Following advice from ShiftPlusOne I thought I would start a new thread for everybody and talk about a subject that's been on the news a bit lately.
BACKDOORS in The Hardware && The Software.
Let's break it down:
Every computer hacker ever told off for searching for UFO's or just wanting to tag there name on some server somewhere has always seemed to be unemployed at the time they where doing it, so following in this great traditions footsteps I decided to pay a quick visit and point out some key facts for the rest of us.
Kevin David Mitnik: Status @ time of arrest - Unemployed
Kevin Poulsen: Status @ time of arrest - Unemployed
& The List go's on: http://en.m.wikipedia.org/wiki/List_of_ ... _criminals
Notice that many of these criminals are now reformed and now call themseleves Security Professionals.
So after that brief look in the past, your probably now asking yourself, well where are the back-doors we're all hearing so much about in the news?
Well according to another FREE-LANCER (Love that word) Jim Stone the backdoor's are all in the latest Intel i7 CPU Chips, yeap it seems that Intel has solved the problem of putting 3G capability into your PC's CPU. The secret 3G chip can act as a backdoor, complete with wake-on-LAN and wake-on-mobile. Which is to say, the computer can be turned on remotely through this undocumented 3G radio.
So it's no small surprise why those newer AMD FX CPU's actually appear to have what looks like a phone SIM card plugged directly onto the top.
Ah, so here we have a potential candidate with an in built backdoor SIM card.
But wait what about back-doors in the software, there are none in there are there!?!
Well thats a good question that only you can decide for yourself, lets take a look at those Free Operating Systems that Hackers seem to love so much.
BSD/Linux Back-door free?
On 11 December 2010, Gregory Perry sent an email to Theo de Raadt alleging that the FBI had paid some OpenBSD ex-developers 10 years previously to insert backdoors into the OpenBSD Cryptographic Framework. Theo de Raadt made the email public on 14 December by forwarding it to the openbsd-tech mailing list and suggested an audit of the IPsec codebase. De Raadt's response was skeptical of the report and he invited all developers to independently review the relevant code. In the weeks that followed, bugs were fixed but no evidence of backdoors were found.
According to the developer who came forward the Back-door had been built into PfSensor.
But now lets see is there anything that leaps out at you as a Programmer or Hacker when it comes to looking at your chosen free operating system.
Well there are a few bit's that might give you pause, why dont we just open a terminal window and sudo to root and try out a few commands? Like how about the good old favourite: stty
Let's try this on an Android that has had it's root permissions restored with a few FREE developer modifications:
I see we have now been rewarded with our potential back-door, according to our terminal window we now have 38400 Buad Speed available on Line:0
Linux Kernel 4 - Million Lines of Code and counting, how many IOCTLS && how much dynamic linking?
But wait you cant over-ride the android window manager that easily can you? Ah, well lets see most Unices have the X11 Window manager preventing you from doing something that could be considered illegal and stupid, oh but no, that appears to be missing on our chosen android platform. So in theory yes you can bind to the Window Manager and create a presentation, in fact the android developer guide even has handy pointers for everyone so that they can all give it a try with the Octopus O/Mero && O/Live with the inclusion of a few hardware level back-doors to make that task so much easier.
Oh but wait look they've closed the back-door in the Samsung Galaxy S
https://www.fsf.org/blogs/community/rep ... y-backdoor
Closing a loop in the modem does not essentially remove the backdoor feature's from there OS and it's worth reflecting that whilst our government insist's it's to prevent terrorism, they've been actively putting back-doors into all our products since the early 1970's whilst only now seeming to want to find: Cyber-Magicians - When at the same time the people that they call magicians are all those teenagers and college kids that seem to know more about the technology than any singular technician in there spare time and it seems that the majority of them are distrustful and want nothing to do with them.
It's really hard to imagine why.
My advice to the Government in the US && the UK - "Keep it up!" you'll see some real magic, when people figure out where the back-doors are!