Shared April 22, 2019
Microsoft _NSAKEY is a signing key found in Microsoft's CryptoAPI since Windows 95. Many claimed this was the ultimate backdoor for the National Security Agency. But is this a hoax, or is the _NSAKEY a real backdoor in Microsoft Windows?
A British researcher discovered that Microsoft was cryptographically signing its CryptoAPI with two keys. This means two separate entities could approve software running inside Windows. One of those entities was Microsoft. The identity of the other one remained a mystery.
But then Microsoft shipped a Service Pack 5 for WindowsNT4. Somebody down the chain of command at Microsoft forgot to remove information revealing the true identity of both of the signing keys. Chief security scientist at Ontario-based Cryptonym Andrew Fernandes found the names of the two keys. One was simply called “_KEY”. And the other was “_NSAKEY”.
Security experts & opinions
Code is speech https://www.eff.org/deeplinks/2015/04...
Microsoft NSA cooperation on mass surveillance
CO.AG Music https://www.youtube.com/channel/UCcav...
The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
Linus Torvalds was approached by NSA for backdoor in Linux - Nils Torvalds (father of Linus)
The Amazon monopoly and the problem with Jeff Bezos' business model
GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs
The Rebirth Of Microsoft - How Satya Nadella Saved It (Or Did He?)
The Magic of Chemistry - with Andrew Szydlo
Ultimate smartphone security guide | How to secure your phone tutorial
If you still have a Facebook account, delete it and stop using Facebook
Two Major Cobalt-Related Stories That I Missed Yesterday | TMI
Kevin Mitnick: Live Hack at CeBIT Global Conferences 2015
How facial recognition advertising is becoming your new social contract
Linux vs. Windows | The Fundamental Differences
Radio Hacking: Cars, Hardware, and more! - Samy Kamkar - AppSec California 2016
How Intel wants to backdoor every computer in the world | Intel Management Engine explained
Google vs DuckDuckGo | Search engine manipulation, censorship and why you should switch
The truth about Virtual Private Networks - Should you use a VPN?
How Mark Zuckerberg manipulates everyone | Breaking down Congressional testimonies
iPhones remotely compromised: iOS security is more broken than you think
How to be anonymous on the web? Tor, Dark net, Whonix, Tails, Linux