Compare cert salaries and plan your next career move
tiersten wrote: In short, yes you should be wary of the VMware appliances you can download but I don't think you should be any less wary of the regular software you install.
tiersten wrote: Do you audit every CD and patch that you install? How about every software distribution? Mr Evil Guy at <insert favourite or not so favourite software company here> might have put in a deliberate bug in their software that to initial inspection looks harmless but in reality totally screws security over. It doesn't even have to be Mr Evil Guy. Mr Government Agent might have convinced that software company to change something. The NSAKEY in Windows that was alledgely to allow the NSA to sign their own crypto modules is a prime example of this. Whilst it would allow them to do that, it also gave them the power to distribute backdoored versions of the regular crypto modules which Windows would accept. Debian had a serious flaw in their copy of OpenSSH. Some developer years ago thought that they should run OpenSSH through code checker tools. It gave a warning on one of the lines of code. Instead of fully working out what that line did, they just assumed it was pointless and commented it out. It was only found recently. In doing that, they significantly reduced the keyspace and made it possible to bruteforce keys without needing to spend a few billion years doing it. In short, yes you should be wary of the VMware appliances you can download but I don't think you should be any less wary of the regular software you install.
Microsoft Discloses Government Backdoor on Windows Operating Systems Wednesday, April 30th, 2008 @ 6:00 am | Privacy, News Microsoft may have inadvertently disclosed a potential Microsoft backdoor for law enforcement earlier this week.http://www.infiltrated.net/?p=91
sexion8 wrote: I'm very vigilant about things I put on machines I tinker with often running it on a sniffed network alerting as to what is leaving, running Process Explorer, DLL List, etc. if on Windows, gdb, snoop/tcpdump if on Unix. So to answer your question, as a matter of fact I do watch. In fact if you knew me, you'd know for over 14 years I keep a consistent amount of terminals opened with real time network **** (tcpdump to be exact) along with tail -f'd logs in the background to see what's happening in my realm...
sexion8 wrote: No on to your apples and your oranges... You're comparing two different things here a company and an anonymous user. For a company to attempt to do so, there is the potential backlash associated with being caught.
sexion8 wrote: As for the ramblings on Debian, OpenSSH, etc., there are certain distributions I would not use any longer, Debian, Fedora, etc., if its been determined their machines were compromised. If you haven't forgotten or even known, aside from the Debian SSH melee, Debian had its root servers compromised as did Fedora. There is no guarantee someone didn't insert anything into their operating systems and rehash checksums. All one would need to do is change the checksums on a main server CVS, SVN doesn't matter, and everyone would be replicating tainted code.
sexion8 wrote: In essence, you cannot seriously make an argument about a corporation - which stands to lose a lot more - versus a random attacker posting anonymously, a tainted distribution. Apples, oranges.
tiersten wrote: Unless you sit there and disassemble every single item of software you're not going to know what is going on. Maybe it'll only do something bad once every 1000 runs and only if its a full moon at the time and its 4:39am.
tiersten wrote: Plausible deniability. Or in some cases, just blame it on a bad employee who has been fired/disciplined.
tiersten wrote: Asus has distributed cracking software, serial numbers and confidential documents on some of their recovery disks.
tiersten wrote: If you're that paranoid then how do you trust anybody? SSL certificates aren't 100%. People have managed to get a Microsoft labeled code signing cert issued before.
tiersten wrote: Don't use Linux then. BitKeeper was broken into a few years back. Whoever did it tried to sneak in a backdoor into the Linux kernel code via the CVS gateway. At the time, the BitKeeper repo was the main tree.
tiersten wrote: Because corporations never make a mistake and never have malicious employees working for them? You can't say that QA will catch it if it is a big flaw. ESX and the timebomb is a pretty big one and that got through to release.
tiersten wrote: I give up. You just want to argue and I don't have the time to waste on this anymore.
Compare salaries for top cybersecurity certifications. Free download for TechExams community.