Home » Research » About » IT vs OT | When Facing The Insider Threat | What Happend | Free Software vs Open Source | ask me |
· Priscilla Felicia Harmanus · 1993 from the Netherlands · Last update: 21 juli 2020
No one knows who I am yet and what kind
of content I produce. So why not focus a topic that
people are already searching for, right?
WHAT IS YOUR #1 REASON FOR USING LINUX? | Insider threat tactics
- When there are OS updates...
The Fight for a Secure Linux BIOS ★
The primary reason Linux is more secure than Windows is that Linux does not have an open back door so nobody other than you can modify your computer. ★
One reason many people are moving from Windows to Linux is security. People are tired of getting their Windows computers hacked every time they go online. The problem is that the Windows operating system has a Call Home function that is basically an open back door for hackers. But what is the point of having a secure Linux operating system on your computer if it has another program – the BIOS - that still has a Call Home function? In this article, we will explain why BIOS is important and describe the past, present and future of our fight for a secure Linux BIOS.
This chapter is not just about Linux Security but about computer security in general. Switching from Windows to Linux is a good first step in securing your documents and data, but it is not the only step. Adding secure backups for documents and programs is a good second step but there are still more issues to be aware of in protecting our computer as well as our programs and documents. Earlier we explained how Linux uses a series of keys or security firewalls to protect the core of our computer.
While providing a great deal of evidence that Linux computers, even without taking any security precautions are much safer than Windows computers. folks think that all they have to do is install Linux on their computer and set up a secure backup system and they are fully protected and do not need to worry about security. Nothing could be further from the truth. In this section, we will review some of the Advanced Persistent Threats (APTs) to Linux computers. Then in the next section, we will review some steps you can take to see if your computer has been attacked (the answer is yes) and steps you can take to improve your Linux security.
Microsoft creates obstacles to prevent you from adding Linux ★
Sadly, Microsoft does not want people to use Linux. Microsoft seems to be doing everything they can to keep their corporate monopoly. They want the money that will come from forcing XP users to pay $500 each to change from Windows XP to Windows 10. There are 600 million Windows XP users in the world today and Microsoft wants all 600 million XP users to spend $500 each to “upgrade” to Windows 10 and Office 365. Microsoft stands to lose $300 billion dollars if folks ever learn that they can easily switch to Linux and LibreOffice and get a much more stable and reliable word processing system for free.
The Windows operating system is the key to maintaining the Microsoft computer monopoly. So Microsoft has placed all kinds of malicious roadblocks, obstacles and traps to prevent people from using Linux. Up until 2007, Microsoft maintained control over their lucrative monopoly by using their Internet Explorer Open Back Door to crash pirate copies of Windows. However, with the introduction of Linux Ubuntu and Linux Mint in 2007, suddenly computer users had a much better and more user-friendly option. It was only a matter of time before folks realized there was something better and that would be the end of the Microsoft Monopoly.
Switching to Linux also meant that the NSA would no longer be able to remotely control our computers.
Something had to be done. Neither Microsoft nor the NSA want people to control their own computers by switching to Linux. A way was needed to control computers even if folks switched to Linux. The solution to this problem was to replace the former “BIOS” startup program to a secret UEFI startup program – a program that was 20 times bigger that BIOS and used encrypted coding to prevent users from knowing what was in it. As detailed, this switch occurred in late 2007 – the same year Microsoft became an NSA “Prism” Partner.
Because it is common for folks to confuse the Windows Open Back Door with the Microsoft Kill Switch, a graphic is created that explains the difference:
What is a Start Up Program? ★
To understand the problem with UEFI and Secure Boot, it is helpful to know a little about how computers start up. When you push the POWER ON button on your computer, this initiates a Start Up program. Historically, the universal startup program was called BIOS which stands for Basic Input Output System. This Start Up program is installed by the computer manufacturer. BIOS determines what program boots next and in what order.
Typically, the next program to boot is the Windows Boot Manager. This starts Windows which then can be used to start Windows based programs such as MS Office. There are free open source versions of all of these as shown in the link below: