fix things ourselves)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce

Possibly one of the most interesting articles I’ve ever read on FR! I wonder what Linus would say about this.


19 posted on 10/10/2013 3:15:43 PM PDT by 2 Kool 2 Be 4-Gotten
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce

Certainly in 2013 Obama would ‘back door’ any opportunity he can.


26 posted on 10/10/2013 7:01:30 PM PDT by lbryce (Obama:The Worst is Yet To Come)
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson