-- Leo's gemini proxy
-- Connecting to gemini.techrights.org:1965...
-- Connected
-- Sending request
-- Meta line: 20 text/gemini;lang=en-GB
Gemini version available ♊︎
Posted in GNU/Linux, Microsoft, Security at 2:46 am by Dr. Roy Schestowitz
Summary: “Fool me once, shame on you; fool me twice, shame on me,” goes the old saying…
2016: Microsoft update servers left all Azure RHEL instances hackable
> Image: Microsoft update servers left all Azure RHEL instances hackable
5 years later: OMIGOD: Azure users running Linux VMs need to update now
Critical Flaws Discovered in Azure App That Microsoft Secretly Installs on Linux VMs
I’ve asked an associate whether it’s worth covering this latest “incident” and dub that a “back door”, based on what is generally known about Microsoft’s policy on security (the real policy, not what they tell the public or say in hearings about “security”).
“I think so,” the associate responded, “if it is done in the right way.”
“This post [from Christian Imhorst] frames it right,” he said, as “bug doors / back doors, it’s all the same [because] sufficiently advanced incompetence is indistinguishable from malice, and vice versa. Azure is there to ensure that gullible users don’t escape the surveillance of the Microsoft products.”
Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
Permalink > Image: Mail
Send this to a friend
----------
➮ Sharing is caring. Content is available under CC-BY-SA.
-- Response ended
-- Page fetched on Sat May 4 23:45:45 2024