Home » Research » About » IT vs OT | When Facing The Insider Threat What Happend Free Software vs Open Source | ask me |

March, 2016:
Cueball was telling Priscilla about Ubuntu the other day, and the conversation was a lot like this:


Cueball speaking:

CUEBALL: "So, do you know what Ubuntu is?"


CUEBALL: "It's an operating system for computers. It's free and you can download it from their website."

PRISCILLA: "And why would I want to download it? :confused:"

Priscilla speaking:

CUEBALL: "Well, it's got a lot of advantages. It's, well, free...it's very customizable, gets no spyware or viruses, open source etc."

PRISCILLA: "Really? No viruses?"

CUEBALL: "Nope, unless you try extremely hard to get one."

PRISCILLA: "Cool...I'll look it up."



At which point the conversation switched topic to the windy, cold, Autumn weather.


There is NO CLOUD - Just other people's computers - fsfe.orgPeople using linux only for PORN
Anyway, so yesterday I head over to his house, and he starts up one of his three computers. The little screen  pops up and asks "Ubuntu" or "Windows Vista". He selects Ubuntu, and then starts raving about how great it is.


He then tells me once it starts up that it's wonderful for PORN. He said that he had been browsing tons of sites, and didn't have to worry about any viruses! I was a little taken aback, but I started to laugh afterwords. He said that he got viruses and spyware all the time on Vista, but so far didn't get any on Ubuntu. 


Anyway, I've been thinking about it, and I bet there's probably a lot of people using Linux only for porn, so that they don't get viruses. :eek:


Ubuntu uses the information about searches to show the user ads to buy various things from Amazon. Amazon commits many wrongs (see http://stallman.org/amazon.html); by promoting Amazon, Canonical contributes to them. However, the ads are not the core of the problem. The main issue is the spying.


Ubuntu, a widely used and influential GNU/Linux distribution, has installed surveillance code. When the user searches her own local files for a string using the Ubuntu desktop, Ubuntu sends that string to one of Canonical's servers. (Canonical is the company that develops Ubuntu.)

If you ever recommend or redistribute GNU/Linux, please remove Ubuntu from the distros you recommend or redistribute. [...] In your install fests, in your Software Freedom Day events, in your FLISOL events, don't install or recommend Ubuntu. Instead, tell people that Ubuntu is shunned for spying. Richard Stallman[1]

In meanwhile, Cueball knows how to read the source code. He knows how to program. He understands how a dual boot works. He understand about partitions. He understand about boot loaders. He is one of them. He knows how to use free and open source software. He knows how and why open source licensing started. He understand how and why the licenses work the way they do. Talking about one of those that knows how AB dual boot works and you know how to set one up.

This is a new web page...

What if? If a pretender could be ANYONE...
How Did You Discover Linux? | Insider threat tactics

Insider threat tactics: The hacker speaks by Priscilla

· Priscilla Felicia Harmanus · 1993 from the Netherlands · Last update: 25 aug 2020    

How I discovered Free Software and met RMS 

How To Install Proprietary Closed Software in Ubuntu 
Your Grandma on linux - explain

No one knows who I am yet and what kind
of content I produce. So why not focus on a topic that 
people are 
already searching for, right?

What happend...

If a pretender could be ANYONE... 
then you could have so many and interesting episodes that
the show could last for a long time. 
In the workplace, the hacker or insider can
simply walk in the door, like in the movies, and pretend to be a maintenance worker or
consultant who has access to the organization. Then the intruder struts through the
office until he or she finds a few passwords lying around and
emerges from the building with ample information to
exploit the network from home later that night. 
However, it isn’t
convenient or even remotely easy for some people to just
switch operating systems at the bat of an eye.

Skill gap.
Chances are
you've grown up with a PC a smartphone a

tablet or all three if you're 18 you

could have 12 years of experience using
a computer and let's be honest 
and that means you already 

 know things that older generations have
had to be trained on.

Thanks to the Internet I have 
an incredible amount of information at my fingertips.
no one knows who I am yet and what kind
of content I produce. Know what it's like 

 when starting a YouTube Channel from scratch.

Those vlogging type videos you will get attraction. 
But in the beginning, it's much more difficult
to get attraction if you are not well known.

So why not focus on a topic that people 
are already searching for, right?

Because people go on youtube, 
they wanna find out how do I do something?
And once for having millions of followers and subscribers,
sure, my trip to Europe with Richard Stallman, people
want to know hey, 
what is going on, I wanna know.



What Happens When Your Power Goes Out? This is a new web page... Could this happen to you?

It used to be that when you bought an appliance, you owned it, and you could take it apart, repair it, and plug in whatever accessories you wanted without the manufacturer's knowledge or permission.

Nowadays, software enables devices to do new, useful things, but it also enables manufacturers to exert more control than ever before over their customers. Manufacturers use software to ensure a device serves their financial interests throughout its lifetime, forcing you to go to an authorized repair shop, buy official parts, and stay out of the secret workings of the device that would let you know what it's doing with the data it collects about you.

The name GNU is a recursive acronym for “GNU’s Not Unix”, mostly chosen as it was a real word and fun to say ([FSF17]). This date marks the creation of the Free Software Movement that later evolved into the Free Software Foundation (FSF). The approach to open source was highly oriented towards an interpretation of software liberty back then, with the famous quote from Stallman: “‘Free software’ is a matter of liberty, not price. You should think of ‘free’ as in ‘free speech,’ not as in ‘free beer.'” ([FSF19]). This origin of the Free & Open-Source Software (FOSS) community still explains today why GNU open source licenses are more restrictive for corporations as they always underlie the release of any source code developed from a GNU licensed code.

In the 1980s, almost all software was proprietary, and one of the main goals of the FSF was to create the first real free operating system, and by the early 1990s, the GNU project had most of the major components of a free operating system, such as a compiler, editor, text formatter, mail software, graphic interface, libraries, etc. Nonetheless, the last missing piece of this ecosystem was a full operating system called Kernel. It’s only in 1991 that Linus Torvald released this missing piece with the open-source project Linux, the complete Linux operating system incorporates many elements from Stallman’s GNU project. While Linux is probably the world’s largest and most successful open-source project in history, it’s perhaps thanks to Torvald’s second-biggest open-source project Git – which aimed to help developer collaboration on the Linux Kernel source code in 2005 – that the open-source world could start to take over the proprietary world. The main reason behind Git’s success in open-source projects is that it didn’t need to be continuously synchronized with a code repository. This specificity enabled a large number of developers to collaborate in a decentralized and asynchronous manner. However, it’s GitHub in 2008 that imposed Git as the standard for open-source collaboration by giving it a web interface and a social dimension overpassing the legacy client-server version control systems such as CVS and SVN.



Home » Research » About » IT vs OT | When Facing The Insider Threat What Happend Free Software vs Open Source | ask me |

Do you know the signs of suspicious activity? Find out. You are here e-waste by Priscilla