Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today!

If you have any problems with the registration process or your account login, please contact us.

Post New Thread Reply

Register GFY Rules Calendar
Go Back   GoFuckYourself.com - Adult Webmaster Forum > >
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed.

 
Thread Tools
Old 11-18-2002, 09:13 PM   #1
Massivecock
Confirmed User
 
Join Date: Mar 2002
Posts: 800
Microsoft and NSA(Gov) Trojan into every Windows machine! Holy shit!

11/18/2002 Entry: "NSA BACKDOOR IN EVERY MICROSOFT OPERATING SYSTEM"


How NSA access was built into Windows

Duncan Campbell

Careless mistake reveals subversion of Windows by NSA.

A CARELESS mistake by Microsoft programmers has revealed that special access codes prepared by the US National Security Agency have been secretly built into Windows. The NSA access system is built into every version of the Windows operating system now in use, except early releases of Windows 95 (and its predecessors). The discovery comes close on the heels of the revelations earlier this year that another US software giant, Lotus, had built an NSA "help information"
trapdoor into its Notes system, and that security functions on other software systems had been deliberately crippled.


The first discovery of the new NSA access system was made two years ago by British researcher Dr Nicko van Someren. But it was only a few weeks ago when a second researcher rediscovered the access system. With it, he found the evidence linking it to NSA.


Computer security specialists have been aware for two years that unusual features are contained inside a standard Windows software "driver" used for security and encryption functions. The driver, called ADVAPI.DLL, enables and controls a range of security functions. If you use Windows, you will find it in the C:\Windows\system directory of your computer.


ADVAPI.DLL works closely with Microsoft Internet Explorer, but will only run crypographic functions that the US governments allows Microsoft to export. That information is bad enough news, from a European point of view. Now, it turns out that ADVAPI will run special programmes inserted and controlled by NSA. As yet, no-one knows what these programmes are, or what they do.


Dr Nicko van Someren reported at last year's Crypto 98 conference that he had disassembled the ADVADPI driver. He found it contained two different keys. One was used by Microsoft to control the cryptographic functions enabled in Windows, in compliance with US export regulations. But the reason for building in a second key, or who owned it, remained a mystery.


A second key


Two weeks ago, a US security company came up with conclusive evidence that the second key belongs to NSA. Like Dr van Someren, Andrew Fernandez, chief scientist with Cryptonym of Morrisville, North Carolina, had been probing the presence and significance of the two keys. Then he checked the latest Service Pack release for Windows NT4,
Service Pack 5. He found that Microsoft's developers had failed to remove or "strip" the debugging symbols used to test this software before they released it. Inside the code were the labels for the two keys. One was called "KEY". The other was called "NSAKEY".


Fernandes reported his re-discovery of the two CAPI keys, and their secret meaning, to "Advances in Cryptology, Crypto'99" conference held in Santa Barbara. According to those present at the conference, Windows developers attending the conference did not deny that the "NSA" key was built into their software. But they refused to talk about what the key did, or why it had been put there without users' knowledge.


A third key?!


But according to two witnesses attending the conference, even Microsoft's top crypto programmers were astonished to learn that the version of ADVAPI.DLL shipping with Windows 2000 contains not two, but three keys. Brian LaMachia, head of CAPI development at Microsoft was "stunned" to learn of these discoveries, by outsiders. The latest discovery by Dr van Someren is based on advanced search methods which test and report on the "entropy" of programming code.


Within the Microsoft organisation, access to Windows source code is said to be highly compartmentalized, making it easy for modifications to be inserted without the knowledge of even the respective product managers.


Researchers are divided about whether the NSA key could be intended to let US government users of Windows run classified cryptosystems on their machines or whether it is intended to open up anyone's and everyone's Windows computer to intelligence gathering techniques deployed by NSA's burgeoning corps of "information warriors".


According to Fernandez of Cryptonym, the result of having the secret key inside your Windows operating system "is that it is tremendously easier for the NSA to load unauthorized security services on all copies of Microsoft Windows, and once these security services are loaded, they can effectively compromise your entire operating system". The NSA key is contained inside all versions of Windows from Windows 95 OSR2 onwards.


"For non-American IT managers relying on Windows NT to operate highly secure data centres, this find is worrying", he added. "The US government is currently making it as difficult as possible for "strong" crypto to be used outside of the US. That they have also installed a cryptographic back-door in the world's most abundant operating system should send a strong message to foreign IT managers".


"How is an IT manager to feel when they learn that in every copy of Windows sold, Microsoft has a 'back door' for NSA - making it orders of magnitude easier for the US government to access your computer?" he asked.


Can the loophole be turned round against the snoopers?


Dr van Someren feels that the primary purpose of the NSA key inside Windows may be for legitimate US government use. But he says that there cannot be a legitimate explanation for the third key in Windows 2000 CAPI. "It looks more fishy", he said.


Fernandez believes that NSA's built-in loophole can be turned round against the snoopers. The NSA key inside CAPI can be replaced by your own key, and used to sign cryptographic security modules from overseas or unauthorised third parties, unapproved by Microsoft or the NSA. This is exactly what the US government has been trying to prevent. A demonstration "how to do it" program that replaces the NSA key can be found on Cryptonym's
website.


