Feeds

So, Linus Torvalds: Did US spooks demand a backdoor in Linux? 'Yes'

Bless me barnacles, tha' tricksy Finn be joshin' ... yarr?

Choosing a cloud hosting partner with confidence

Linux supremo Linus Torvalds has jokingly admitted US spooks approached him to put a backdoor in his open-source operating system.

During a question-and-answer ‪session ‬at ‪the LinuxCon gathering in New Orleans this week‪, Torvalds ‬and his fellow kernel programmers ‪w‬ere‪ asked by moderator Ric Wheeler whether America's g-men leaned on the Finn to compromise Linux's security, allowing spies to infiltrate computers.

Torvalds replied with a firm "no" while nodding his head to say yes, a response greeted with laughter fr‪o‬m the audience. He quickly followed up by repeating "no" while shaking his head in the negative.

South Korean Red Hat developer Tejun Heo, sitting alongside the kernel boss, quipped: "Not that I can talk about." A video of the Q&A session is below - the short exchange about US spooks starts at the 24-minute mark.

Rumours of backdoors and other forms of hidden access routes in Microsoft Windows, Linux and security protection products have circulated in infosec circles for years. Fresh revelations from NSA whistleblower Edward Snowden that US and UK intelligence have subverted key technologies have reopened the debate.

These blockbuster claims from Snowden suggest that the NSA can crack TLS/SSL-encrypted connections, the widespread crypto securing HTTPS websites and virtual private networks (VPNs). Spooks can compromise these supposedly secure communications by gaining access to the root certificates and encryption keys, exploiting backdoors in equipment and algorithms, or otherwise allowing the signals boys and girls to run man-in-the-middle attacks on encrypted traffic flowing through the world's fibre optic cables.

The NSA's highly classified Bullrun programme relies, at least in part, on collaboration with unnamed technology companies.

Firsthand evidence from a former engineer at Microsoft sheds light on how the feds theoretically go about asking for special favours: Peter Biddle, an ex-Microsoft programmer who worked extensively on BitLocker - the company's full-disk encryption tool - claimed he was informally approached by g-men to add a backdoor to the product.

But he said he rebuffed the government agencies. The pressure on Biddle came primarily from FBI agents who said they needed a skeleton key, of sorts, to easily break the crypto on suspects' computers in child-abuse investigations, allowing the locked-up data to be examined.

Meanwhile, Nico Sell, founder of the pro-privacy self-destructing-messages app Wickr, said she had been informally approached by an FBI agent about placing a law-enforcement backdoor in her software.

It seems that developers are informally sounded out about the possibility of placing secret access to spooks in their technology before the discussion goes any further on the technical details and requirements. Once a programmer snubs the feds, the g-men back off, it's believed.

In light of these revelations, worried netizens have become far more paranoid about the possibility of backdoors in the technology they use and this paranoia extends to both closed-source and open-source software.

Earlier this month Torvalds rejected a petition calling for his kernel to turf out an Intel processor instruction called RdRand, which is used in the generation of cryptographically secure random numbers. It was feared Chipzilla had deliberately weakened that operation under the influence of US spooks to produce cryptographically weak values, ones that can be predicted by intelligence agents to smash encryption.

The fiery Finn dismissed the petition as technically clueless.

El Reg reckons his response to a question about backdoors at LinuxCon was intended as a joke - but just because you're not paranoid that doesn't mean they aren't out to get you, after all. ®

Beginner's guide to SSL certificates

More from The Register

next story
NASTY SSL 3.0 vuln to be revealed soon – sources (Update: It's POODLE)
So nasty no one's even whispering until patch is out
Russian hackers exploit 'Sandworm' bug 'to spy on NATO, EU PCs'
Fix imminent from Microsoft for Vista, Server 2008, other stuff
US government fines Intel's Wind River over crypto exports
New emphasis on encryption as a weapon?
To Russia With Love: Snowden's pole-dancer girlfriend is living with him in Moscow
While the NSA is tapping your PC, he's tapping ... nevermind
Forget passwords, let's use SELFIES, says Obama's cyber tsar
Michael Daniel wants to kill passwords dead
Slap for SnapChat web app in SNAP mishap: '200,000' snaps sapped
This is what happens if you hand your username and password to a 3rd-party
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Win a year’s supply of chocolate
There is no techie angle to this competition so we're not going to pretend there is, but everyone loves chocolate so who cares.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.