Feeds

Windows leak dangers ‘exaggerated’

No serious security calamity here. Move along...

  • alert
  • submit to reddit

Internet Security Threat Report 2014

RSA Don't worry: last month's leak of Windows source code will not compromise your IT security - any more than it is already.

Some commentators (from example here and here) have talked up the danger of million of lines of Microsoft Windows 2000 and Windows NT 4.0 source code becoming available to crackers, virus writers and other cyber criminals.

But security specialists on the cryptographer's panel at the RSA Conference in San Francisco last week characterise the leak as a "minor data point in the open source debate", rather than a serious security calamity.

None thought it would make much difference in the number of vulnerabilities or exploits affecting Windows. However, the incident drew some unfavourable comparisons between open source and closed source security models.

Paul Kocher, chief scientist at Cryptographic Research, expressed irritation that security researchers couldn't examine the code for legal reasons: "We can't look at the code to help defend against attacks but the bad guys can. It's the worst of all possible worlds."

Adi Shamir, professor at Israel's Weizmann Institute of Science and noted cryptographer, disagreed with him. He didn't want to pore through millions of lines of source code - legally or not - because this would be "incredibly boring".

The application of the latest code-inspection tools on portions of the three year-old code might highlight new vulnerabilities. So making the leaked code public would be good from a security perspective - at least in theory.

Nobody expects Microsoft to do this. Even if it did, it wouldn't make any difference to elite hackers, according to Bruce Schneier, chief technology officer at Counterpane Internet Security.

"Any intelligence service worth its salt already has access to the source code," he said. ®

Related Stories

Windows source code exploit released
MS Windows source code escapes onto Internet
MS partner fingered in Windows code leak, Linux box implicated
Open and closed security are roughly equivalent
Microsoft's Shared-Source defeats Trustworthy Computing

The Register RSA coverage in full

Internet Security Threat Report 2014

More from The Register

next story
Bladerunner sequel might actually be good. Harrison Ford is in it
Go ahead, you're all clear, kid... Sorry, wrong film
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
Forget Hillary, HP's ex CARLY FIORINA 'wants to be next US Prez'
Former CEO has political ambitions again, according to Washington DC sources
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.