Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Germany Warns Windows 8 is Dangerous – Is Microsoft a Giant Short?
Armstrong Economics ^ | 8/21/13 | Martin Armstrong

Posted on 08/22/2013 8:19:40 AM PDT by aMorePerfectUnion

"I reported that Windows 8 was dangerous. Some wrote to argue I was wrong. I wrote why NASA announced it was dumping Windows 8 and that even Skype should not be used. Microsoft has been criticized for the Prism affair."

"Now appears that Windows 8 is especially dangerous. The German government warns against Microsoft program because it has the ability to control the hardware and software of the computer. The NSA can enter you computer remotely. Has Microsoft created economic suicide?"

(Excerpt) Read more at armstrongeconomics.com ...


TOPICS: Business/Economy; Crime/Corruption
KEYWORDS: computer; microsoft; nsa; privacy; windows; windows8; windows8windows
Navigation: use the links below to view more comments.
first previous 1-20 ... 61-8081-100101-120 ... 161-180 next last
To: CodeToad
So what you're telling me is that the NSA already has quantum-computing clusters doing this? Are you daft? You're proposing that the NSA, the Federal government, has broken through several decades of problems that private tech industries and universities have been unable to do so.

Theoretical quantum computers generate so much heat that conventional HVAC can't keep them cool. It's only ever been done in a lab and has never been done past a few million primes per hour due to degradation of the processing media. You're proposing that the government has destroyed Moore's Law and has come up with something that scientists and researchers have been trying to solve since the late 90s. Why wouldn't they sell that technology and not only net Nobel after Nobel prize but usher in a new era of human discovery?

The worlds most powerful supercomputers can't crack 1024-bit encryption in a timely manner, what makes you think that a multi-acre datacenter running the equivalent of IBM Z11 mainframe clusters could do it for ALL encrypted traffic?

Check your facts, CodeToad.

81 posted on 08/22/2013 9:57:23 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 75 | View Replies]

To: rarestia
Server 2012 isn’t much better.

Drop the GUI, go to Core, and manage the thing with PowerShell. You'll feel better.

Mind you, the razzing the Winders geeks got from the Unix dweebs when that CLI popped up was pretty good. Some things are easier with a little GUI - IIS admin, for example - but yeah, it looks like a blast from the past.

I'm getting sucked back to Linux admin and I gotta tellya there's a little rust here. What the heck, it pays.

82 posted on 08/22/2013 9:57:41 AM PDT by Billthedrill
[ Post Reply | Private Reply | To 23 | View Replies]

To: rarestia

They couldn’t disappear from God.


83 posted on 08/22/2013 9:57:55 AM PDT by null and void (Frequent terrorist attacks OR endless government snooping and oppression? We can have both!)
[ Post Reply | Private Reply | To 69 | View Replies]

To: CodeToad

Silicone?


84 posted on 08/22/2013 9:59:29 AM PDT by null and void (Frequent terrorist attacks OR endless government snooping and oppression? We can have both!)
[ Post Reply | Private Reply | To 75 | View Replies]

To: null and void

The TPM is only accessible through the channel/tunnel established by the user. Since that channel is always on when the TPM is in use, it can’t be broken or the TPM connection breaks altogether. I use my TPM the entire time I’m on my machine, so I would know immediately.

The only thing I’ll grant you is if the user is unaware of the TPM on their machine and/or isn’t using it. But even then, the TPM isn’t an interface module with the rest of the system. There would have to be some sort of program on the system regularly running to tunnel the info on the user’s activities to the authorities.

As a system engineer, designer, and general tinkerer, it boggles my mind that people wouldn’t root and reformat their machines out of box, but then, I guess that goes to your point.


85 posted on 08/22/2013 10:00:33 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 79 | View Replies]

To: Billthedrill

Remember that Core doesn’t do everything. IIRC, IIS requires the GUI install. Core services such as AD, DNS, DHCP, and DFS are supported, and they’re really the most important to secure, IMHO.


86 posted on 08/22/2013 10:02:05 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 82 | View Replies]

To: rarestia
"Oh well if you ever leave, no one will know how to administer that system."

I recognized that code.

That's business speak for "WHEN (not if) we outsource your job, it needs to be doable by a recent IIT graduate, with no real world experience..."

