Press "Enter" to skip to content

Posts published in “Politics”

Redmond FUDs FOSS While Forking Android & More…

FOSS Week in Review

Botnet steals bitcoins

We figure that any currency that can’t be safely tucked into a mattress isn’t secure, so we haven’t been too quick to jump on the bitcoin bandwagon. Needless to say, we weren’t surprised on Monday when Reuters reported that there’s a botnet on the loose with the aim of stealing the virtual currency.

According to the Chicago based security firm Trustwave, hundreds of thousands of computers have been infected with “Pony” malware to form a botnet going after bitcoin and other virtual currencies. So far, at least 85 virtual wallets have been stolen.

Russia’s Olympic Spying, Comcast Weds Time Warner & More…

FOSS Week in Review

The day we fought back

Tuesday, February 11th, The Day We Fight Back, has come and gone. Whether the event was a success, failure or fell somewhere in between depends on whom you read.

Surprisingly, the biggest naysayer was probably the New York Times, which started an article. “The Day the Internet Didn’t Fight Back,” with the line, “So much for mass protest.” It appears as if the Times’ metric for this judgement was the lack of participation by some sites which took part in the online SOPA protest a couple of years back.

The People Vs the NSA

There is a tablet in my house that blinks whenever my roommate has a message. I know this because for some reason it’s my job to keep it charged for her. It has front and back cameras. The built-in microphone and speakers are capable of holding a conversation in English–probably other languages as well. With what we know now, I must assume that the NSA has the ability to activate the cameras and microphone to run silently in the background, bypassing the light that indicates when the camera is in use.

The same is true of the other computers in my home, but to a lesser degree.

The Day We Fight Back banner
The Day We Fight Back banner.

The desktop I’m using to write this article doesn’t have a camera or a microphone. Nor does the old Dell laptop that gets used occasionally around the house. My other laptop, a newer Gateway, is equipped with a built-in camera and microphone, but I’ve never managed to get the microphone to work under Bodhi Linux. Not that I’ve tried very hard. I don’t Skype or anything, so a microphone is of very little use to me.

This is probably a good thing as it means the NSA can’t watch or listen to me as I use my desktop or Dell and they can’t eavesdrop when I’m on the Gateway. They can only steal my bank passwords, learn where I store data online and what social networking accounts are connected with me.

Christine Hall

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux

Torvald’s Thumbs Up, Gates’ Computer Skills & More…

FOSS Week in Review

Canadians spy at airports

The more we see of the Snowden revelations the more we wonder, when did the English speaking world become a police state?

The latest news was reported January 30th by the Canadian Broadcasting Corporation (CBC), from which we learned that all the electronics eavesdropping hasn’t been being conducted solely by the U.S. and the Brits. The Canadians have had their hand in it too.

It seems that Communications Security Establishment Canada (CSEC), a Canadian spy agency, has been using the free Wi-Fi at “a major Canadian airport” to track wireless devices, which presumably would include laptops as well as phones and tablets. The surveillance would continue for days after visitors passed through the airport.

Results for Our ‘Red Hat & the NSA’ Poll

It looks as if Red Hat has some work cut out for them if they care what impression folks in the FOSS community have about them. If the results of our Red Hat &the NSA poll are any indication, some people aren’t convinced that the most commercially successful Linux distro on the planet has clean hands when it comes to the whole NSA mess.

A few weeks back, in response to what I thought (and still think) were unfounded allegations that Red Hat has been working with the NSA spying efforts by doing things like building back doors into RHEL, we ran a poll that asked the simple question, “Do you think Red Hat is cooperating with the NSA by building back doors into RHEL?” The poll went up on January 23rd and was ended this afternoon.

Red Hat logo

Christine Hall

Christine Hall has been a journalist since 1971. In 2001, she began writing a weekly consumer computer column and started covering Linux and FOSS in 2002 after making the switch to GNU/Linux. Follow her on Twitter: @BrideOfLinux

Google Beats Troll, Ellison’s Oracle ‘Unbreakable’ & More…

FOSS Week in Review

NSA involved in industrial espionage

Another big non-surprise this week in the continuing saga of the NSA. It appears that our beloved spy agency has been using their secret powers for the purpose of uncovering industrial secrets from foreign companies. So much for the separation of business and state. Reuters reported that in a television interview with a German TV network, Edward Snowden said the agency doesn’t confine its intelligence gathering to items of national security.