According to one leading US cryptographer, the IT world should be thankful that the subversion of Windows by NSA has come to light before the arrival of CPUs that handles encrypted instruction sets. These would make the type of discoveries made this month impossible. "Had the next-generation CPU's with encrypted instruction sets already been deployed, we would have never found out about NSAKEY."
Massivecock is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 11-18-2002, 09:19 PM   #2
gothweb
Confirmed User
 
Join Date: Jun 2002
Location: Back in the USSA
Posts: 8,849
Oh my god, a conspiracy theory!
__________________

Photos by Ian X.: Distinctive photos of goth babes.
Blood Money:Your traffic, my sites, our money.
MojoHost: Still the best.
gothweb is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 11-18-2002, 09:21 PM   #3
Pornwolf
Drunk and Unruly
 
Pornwolf's Avatar
 
Join Date: Jan 2002
Location: Hollywood
Posts: 22,712
Why install a key when every 15 year old hacker can get in without one?
__________________
I've trusted my sites to them for over a decade...

Webair, bitches.
Pornwolf is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 11-18-2002, 09:24 PM   #4
L0stMind
Confirmed User
 
Join Date: Sep 2002
Location: Vancity
Posts: 1,681
a hoax or no? aahahaha
L0stMind is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 11-18-2002, 09:26 PM   #5
cherrylula
lol
 
cherrylula's Avatar
 
Industry Role:
Join Date: Jan 2002
Posts: 15,969
apple.com/switch
cherrylula is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 11-18-2002, 09:28 PM   #6
Daymare
Confirmed User
 
Industry Role:
Join Date: Feb 2002
Posts: 2,674
I smell BS
Daymare is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 11-18-2002, 09:31 PM   #7
L0stMind
Confirmed User
 
Join Date: Sep 2002
Location: Vancity
Posts: 1,681
Quote:
Originally posted by cherrylula
apple.com/switch
psh, please.

redhat 8 all the way
L0stMind is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 11-18-2002, 09:32 PM   #8
msg
Confirmed User
 
Join Date: Mar 2002
Location: South Fl.
Posts: 293
linux as a desktop is looking better and better
msg is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 11-18-2002, 10:14 PM   #9
jimmy3way
Confirmed User
 
Join Date: Sep 2001
Location: Top Secret Hideout
Posts: 2,508
I would be scared if it were anybody BESIDES our government.

Look at it this way: the gov't here is so wrapped up in bureaucratic red tape that no intel gathered ever really matters.

For instance: the NSA predicted the Tet Offensive during the Vietnam war. Did anything get done? Hell no and this is in war time.

The more intel they gather, the less time they have to look at it. I say give it all to them, then it's useless.
__________________
One thing, I forgot this last detail: the Biz Markie will always prevail.
jimmy3way is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 11-18-2002, 10:20 PM   #10
schilli
Confirmed User
 
Join Date: Jun 2002
Location: Toronto, Ontario, Canada
Posts: 265
Fuck does this mean that the NSA doesn't have to buy a membership to my spectacular porn site???
schilli is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 11-18-2002, 11:38 PM   #11
Hamlet
Confirmed User
 
Join Date: Jun 2002
Posts: 702
Quote:
Fuck does this mean that the NSA doesn't have to buy a membership to my spectacular porn site???
__________________
Hamlet is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 11-19-2002, 12:05 AM   #12
KRL
Entrepreneur
 
Join Date: Oct 2002
Location: USA
Posts: 31,429
That NSA stuff has been talked about for a long time. Supposedly one of the secret agenda's when DARPA developed the web's infrastructure plans was the long range goal of having everyone on this huge WAN (the Internet) which the NSA could then easily sniff. PC's op systems have unique identifier codes built in also.
PC's sent to certain foreign countries are supposedly laden with all sorts of spy goodies before they go out the door. I mean come on, look at your motherboard and and every .dll in your PC and tell me you know whats going on inside every chip and program in there. Yep, a computer on every desktop. Couldn't think of a better way to network directly into everyone's private space better than that.

Bottom line, assume everything is being monitored and the only protection you have is that this process in and of itself creates such a massively volumeous amount of intel every day that it is physically impossible for everything to actually be eyeballed. The supercomputers search for specifics from the raw data collected.

Here are some good links in regards to this topic. The first one really shows you how comprehensive the collection process is.

http://www.fas.org/irp/program/list.htm

http://www.fas.org/irp/program/index.html

http://www.fas.org/irp/world/index.html

http://www.skidmore.edu/~m_zarril/Menwith%20Hill.htm

Last edited by KRL; 11-19-2002 at 12:14 AM..
KRL is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 11-19-2002, 01:06 AM   #13
goBigtime
Confirmed User
 
Join Date: Nov 2002
Posts: 7,761
<sigh>

http://www.microsoft.com/technet/tre...s/backdoor.asp

That's old news. Microsofts explanation makes sense. I don't think bill is really down for anyone but himself. I couldn't see him playing nice with the .gov unless they promised him at least 500 fresh souls daily.


Anyway with Homeland security, the NSA has another backdoor to your computer -- its called your front door.
goBigtime is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 11-19-2002, 03:29 AM   #14
Hustlin Entertainment
So Fucking Banned
 
Join Date: May 2002
Location: Nassau,Bahamas
Posts: 2,326
fuck MS
Hustlin Entertainment is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Post New Thread Reply
Go Back   GoFuckYourself.com - Adult Webmaster Forum > >

Bookmarks



Advertising inquiries - marketing at gfy dot com

Contact Admin - Advertise - GFY Rules - Top

©2000-, AI Media Network Inc



Powered by vBulletin
Copyright © 2000- Jelsoft Enterprises Limited.