Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Only a partial removal? (Score 3, Insightful) 266

The discussion is far from moot. Security also involves mitigation. By assuming your OS is fucked in the first place, you get programs that should in theory provide more security by using their own stuff instead of the OS, thus mitigating (or outright eliminating in some cases) the specific threat to the point of rendering it useless. Thus, even if the OS isn't actually compromised, you've still greatly managed to increase your security over the baseline.

Comment Re:Only a partial removal? (Score 2) 266

"I got news for you if your primary OS cert store gets fucked you are fucked."

Given the history of the NSA and Microsoft, you're better off assuming the OS cert store is fucked in the first place, sir.

There's a good reason to have security on every program with its own rules.

Comment Re:Only a partial removal? (Score 3, Insightful) 266

"Well Mozilla products are defective in this area IMHO. They should system certificate stores by default rather than their own."

Nope. Having your own cert store protects you if the primary OS cert store gets fucked.

My god it is like the lessons of granular security have just been totally forgotten, these days.

Comment Re:All the more reason... (Score 1) 248

Wrong. You can live hot-swap. This is a trick that has been around for ages for single-BIOS machines. You boot up with a known good BIOS, after the system has loaded up, while it's still live, you pull the good BIOS chip, insert the bricked one, run your firmware update. Did you even read the entirety of my original statement where this was specified?

Comment Useless (Score 5, Informative) 266

I will guarantee you that this particular 'update' will only take care of the core OS infection. If you have FF, Opera, or Thunderbird, do not expect this to work. You're stuck fixing those programs and their cert stores on your own.

I wouldn't trust Lenovo, anyways. They can't keep a story straight.

First they say 'Between October and December' and then just a few lines later contradict themselves by saying they stopped in January.

Then they further contradict their words by releasing a security advisory stating they stopped in February.

We know this software has been on Lenovo laptops since June, at the least. So the Oct-Dec statement is a lie. Three straight lies in a row.

Simply put, you cannot trust this company any longer. Their 'fix' is a lie, their statements are lies, and they're trying to save face to avoid the Federal hand of pain bearing down upon them.

Comment Re:"Lenovo Allegedly Installing "Superfish" Proxy. (Score 1) 248

"Well, it just so happens that when you install a nice, secure OS instead of the spyware that comes with your Lenovo product, you do not have to worry about this issue"

Except this stuff can hit FF and Opera and Thunderbird, which don't use the OS's cert store. Which means FireFox on Linux and BSD can get fucked as well.

And since this crapware is utilized as the base for many other programs, many of which have Linux ports, you can be rest-assured that there are quite likely infected Linux machines.

Well, no surprise someone freely espousing OSS nonsense wouldn't have half a fucking clue what they're talking about.

Comment Re:Caught with their pants down. (Score 1) 248

Yup, lying sacks of shit. I caught them in their lie, too.

They say they stopped this in December?

Why does this say it stopped in January here in the official topic?

Why does this updated "security advisory" state February as the actual stopping month?

Lenovo is a lying sack of shit. We should start a change.org petition and tell the Gov't to bar Lenovo from all future USGov't contracts.

Slashdot Top Deals

"Money is the root of all money." -- the moving finger

Working...