“‘If there’s information at Siemens that’s beneficial to U.S. national interests – even if it doesn’t have anything to do with national security – then they’ll take that information nevertheless,’ Snowden said…”

Even the Republicans are jumping on the stop-the-NSA bandwagon, which is rather surprising.

You Say NSA Has Hurt U.S. Tech Sector

Back in the early days of the Snowden affair, when it first became obvious that Microsoft and others had co-operated with the NSA’s agenda to spy on every living human being on the planet who owned a computer, we said this wouldn’t bode well for those who make their living from tech in the U.S. We thought that proprietary software vendors would be most vulnerable due to their lack of transparency, i.e., the lack of available source code, especially after Redmond was exposed for building secret access into Windows.

Back in December, we asked for your opinion in our NSA in the USA Poll.

Chrome Eavesdropping, Balkanized Internet & More…

FOSS Week in Review

Sixteen-year-old wrote the code for Target breach

TargetMiamiThe press calls him a “nearly seventeen-year-old” and he’s reported to be one of the people behind the malware used to compromise credit card data at Target and other locations. By our way of counting, “nearly seventeen” means he is sixteen or, like the show tune says, “sixteen going on seventeen.” He lives in Russia and is said to be the author of the BlackPOS malware that was used against Target and might have been used against Neiman Marcus.

This info comes from Los Angeles based cyber-intelligence firm IntelCrawler, which says it’s also traced six additional breaches to BlackPOS. As noted on MarketWatch, despite authoring the malware, the kid is just a small fry in this affair.

Troll Sues FTC, Net Neutrality Dead & More…

FOSS Week in Review

NSA spying not as effective as claimed

Claims from the Obama White House and the NSA about the effectiveness of the NSA’s dirty tricks evidently aren’t true, according to a report from the New America Foundation. Since the Snowden revelations began, we’ve heard that something like 50 terrorist attacks have been averted as a result of the NSA monitoring Americans’ phone records and such.

However, Mashable tells us that according to this report, the effects of the NSA’s cyber spying has been minimal.

“‘Our review of the government’s claims about the role that NSA “bulk” surveillance of phone and email communications records has had in keeping the United States safe from terrorism shows that these claims are overblown and even misleading,’ said the research team, led by Peter Bergen, a reporter specialized in national security who also interviewed Osama Bin Laden in 1997.

“‘Traditional investigative methods, such as the use of informants, tips from local communities, and targeted intelligence operations, provided the initial impetus for investigations in the majority of cases, while the contribution of NSA’s bulk surveillance programs to these cases was minimal,’ they added.

The report goes on to claim that the spy agencies wholesale collection of phone data only had an impact in 1.8% of cases. The figures for PRISM’s impact is 4.4%.

Blame FUD for Microsoft’s Dominance in Schools

What a difference a split-second decision can make.

Two possible scenarios:

  1. You cross the street to make your bus connection, stand at the bus stop, get on the bus and go about your business.
  2. You cross the street to make your bus connection but notice an ad in the window of a corner market, advertising that the lottery is up to ten million dollars. You buy a ticket. You win.

We are faced with life-changing decisions every day, never knowing that different, seemingly inconsequential actions will take us down amazingly different paths.

Ken Starks

Ken Starks is the founder of the Helios Project and Reglue, which for 20 years provided refurbished older computers running Linux to disadvantaged school kids, as well as providing digital help for senior citizens, in the Austin, Texas area. He was a columnist for FOSS Force from 2013-2016, and remains part of our family. Follow him on Twitter: @Reglue

Cloud Based LibreOffice, Facebook Reads PMs & More…

FOSS Week in Review

In 2013, Linux hits grand slam

Now that companies are closing-out their books on the old year, it’s becoming evident that Linux devices were a big hit in 2013.

On Friday, CNET’s Brooke Crothers reported that Chromebooks, those nifty laptops running Google’s Chrome OS that let the cloud do the heavy lifting, accounted for 21% of all laptop sales last year. As impressive as that may be, the numbers get even better when Android tablets are added to the mix. According to market research company NPD Group, January to November saw 1.76 million Chromebooks and Android tablets sold, up from only 400,000 during all of 2012.

The OEMs, of course, are paying attention and are readying new Linux devices for the market.

Latest Articles