-- Leo's gemini proxy

-- Connecting to gemini.techrights.org:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-GB

● 09.16.21


Gemini version available ♊︎


●● Microsoft Azure and Back/Bug Doors in GNU/Linux: Fool Me Once (Shame on You) / Fool Me Twice (Shame on Me)


Posted in GNU/Linux, Microsoft, Security at 2:46 am by Dr. Roy Schestowitz


Summary: “Fool me once, shame on you; fool me twice, shame on me,” goes the old saying…


2016: Microsoft update servers left all Azure RHEL instances hackable


> Image: Microsoft update servers left all Azure RHEL instances hackable


5 years later: OMIGOD: Azure users running Linux VMs need to update now


Critical Flaws Discovered in Azure App That Microsoft Secretly Installs on Linux VMs


I’ve asked an associate whether it’s worth covering this latest “incident” and dub that a “back door”, based on what is generally known about Microsoft’s policy on security (the real policy, not what they tell the public or say in hearings about “security”).


↺ what is generally known about Microsoft’s policy on security


“I think so,” the associate responded, “if it is done in the right way.”


“This post [from Christian Imhorst] frames it right,” he said, as “bug doors / back doors, it’s all the same [because] sufficiently advanced incompetence is indistinguishable from malice, and vice versa. Azure is there to ensure that gullible users don’t escape the surveillance of the Microsoft products.”


↺ This post


Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.


Permalink > Image: Mail


 Send this to a friend


Permalink

↺ Send this to a friend



----------

Techrights

➮ Sharing is caring. Content is available under CC-BY-SA.

-- Response ended

-- Page fetched on Sat May 4 23:45:45 2024