Platform Dependablity & Trust
Businesses & Consumers want dependable software, that is, Sustainable Software that they can Trust.
There are 2 ways an entity can build Trust on it’s software:
- Source Code verifiability for product security
- Vendor credibility verifying product security
Microsoft Windows has already lost this ‘trust’ through Spams, Blackmails, _NSAKEY, and not fixing critical bugs. So Microsoft changed it’s definition of ‘trust’ in computing: devices with dedicated microprocessor designed to secure the hardware against consumers, and only allow software signed(authorized) by the device manufacturer to run on the device.
Microsoft (with help of Intel) enforces this ‘trust’ through a microprocessor called Trusted Platform Module(TPM), and firmware called UEFI Secure Boot.
UEFI Secure Boot is not designed to secure computers against Hackers and spies. UEFI Secure Boot is designed to secure your computer against you. Yes, it is designed to restrict you from loading Operating Systems not authorized by Microsoft. This means only Microsoft authorized Operating Systems can be loaded. And NSA/CSS can use the backdoors in UEFI Secure boot to monitor and crash your UEFI Secure Boot computer.
This is leading to a mass exodus from the Windows ecosystem. Germany has already warned against using Windows 8, and China has banned Windows 8, due to UEFI. Now, Russia is moving to ban Windows 10, due to it’s spyware capabilities.
As of the release of Windows 10, Microsoft now has new privacy policies:
we(Microsoft) may access, disclose and preserve your personal information, including your private content (such as the content of your emails, other private communications or files in private folders), when we have a good faith belief that doing so is necessary to:
- comply with applicable law or respond to valid legal process from competent authorities, including from law enforcement or other government agencies;
- protect our customers, for example to prevent spam or attempts to defraud users of the services, or to help prevent the loss of life or serious injury of anyone;
- operate and maintain the security of our services, including to prevent or stop an attack on our computer systems or networks; or
- protect the rights or property of Microsoft, including enforcing the terms governing the use of the services – however, if we receive information indicating that someone is using our services to traffic in stolen intellectual or physical property of Microsoft, we will not inspect a customer’s private content ourselves, but we may refer the matter to law enforcement.
Note that, the above policy allows your private & confidential files to be accessed by ‘other government agencies’. (HINT: NSA)
And if you have a Microsoft account(use Microsoft services), then it also collects your personal, intimate, and confidential details:
(Microsoft will collect) your first and last name, email address, postal address, phone number, other contact data,… age, gender,… Interests, favorites,… passwords, password hints,… payment data such as your credit card number, (Bank details etc.)
Online usage of Operating systems, as of August 2015:
“A business that does not adapt & innovate for the needs of it’s generation, will go out of business in that generation.“
So, my question is, how will SAP keep it’s customers who are now moving onto Linux or other alternatives ? Oracle is already ahead of us with solutions on Linux systems.
My other Posts: