Subject: !!!!! Germany Govt WARNS: Windows 8 NEVER
USE! Microsoft can control computer - gather ALL Data and a Never Get Rid of
Backdoor for NSA
Sherrie
Questioning All
Through TRUTH we Will Create a Better World Together. There is no
real division of left or right, religions, or anything else, it was all created
to keep us separated. Coming together as ONE in Truth we are the Power! We CAN
and WILL create the world as it is meant to be through Truth of What is and
Ourselves! In Truth We Stand!
Thursday, August
22, 2013
Germany Govt
WARNS: Windows 8 NEVER USE! Microsoft can control computer - gather ALL Data
and a Never Get Rid of Backdoor for NSA
How I can continually being shocked over revelations and Truth of the amount of spying the U.S. government does on it's citizens and other countries?
The German government released a WARNING yesterday about Microsoft's Windows 8.
They are Warning all people and companies NOT to use it. They have revealed that Microsoft can completely control and take over a computer with Windows 8 and it has a backdoor for the NSA that can never be gotten rid of!
They have also made it possible to delete or not accept software on that is not controlled by them on the computer.
This is so Outrageous!
Portions From translated article:
Government warns of Windows 8
Windows 8 is an
unacceptable security risk for companies and authorities, experts warn the
government. The
so-called Trusted Computing is a back door for the NSA.
How trustworthy is Microsoft? For the federal and all of the German authorities, businesses and private users who want to continue to work with the Windows operating system, this question is now more than ever. Because sooner or later they would have to use Windows 8 or its successor. From internal documents TIME ONLINE exist, but it is clear that the IT professionals of the federal Windows 8 deem downright dangerous. The operating system contains a back door in their view, can not be closed. This backdoor is called Trusted Computing and could have the effect that Microsoft can control any computer remotely and control. And thus the NSA.
The current TPM specification is soon replaced by a new one, it
is just 2.0 TPM. What is common already in smartphones, tablets, and game
consoles, is the combination of TPM 2.0 and Windows 8 on PCs and laptops
becoming the norm: hardware and operating system are matched, and the
manufacturer of the operating system determines installed the applications on a
device may be and which are not. In other words, trusted computing is a way, a digital rights
management (DRM) to enforce.
Microsoft could thus theoretically determine that no word
processing program other than Microsoft Word works on Windows 8th The
competition may be legally problematic. But it also has security
implications, precisely because the user has no influence on what Microsoft is
allowed and what is not. Three points are decisive: First, the TPM in
contrast to the current standard in the future is already activated when you
first turn on the computer. Who takes
care of the computer is in use, so can not decide whether he wants to use the
trusted computing functions (opt-in).Second, no subsequent future, complete disabling the TPM longer
possible (opt-out). Third, the operating system
takes over sovereignty over the TPM, in the case of a Windows computer that is
ultimately Microsoft.
In summary, the user of a trusted computing system lose control
of their computer. While this is to some extent the basic idea of trusted
computing,explains
how the Federal Office for Information Security (BSI) here in great detail. The BIS recommends that governments, businesses and
private users even if they use this technique to
certain conditions met. These conditions include
the options but the opt-in and opt-out - and the drop off in the future.
Instead, Microsoft could decide which
programs can be installed on the computer, make already established programs
unusable and subsequently help intelligence to control other computers. The competent professionals in the Federal Ministry of
Economics, in the federal and the BSI as well as unequivocally warn against the
use of trusted computing the new generation of German authorities.
Thus, according to an internal document from the Ministry of
Economic Affairs of the beginning of 2012: "The loss of full sovereignty
over information technology" are "the security objectives
'confidentiality' and 'integrity' is no longer guaranteed." Elsewhere are phrases like:
"Significant impact on the federal IT security can go with it." The conclusion is therefore: "The use of 'trusted
Computing' technique in this form ... is unacceptable for the federal
administration and the operators of critical infrastructure."
This is
UNACCEPTABLE! WE THE PEOPLE HAVE A RIGHT TO BE FREE! WE HAVE A
RIGHT TO FREEDOM TO LIVE OUR LIVES WITHOUT EVERY MOMENT BEING SPIED UPON!
WE HAVE A RIGHT TO BE FREE FROM BEING CONSIDERED A TERRORIST BY OUR
GOVERNMENT WHEN WE HAVE DONE NOTHING WRONG! UNDERSTAND THIS GOVERNMENT
CONSIDERS EVERY SINGLE CITIZEN A TERRORIST NOW! WE WILL NOT SUBMIT TO AN
ORWELLIAN WORLD! WE THE PEOPLE HAVE RIGHTS OUTSIDE OF GOVERNMENT
CONTROL!
VIDEO ::Update: I put a video together about it: http://www.youtube.com/watch?v=bHoOP6aHXv4
--
No comments:
Post a Comment