87 posted on 08/22/2013 10:02:49 AM PDT by null and void (Frequent terrorist attacks OR endless government snooping and oppression? We can have both!)
[ Post Reply | Private Reply | To 77 | View Replies]

To: null and void

That’s kind of how I took it. But given that my manager and my director are both hands-on types, I also took it to mean that they aren’t comfortable in the PS CLI and wouldn’t be able to access the systems in the way they’re used to.

Works for me, personally.


88 posted on 08/22/2013 10:04:00 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 87 | View Replies]

To: Cicero

When is Windows 9 coming out??


89 posted on 08/22/2013 10:05:57 AM PDT by cameraeye (A happy kuffir!)
[ Post Reply | Private Reply | To 27 | View Replies]

To: rarestia
IIS requires the GUI install.

Correctamundo. Frankly I'm so used to managing IIS that way that it would be harder to do otherwise.

Man, you should have heard the squeaking when the Metro interface turned up at login. I actually got one of my fellow students to try using his monitor as a touchscreen. He isn't my friend anymore... ;-)

90 posted on 08/22/2013 10:06:12 AM PDT by Billthedrill
[ Post Reply | Private Reply | To 86 | View Replies]

To: Billthedrill

That kids want to use touchscreens is troubling to me. I DESPISE people touching my computer monitor. Now we’re expected to do EVERYTHING on our systems by touching the screen? Ugh! I have visions of Cheetos crumbs lining the bezel of my monitors and sticky fingerprints everywhere. Blech!


91 posted on 08/22/2013 10:08:01 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 90 | View Replies]

To: rarestia

I’m a bit of a tyro here, so please forgive any genuinely stupid things I say here, but...

Would it be possible to write a subroutine that connects to the channel/tunnel during start up or shutdown, reads the TPM to a hidden file, then disconnects from the tunnel and frees it up for ordinary unimpeded use?

The user then uses the system as per normal.

The TPM mirror in the hidden file can later be accessed at the snooper’s leisure.


92 posted on 08/22/2013 10:10:44 AM PDT by null and void (Frequent terrorist attacks OR endless government snooping and oppression? We can have both!)
[ Post Reply | Private Reply | To 85 | View Replies]

To: Billthedrill

lol


93 posted on 08/22/2013 10:11:25 AM PDT by GeronL
[ Post Reply | Private Reply | To 90 | View Replies]

To: null and void

The problem is that the TPM requires a password to access it. If the password isn’t entered, the TPM disallows access. And as a matter of fact, the default setting for most TPMs for excessive wrong passwords is to completely lock down the TPM until it’s administratively cleared from the BIOS.

The only way to snoop the TPM is to interrupt the tunnel after it’s been opened by the user, but just like with VPN, any interruption to the tunnel means the tunnel collapses.


94 posted on 08/22/2013 10:12:52 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 92 | View Replies]

To: null and void

It would be cool if we could route any NSA spyware to an empty hdd partition running some weird random little script to make it think there is activity.


95 posted on 08/22/2013 10:12:57 AM PDT by GeronL
[ Post Reply | Private Reply | To 92 | View Replies]

To: rarestia

Part of what Snowden revealed was that the NSA had secured from Microsoft the algorithm for generating the hash and salt.


96 posted on 08/22/2013 10:15:48 AM PDT by MeganC (A gun is like a parachute. If you need one, and don't have one, you'll never need one again.)
[ Post Reply | Private Reply | To 9 | View Replies]

To: aMorePerfectUnion
Thanks for the post.

I've been using windows 8 for awhile and don't like it.

Windows 8.1 is supposed to roll out on Oct 18th.
If I still don't like it, I'll go back to Win 7 until switching over to Apple
97 posted on 08/22/2013 10:15:58 AM PDT by novemberslady (Texas For President)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rarestia

Where does the password come from? Why can’t it be intercepted and stored at start up, then reused to open the tunnel at shutdown, read and save the TPM, and quietly disappear?


98 posted on 08/22/2013 10:16:25 AM PDT by null and void (Frequent terrorist attacks OR endless government snooping and oppression? We can have both!)
[ Post Reply | Private Reply | To 94 | View Replies]

To: GeronL

I like the way you think...


99 posted on 08/22/2013 10:17:25 AM PDT by null and void (Frequent terrorist attacks OR endless government snooping and oppression? We can have both!)
[ Post Reply | Private Reply | To 95 | View Replies]

To: novemberslady

Linux is free. You can run it off a CD without installing it to see if you like it.


100 posted on 08/22/2013 10:18:00 AM PDT by GeronL
[ Post Reply | Private Reply | To 97 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 61-8081-100101-120 ... 161-180 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson