Is Linux More Secure Than Windows? | |
Anonymous Coward User ID: 78302545 United States 01/05/2020 12:39 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 78302545 United States 01/05/2020 12:41 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 78099421 Australia 01/05/2020 12:41 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 78311745 France 01/05/2020 12:41 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 78302545 United States 01/05/2020 12:41 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 78303335 New Zealand 01/05/2020 12:42 AM Report Abusive Post Report Copyright Violation | Unplug your computer from the internet. Now it is secure. A Hard Gap is the only way and genuine military secrets are never keep on any computer hooked up to the internet. That is policy. Anything you see hacked they allowed it to be hacked and it is false information. |
Anonymous Coward User ID: 75984216 United States 01/05/2020 12:44 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 78086396 Sweden 01/05/2020 04:46 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 38066883 Australia 01/05/2020 04:53 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 77699493 United States 01/05/2020 04:59 AM Report Abusive Post Report Copyright Violation | Everything probably has back doors through the BIOS. There's an open source BIOS you can use (one is called libreboot), but you have to really know what you're doing to install it - I believe it actually involves soldering or connecting physically something inside your computer to install it. Windows must be secure to some extent, or at least able to be secure, since corporations and governments use it. However, I'm sure there are backdoors for certain agencies in Windows too. Linux can be more secure, but unless you know how to read and write the open source code you're still trusting other people. It probably has been compromised too on some level. |
blu User ID: 40590246 United States 01/05/2020 05:05 AM Report Abusive Post Report Copyright Violation | We do know they have. All of the OSes have that. It's in the CPU on intel chips Quoting: Anonymous Coward 78302545 If that's the case it's only usable on bootup and limited to the BIOS and its settings. There's no programming language other than basic programmer code and definitely not any TCP etc coding/logic in there. And once it boots into the OS, the OS assumes control over all devices and functions and could close the backdoor. |
Anonymous Coward User ID: 78309010 Norway 01/05/2020 05:06 AM Report Abusive Post Report Copyright Violation | |
blu User ID: 40590246 United States 01/05/2020 05:07 AM Report Abusive Post Report Copyright Violation | |
blu User ID: 40590246 United States 01/05/2020 05:10 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 77973445 United States 01/05/2020 05:10 AM Report Abusive Post Report Copyright Violation | |
Wondering Mind
User ID: 73265267 United States 01/05/2020 05:11 AM Report Abusive Post Report Copyright Violation | |
Weyoun
User ID: 77989510 United States 01/05/2020 05:12 AM Report Abusive Post Report Copyright Violation | |
NowIhavetothinkofaname User ID: 63368270 Australia 01/05/2020 05:31 AM Report Abusive Post Report Copyright Violation | Bump for absolute truth dood. Your government knows where you live and military doods can just point a gun at you to get your passwords. Considering there's bullets that will go through brick walls, pretty much well no one is really "safe". |
NowIhavetothinkofaname User ID: 63368270 Australia 01/05/2020 05:33 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 38066883 Australia 01/05/2020 05:42 AM Report Abusive Post Report Copyright Violation | really you can't trust any computer unless you wrote all the code yourself. and you somehow think you didn't make any mistakes. Quoting: Anonymous Coward 38066883 this computer law was invented by famous computer guy ken thompson. nobody has proved him wrong yet!! He's right you know... Ken Thompson's "cc hack" - Presented in the journal, Communication of the ACM, Vol. 27, No. 8, August 1984, in a paper entitled "Reflections on Trusting Trust", Ken Thompson, co-author of UNIX, recounted a story of how he created a version of the C compiler that, when presented with the source code for the "login" program, would automatically compile in a backdoor to allow him entry to the system. This is only half the story, though. In order to hide this trojan horse, Ken also added to this version of "cc" the ability to recognize if it was recompiling itself to make sure that the newly compiled C compiler contained both the "login" backdoor, and the code to insert both trojans into a newly compiled C compiler. In this way, the source code for the C compiler would never show that these trojans existed. "The moral is obvious. You can't trust code that you did not totally create yourself. (Especially code from companies that employ people like me.) No amount of source-level verification or scrutiny will protect you from using untrusted code. In demonstrating the possibility of this kind of attack, I picked on the C compiler. I could have picked on any program-handling program such as an assembler, a loader, or even hardware microcode. As the level of program gets lower, these bugs will be harder and harder to detect. A well installed microcode bug will be almost impossible to detect." [link to www.win.tue.nl (secure)] guess which company employs ken thompson... |
Anonymous Coward User ID: 60407566 United States 01/05/2020 06:24 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 78246196 Canada 01/05/2020 07:40 AM Report Abusive Post Report Copyright Violation | |