Thursday, August 22, 2013

Germany’s Windows 8 Warning

Germany Govt WARNS: Windows 8 NEVER USE! Microsoft can control computer - gather ALL Data and a Never Get Rid of Backdoor for NSA

How I can continually being shocked over revelations and Truth of the amount of spying the U.S. government does on it's citizens and other countries?

The
German government released a WARNING yesterday about Microsoft's Windows 8.

They are Warning all people and companies NOT to use it.  They have revealed that Microsoft can completely control and take over a computer with Windows 8 and it has a backdoor for the NSA that can never be gotten rid of!

They have also made it possible to delete or not accept software on that is not controlled by them on the computer.  This is so Outrageous!

Portions From translated article: 
Government warns of Windows 8

Windows 8 is an unacceptable security risk for companies and authorities, experts warn the government. The so-called Trusted Computing is a back door for the NSA.

How trustworthy is Microsoft? For the federal and all of the German authorities, businesses and private users who want to continue to work with the Windows operating system, this question is now more than ever. Because sooner or later they would have to use Windows 8 or its successor. 
From internal documents TIME ONLINE exist, but it is clear that the IT professionals of the federal Windows 8 deem downright dangerous. The operating system contains a back door in their view, can not be closed. This backdoor is called Trusted Computingand could have the effect that Microsoft can control any computer remotely and control. And thus the NSA

The current TPM specification is soon replaced by a new one, it is just 2.0 TPM.What is common already in smartphones, tablets, and game consoles, is the combination of TPM 2.0 and Windows 8 on PCs and laptops becoming the norm: hardware and operating system are matched, and the manufacturer of the operating system determines installed the applications on a device may be and which are not. In other words, trusted computing is a way, a digital rights management (DRM) to enforce.
Microsoft could thus theoretically determine that no word processing program other than Microsoft Word works on Windows 8th The competition may be legally problematic. But it also has security implications, precisely because the user has no influence on what Microsoft is allowed and what is not. 

Three points are decisive: First, the TPM in contrast to the current standard in the future is already activated when you first turn on the computer. Who takes care of the computer is in use, so can not decide whether he wants to use the trusted computing functions (opt-in).Second, no subsequent future, complete disabling the TPM longer possible (opt-out). Third, the operating system takes over sovereignty over the TPM, in the case of a Windows computer that is ultimately Microsoft.
In summary, the user of a trusted computing system lose control of their computer. While this is to some extent the basic idea of trusted computing,explains how the Federal Office for Information Security (BSI) here in great detailThe BIS recommends that governments, businesses and private users even if they use this technique to certain conditions met. These conditions include the options but the opt-in and opt-out - and the drop off in the future. 

Instead, Microsoft could decide which programs can be installed on the computer, make already established programs unusable and subsequently help intelligence to control other computers. The competent professionals in the Federal Ministry of Economics, in the federal and the BSI as well as unequivocally warn against the use of trusted computing the new generation of German authorities.
Thus, according to an internal document from the Ministry of Economic Affairs of the beginning of 2012: "The loss of full sovereignty over information technology" are "the security objectives 'confidentiality' and 'integrity' is no longer guaranteed." Elsewhere are phrases like: "Significant impact on the federal IT security can go with it." The conclusion is therefore: "The use of 'trusted Computing' technique in this form ... is unacceptable for the federal administration and the operators of critical infrastructure."

This is UNACCEPTABLE!  WE THE PEOPLE HAVE A RIGHT TO BE FREE!  WE HAVE A RIGHT TO FREEDOM TO LIVE OUR LIVES WITHOUT EVERY MOMENT BEING SPIED UPON!  WE HAVE A RIGHT TO BE FREE FROM BEING CONSIDERED A TERRORIST BY OUR GOVERNMENT WHEN WE HAVE DONE NOTHING WRONG!  UNDERSTAND THIS GOVERNMENT CONSIDERS EVERY SINGLE CITIZEN A TERRORIST NOW!  WE WILL NOT SUBMIT TO AN ORWELLIAN WORLD!  WE THE PEOPLE HAVE RIGHTS OUTSIDE OF GOVERNMENT CONTROL!  

Source:  SharrieQuestioningAll@blogspot.com, 8/22/13 via Email from Victoria Baer who added:  “This needs to be verified”.

No comments: