Posted on 08/22/2013 8:19:40 AM PDT by aMorePerfectUnion
"I reported that Windows 8 was dangerous. Some wrote to argue I was wrong. I wrote why NASA announced it was dumping Windows 8 and that even Skype should not be used. Microsoft has been criticized for the Prism affair."
"Now appears that Windows 8 is especially dangerous. The German government warns against Microsoft program because it has the ability to control the hardware and software of the computer. The NSA can enter you computer remotely. Has Microsoft created economic suicide?"
(Excerpt) Read more at armstrongeconomics.com ...
Theoretical quantum computers generate so much heat that conventional HVAC can't keep them cool. It's only ever been done in a lab and has never been done past a few million primes per hour due to degradation of the processing media. You're proposing that the government has destroyed Moore's Law and has come up with something that scientists and researchers have been trying to solve since the late 90s. Why wouldn't they sell that technology and not only net Nobel after Nobel prize but usher in a new era of human discovery?
The worlds most powerful supercomputers can't crack 1024-bit encryption in a timely manner, what makes you think that a multi-acre datacenter running the equivalent of IBM Z11 mainframe clusters could do it for ALL encrypted traffic?
Check your facts, CodeToad.
Drop the GUI, go to Core, and manage the thing with PowerShell. You'll feel better.
Mind you, the razzing the Winders geeks got from the Unix dweebs when that CLI popped up was pretty good. Some things are easier with a little GUI - IIS admin, for example - but yeah, it looks like a blast from the past.
I'm getting sucked back to Linux admin and I gotta tellya there's a little rust here. What the heck, it pays.
They couldn’t disappear from God.
Silicone?
The TPM is only accessible through the channel/tunnel established by the user. Since that channel is always on when the TPM is in use, it can’t be broken or the TPM connection breaks altogether. I use my TPM the entire time I’m on my machine, so I would know immediately.
The only thing I’ll grant you is if the user is unaware of the TPM on their machine and/or isn’t using it. But even then, the TPM isn’t an interface module with the rest of the system. There would have to be some sort of program on the system regularly running to tunnel the info on the user’s activities to the authorities.
As a system engineer, designer, and general tinkerer, it boggles my mind that people wouldn’t root and reformat their machines out of box, but then, I guess that goes to your point.
Remember that Core doesn’t do everything. IIRC, IIS requires the GUI install. Core services such as AD, DNS, DHCP, and DFS are supported, and they’re really the most important to secure, IMHO.
I recognized that code.
That's business speak for "WHEN (not if) we outsource your job, it needs to be doable by a recent IIT graduate, with no real world experience..."
That’s kind of how I took it. But given that my manager and my director are both hands-on types, I also took it to mean that they aren’t comfortable in the PS CLI and wouldn’t be able to access the systems in the way they’re used to.
Works for me, personally.
When is Windows 9 coming out??
Correctamundo. Frankly I'm so used to managing IIS that way that it would be harder to do otherwise.
Man, you should have heard the squeaking when the Metro interface turned up at login. I actually got one of my fellow students to try using his monitor as a touchscreen. He isn't my friend anymore... ;-)
That kids want to use touchscreens is troubling to me. I DESPISE people touching my computer monitor. Now we’re expected to do EVERYTHING on our systems by touching the screen? Ugh! I have visions of Cheetos crumbs lining the bezel of my monitors and sticky fingerprints everywhere. Blech!
I’m a bit of a tyro here, so please forgive any genuinely stupid things I say here, but...
Would it be possible to write a subroutine that connects to the channel/tunnel during start up or shutdown, reads the TPM to a hidden file, then disconnects from the tunnel and frees it up for ordinary unimpeded use?
The user then uses the system as per normal.
The TPM mirror in the hidden file can later be accessed at the snooper’s leisure.
lol
The problem is that the TPM requires a password to access it. If the password isn’t entered, the TPM disallows access. And as a matter of fact, the default setting for most TPMs for excessive wrong passwords is to completely lock down the TPM until it’s administratively cleared from the BIOS.
The only way to snoop the TPM is to interrupt the tunnel after it’s been opened by the user, but just like with VPN, any interruption to the tunnel means the tunnel collapses.
It would be cool if we could route any NSA spyware to an empty hdd partition running some weird random little script to make it think there is activity.
Part of what Snowden revealed was that the NSA had secured from Microsoft the algorithm for generating the hash and salt.
Where does the password come from? Why can’t it be intercepted and stored at start up, then reused to open the tunnel at shutdown, read and save the TPM, and quietly disappear?
I like the way you think...
Linux is free. You can run it off a CD without installing it to see if you like it.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.