-- Leo's gemini proxy

-- Connecting to gemini.techrights.org:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-GB

● 01.30.21


●● Fake Security is Still a Real Problem, Even in the GNU/Linux (and BSD) Spheres


Posted in Deception, GNU/Linux, IBM, Red Hat, Security, Servers at 9:21 am by Dr. Roy Schestowitz


Video download link


↺ Video download link


http://techrights.org/videos/fake-encryption.webm


Summary: There’s a false sense of security and privacy, perpetuated in part by corporate media, and we need to go back to basics


THERE is a profound difference between real security (or privacy) and promises of security (false marketing) from government informants such as Microsoft or Google. Like charlatans who promote so-called ‘secure’ boot (basically another Microsoft- and Intel-connected vulnerability marketed as “smart” and supposedly ‘novel’ [1, 2], seeking to replace what already works solidly by adhering to simplicity).


↺ Microsoft

↺ so-called ‘secure’ boot

1

2


“IBM-controlled Red Hat should have all of its code scrutinised, even if it’s Free software. Their overall agenda isn’t the same as Debian’s, for instance.”In order to generally confuse the “average users”, products that don’t offer real security and generally seek to data-mine people (the opposite of guarding privacy) are being painted in the mainstream media as “privacy” and “safety”.


The video above focuses on IBM/Red Hat, knowing that a lot of people out there typically overlook this elephant in the room, wrongly assuming only “GAFAM” work for imperialism while not accounting for Oracle, IBM, and a few other government contractors that are close to the military and espionage operations.


elephant in the room


The above mentions 9 articles about IBM/Red Hat (especially Red Hat). In chronological order:


Trusting Trust and Trusting Red Hat et al.For Real Security, Use CentOS — Never RHEL — and Run Neither on Amazon’s ServersIBM Shows That Collaborations With the NSA Are a Company’s Death KnellPoll: Only 39% Trust Red Hat Over Back DoorsRed Hat Joins the Joke Which is Amazon’s ‘Secure’ Federal ‘Cloud’Red Hat Should Keep Its Distance From NSA Facilitator MicrosoftRed Hat and NSA: This is Not NewsRed Hat’s CEO is Still Connected to the NSA Through the Hortonworks BoardMixed Loyalties, Including to a Surveillance Industry


There’s the old saying, “trust, but verify…”


In the case of Red Hat, “trust” has long been absent and IBM is even worse. So an IBM-controlled Red Hat should have all of its code scrutinised, even if it’s Free software. Their overall agenda isn’t the same as Debian’s, for instance. Unfortunately, over time, Debian and Ubuntu become just another Red Hat/Fedora by adopting GNOME3, systemd, Wayland and so on. There are risks associated with that extra complexity and relatively immature/barely audited code. █


Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.


Permalink  Send this to a friend


Permalink

↺ Send this to a friend



----------

Techrights

➮ Sharing is caring. Content is available under CC-BY-SA.

-- Response ended

-- Page fetched on Mon May 13 09:12:57 2024