Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

Re: Manager Swaps Aimed at Saving Windows

__/ [ Tom Shelton ] on Saturday 14 October 2006 00:37 \__

> Roy Schestowitz wrote:
>> __/ [ Roy Culley ] on Saturday 14 October 2006 00:09 \__
>> > begin  risky.vbs
>> > <1160780646.626981.315300@xxxxxxxxxxxxxxxxxxxxxxxxxxxx>,
>> > "Tom Shelton" <tom_shelton@xxxxxxxxxxx> writes:
>> >>
>> >> You might want to take a look at "Blue Pill".  The prototype was
>> >> Vista,x64 but according to the above Black Hat:
>> >>
>> >> <Quote>
>> >> Rutkowska stressed that the Blue Pill technology does not rely on
>> >> any bug of the underlying operating system. "I have implemented a
>> >> working prototype for Vista x64, but I see no reasons why it should
>> >> not be possible to port it to other operating systems, like Linux or
>> >> BSD which can be run on x64 platform," she added.
>> >> </Quote
>> >>
>> >> This is one that maybe the Linux people should be worried about as
>> >> well.
>> >
>> > And I'm sure they will. I read about Blue Pill a couple of months or
>> > more ago but little has been mentioned of it since. Is it a viable
>> > attack vector or not?
>> I can only see Windows mentioned.
>> http://en.wikipedia.org/wiki/Blue_pill_%28malware%29
>> The last time I heard about a 'flaw' that compromised Apple's OS X and
>> GNU/Linux it was "a joke" (Firefox FUD). It seems like trolling
>> (hypothetical) which intensifies the magnitude of the issue and attracts
>> media attention.
>> Best wishes,
>> Roy
> I meant to post the link to the quote and forgot.  The quote - from the
> author of Blue Pill - came from:
> http://www.eweek.com/article2/0,1895,1983037,00.asp

I could recall that, at the time, some doubt was cast. The Wikipedia page
links to:


I think you've just mentioned this, actually. There are many doubts when the
east-European hackers (they are really good by the way; see
http://www.infoworld.com/article/06/10/13/42OPanalysts_1.html) argue there's
a flaw. Another recent example would be that Apple so-called wi-fi flaw.
Let's not get into conspiracy theory, but a lot of these 'hacks' are
lavishly publicised in Microsoft-sponsored conferences (more latterly
Firefox was a victim of slander). And Microsoft employs some of these

Microsoft Secures Vista With LSD

,----[ Quote ]
| In 2003, the group of four Polish security researchers discovered
| the vulnerability that would later be used by others to unleash the
| Blaster worm, but because of distrust over Microsoft's willingness
| to address software flaws at the time, members had to be coaxed
| into sharing their findings.
| The group, known as LSD, is now on Microsoft's payroll...


Best wishes,


Roy S. Schestowitz     | Kernel panic - more exciting than being /.'ted
http://Schestowitz.com  |  GNU is Not UNIX  |     PGP-Key: 0x74572E8E
roy      pts/3        cg001a.halls.man Fri Oct 13 20:07   still logged in   
      http://iuron.com - proposing a non-profit search engine

[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index