Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 15 submissions in the queue.
posted by Dopefish on Thursday February 20 2014, @07:30AM   Printer-friendly
from the penguins-everywhere dept.

An anonymous coward writes "Former cypherpunk shares his conspiratorial view on Linux security:

Since then, more has happened to reveal the true story here, the depth of which surprised even me. The GTK development story and the systemd debate on Debian revealed much corporate pressure being brought to bear in Linux. [...] Some really startling facts about Red Hat came to light. For me the biggest was the fact that the US military is Red Hat's largest customer:

"When we rolled into Baghdad, we did it using open source," General Justice continued. "It may come as a surprise to many of you, but the U.S. Army is 'the' single largest install base for Red Hat Linux. I'm their largest customer." (2008)

This is pretty much what I had figured. I'm not exactly new to this, and I figured that in some way the military-industrial/corporate/intelligence complex was in control of Red Hat and Linux. [...] But I didn't expect it to be stated so plainly. Any fool should realize that "biggest customer" doesn't mean tallest or widest, it means the most money. In other words, most of Red Hat's money comes from the military and, as a result, they have significant pull in its development. In that respect, the connection between the military and spying agencies, etc. should be obvious.

Next, the FOSDEM: NSA Operation ORCHESTRA Annual Status Report is well worth watching in its entirety (including the Q&A at the end). To me, this turned out to be a road-map detailing how Red Hat is operating on Linux!"

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 4, Interesting) by turonah on Thursday February 20 2014, @10:47AM

    by turonah (2317) on Thursday February 20 2014, @10:47AM (#3325)

    The author is outlining their past work with cryptography (giving their credentials, really), and what they perceive to be constant and repeated attacks on the security of the Linux core. With everything regarding NSA lately, and the fact that Red Hat's largest customer is the US military, the author is saying that the attempts to compromise the security could be a deliberate move from the government TLAs.

    With no proof to back them up, it's all conjecture of course, but then almost every government wants a back door into all secure connections. NSA especially has been connected to this kind of thing before (https://www.schneier.com/blog/archives/2013/09/th e_nsa_is_brea.html [schneier.com]). Unlikely? Maybe, but not as far-fetched perhaps as it seems at first glance, IMHO.

    Starting Score:    1  point
    Moderation   +3  
       Insightful=1, Interesting=2, Total=3
    Extra 'Interesting' Modifier   0  

    Total Score:   4