From owner-freebsd-questions@freebsd.org Sun Jan 27 17:14:44 2019 Return-Path: Delivered-To: freebsd-questions@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 1387214B558B for ; Sun, 27 Jan 2019 17:14:44 +0000 (UTC) (envelope-from galtsev@kicp.uchicago.edu) Received: from kicp.uchicago.edu (kicp.uchicago.edu [128.135.20.70]) by mx1.freebsd.org (Postfix) with ESMTP id 115887348D for ; Sun, 27 Jan 2019 17:14:41 +0000 (UTC) (envelope-from galtsev@kicp.uchicago.edu) Received: from [10.0.0.5] (adsl-108-68-160-150.dsl.chcgil.sbcglobal.net [108.68.160.150]) by kicp.uchicago.edu (Postfix) with ESMTP id 75A27718054 for ; Sun, 27 Jan 2019 11:14:40 -0600 (CST) Subject: Re: Wireless interface To: freebsd-questions@freebsd.org References: <20190126213957.adfeb61c.freebsd@edvax.de> <5C4CE8B8.4030608@gmail.com> <20190127013705.3e8cd5f3.freebsd@edvax.de> From: Valeri Galtsev Message-ID: Date: Sun, 27 Jan 2019 11:14:40 -0600 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.3.0 MIME-Version: 1.0 In-Reply-To: <20190127013705.3e8cd5f3.freebsd@edvax.de> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 115887348D X-Spamd-Bar: + Authentication-Results: mx1.freebsd.org; dmarc=fail reason="" header.from=uchicago.edu (policy=none) X-Spamd-Result: default: False [1.21 / 15.00]; ARC_NA(0.00)[]; DMARC_POLICY_SOFTFAIL(0.10)[uchicago.edu : No valid SPF, No valid DKIM,none]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-0.20)[-0.202,0]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-questions@freebsd.org]; TO_DN_NONE(0.00)[]; NEURAL_SPAM_MEDIUM(0.64)[0.636,0]; RCPT_COUNT_ONE(0.00)[1]; IP_SCORE(-0.02)[country: US(-0.08)]; NEURAL_SPAM_SHORT(0.70)[0.701,0]; MX_GOOD(-0.01)[cached: kicp.uchicago.edu]; RCVD_IN_DNSWL_NONE(0.00)[70.20.135.128.list.dnswl.org : 127.0.10.0]; R_SPF_NA(0.00)[]; RCVD_NO_TLS_LAST(0.10)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:160, ipnet:128.135.0.0/16, country:US]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 27 Jan 2019 17:14:44 -0000 On 1/26/19 6:37 PM, Polytropon wrote: > On Sat, 26 Jan 2019 16:09:44 -0700, JD wrote: >> IMHO, today, there are no OS'es available to the public, >> sans backdoors, spyware and other malware. > > What does make you believe this is true? > > Taking FreeBSD as an example, in how far does it include > either a backdoor, a piece of spyware, or a piece of > malware? > > I'm explicitely _not_ talking about something that you > can install afterwards, or you can be "talked into" > installing. I'm also not talking about web technologies > for tracking and spying, because they use the web browser > and its complexity, which is comparable to the complexity > of a whole OS. And I'm not talking about the means an ISP > can use to track its users or modify their traffic. > Regarding backdoors, considering exploitable errors > (which we don't know of yet) is different from mechanisms > intendedly placed into the OS to circumvent security > barriers provided by the OS or added by the user. > > This is not a sarcastic question. I'm really asking > myself (and you) why FreeBSD could _not_ be considered > to be available to the public _without_ containing > backdoors, spyware, or malware. I 100% agree with Polytropon, and would just add one simple point: FreeBSD is open source system. Everyone in the World can (and some/many do) go and audit the code for backdoors and/or vulnerabilities. This significantly adds to the point that there are none, and it is hard to introduce one that will not be noticed by anyone. To the contrary to proprietary systems which not only hide the source, but also will do all to put you in jail if you reverse engineer (disassemble) their binary code and attempt to publicize spy part if you discover one. Just to mention one example: google's android system. It is _based_ on open source kernel, but has closed source proprietary chunk in it. So, you can re-consider your trust to your android smartphone (if you ever had one). Of course we all learned mathematics, and logically it is difficult to prove FreeBSD does not have malicious code. However for those who claim an opposite: that FreeBSD does have malicious code in it, it is very easy to prove their point. It is sufficient to point to one of them. If one can not point even to single malicious chunk in FreeBSD, one shouldn't insist there is one. Just my $0.02 Valeri > > Sure, as soon as you add a web browser to the mix, you > can get at least the commonly accepted (!) "crap of the > web" if you wish - but that's not something the OS will > contain in a default installation. :-) > > > -- ++++++++++++++++++++++++++++++++++++++++ Valeri Galtsev Sr System Administrator Department of Astronomy and Astrophysics Kavli Institute for Cosmological Physics University of Chicago Phone: 773-702-4247 ++++++++++++++++++++++++++++++++++++++++