Aside from the fact that you have to be an idiot to install major system components of unknown provenance
Yeah. I do tech support. The amount of such things.... and, you dont find hacked versions of open office becuase, since its free, everyone downloads it from the main company. but i have seen lots of versions of various pay programs for download, supposedly hacked to give it to you free, that installs backdoors. I've also seen downloads of limewire, a free program, that promised faster connections and downloads. They did not provide that, but they DID provide a backdoor to your computer. (The rumours were that the RIAA put out that version, in order to better find and litigate heavy downloaders of music. ) It may be unheard of currently, but as such free, or mostly free, software becomes more the rule, it WILL happen. On Wed, Jul 8, 2009 at 2:06 PM, Stephen A. Lawrence<[email protected]> wrote: > > > Edmund Storms wrote: >> This helps explain the situation, Stephen. However, suppose I make >> some neat changes in an open source program and add a few backdoors. >> Then I send it to my friends, who use it and send it to their friends >> because of the neat features I added. Eventually, the code becomes >> widespread. The backdoors would not be discovered unless someone who >> knows the code and has time to check any changes finds them. Why has >> this not happened to Linux? > > Open source doesn't normally work that way. I've never heard of anyone > installing a random hacked-up version of Linux which they got from their > friends (or a random hacked up version of any other large open source > system). Do you use random hacked-up versions of OpenOffice? No, I'm > sure you don't, and nobody else does, either -- it's not just rare, it's > unheard of. > > Aside from the fact that you have to be an idiot to install major system > components of unknown provenance, there's the fact that the major > organizations have hoards of elves maintaining the open source systems, > and custom versions fall out of date *very* fast unless the custom > changes are folded back into the mainline. A new version of Linux comes > out about every six months (for the major distributors) and updates to > components come out almost daily. GoogleOS will probably have updates > coming out at the same breakneck pace if it ever gets off the ground. > > Now, you're presumably actually just talking about a hacked up kernel, > rather than the whole umpteen gigabyte system. So, what kind of feature > can you imagine that your friend might add to a kernel that would > convince you to use *his* kernel rather than one blessed by Linus? > Personally I can't imagine such a feature -- I wouldn't trust a hacked > kernel, of course, but more to the point, when the next new kernel comes > out, typically in about 30 days, what am I going to do about my friend's > patches? Apply them to the new kernel myself? Get a new kernel from > the friend to drop on top of the new one I just got from > Redhat/Yellowdog/Debian/whoever? It's a nightmare to go that road, and > nobody's going to do it -- they'll use the kernels provided for their > system, or one from an equally well known source. > > Up above I said "you'd have to be an idiot" and I should explain that, > because I was thinking of a rather specific set of reasons why you'd > need to be unhumanly stupid to drop a random (unknown) kernel into your > system. If you're Joe Sixpack you're not going to be dropping a random > hacked kernel into your system; you don't know how -- Joe Sixpack > doesn't know enough to put himself in the dangerous situation to start > with. Joe's going to be using an off the shelf kernel, with updates > provided by the vendor who supports his Linux (or GoogleOS) variant. > On the other hand, if you *do* have the expertise to replace individual > system components with nonstandard versions, then you're also going to > be aware of the danger of using an unknown kernel. So, it's only the > person who knows how, knows better, and does it anyway who could > possibly get burned here -- and, as I said, if you really knew you > shouldn't do that, then you're an idiot if you do it anyway, and people > in general are NOT IDIOTS. In short, the ignorant ones won't do it > because they can't, and the educated ones won't do it because they know > better. > > Now, let's get back to the issue you hinted at, which is that nobody'll > have time to track down all the possible security holes introduced by > random hackers. I don't know how familiar you are with large open > source projects, but they are *not* run like Wikipedia. To get a patch > folded back into the Linux mainline, you have to get it past Linus (I > mean that literally -- last I heard Linus Thorvalds was still vetting > everything that went into the kernel). And if you want it folded into, > say, Redhat's custom version of the kernel, you need to get it past the > people doing code reviews at Redhat. They don't just look at the nice > cover letter you wrote and say, "Oh this sounds like fun, let's stick in > the next release". They actually look at the code, too, and when it's a > patch from an unknown outsider, you better believe they look at it > pretty carefully! > > In fact, the only people you really have to fear anything along these > lines from are the INHOUSE developers at the OS maintainers main > office. And those people exist at Microsoft, too --- consider > particularly the "mouse mess" at Microsoft a while back: > > http://www.grc.com/wmf/wmf.htm > > Finally, open source OS code is likely to be *better* *vetted* than > closed source code. It's not clear the "mouse mess" could have remained > hidden in Linux for nearly so long as it was in Microsoft's OS -- it > lurked in there for years before someone noticed it, and Microsoft was > slow to admit there was a problem or do anything about it after someone > found out, which resulted in a huge number of instances of exploits. > Part of the reason it can be so hard to do anything about problems like > this in a closed source system, of course, is that almost nobody gets to > look at the code, so the pool of potential whistle blowers is very > restricted. > > For a second example, google "rootkit" and "sony" to find out just how > badly you can get nailed when you're dealing with closed source. Once > again, the ones who were playing fast and loose with the internals were > not hackers (they can't, they're not in a position to do that). They > were the inhouse programmers at Sony, working with full access to the > (secret) source. And the ones who got nailed were the general public, > duffer and expert alike, who are not allowed to see the secret sources, > and so can't know what's actually running on their systems... > > > >> >> Ed >> >> >> On Jul 8, 2009, at 1:24 PM, Stephen A. Lawrence wrote: >> >>> >>> >>> Edmund Storms wrote: >>>> They say this is an open system, which has the advantage of putting >>>> the user in control. Why would it not also put the hacker in control? >>> What's the problem with open source, aside from the fact that anyone can >>> learn how the system works? I don't see one. >>> >>> Security based on secrecy doesn't work very well -- one leak and you're >>> dead meat -- so opening the source is not in itself a problem. In fact >>> it's widely felt that voting machine software, to name one example, >>> would be far more secure if it were entirely open. >>> >>> Secret "backdoors" are secure as long as they're secret, but they're >>> generally considered totally unsecure, because they don't stay secret. >>> >>> The only thing opening the source does is, it makes it impossible for >>> the vendor to retain the capability to prevent improvements. The user >>> chooses the software to put on their machine, and they'll choose the >>> version from Google *unless* there's a version which is better (or >>> equally good and cheaper). With a closed-source system, on the other >>> hand, you can drop the "*unless*" clause: there is only one version >>> available. And that's the only real difference. >>> >>> Finally, as an observation on who this helps and who it hurts, my guess >>> is it's going to end up hurting the consumers most of all. Google is a >>> company driven *entirely* by ad revenue AFAIK and one of their primary >>> missions seems to be to make ad delivery (and content delivery) secure >>> and reliable for the advertisers and content vendors. They are squarely >>> on the opposite side of the fence from FSF. Check out Chrome, and think >>> about these questions: >>> What's Chrome got? Lovely UI. >>> What's it missing? Cookie control!! >>> You get better tracking cookie control with IE than you do with Chrome! >>> Unless Google has changed this, the concept of arbitrarily limiting >>> cookie lifetimes to the life of the session (with a list of exceptions) >>> is completely missing from Chrome. I believe there were some other >>> cookie control issues as well, but that was the big one, which really >>> stood out for me: Use Chrome, be tracked, it's as simple as that -- and >>> the old argument that they can't match up the cookies with *you* is >>> either already false or certainly likely to be false in the future. >>> >>> If Google can push something on consumers which "frees" them from >>> Microsoft while simultaneously "freeing" the vendors from the nasty >>> cookie controls of Firefox they'll view it as a home run, I'm sure. >>> >>>> >>>> Ed >>>> On Jul 8, 2009, at 12:49 PM, OrionWorks wrote: >>>> >>>>> I've labeled this thread "OT" because the subject would seem to be >>>>> unrelated to the issues concerning the occasionally scrappy process of >>>>> developing alternative energy strategies. >>>>> >>>>> But then... maybe it does bare some semblance: >>>>> >>>>> http://www.cnn.com/2009/TECH/07/08/google.chrome.os/index.html >>>>> >>>>> Regards >>>>> Steven Vincent Johnson >>>>> www.OrionWorks.com >>>>> www.zazzle.com/orionworks >>>>> >>>> >>> >> > >

