Fedora Core 2 Test 2 - delayed

Vincent pros-n-cons at bak.rr.com
Tue Mar 2 00:38:51 UTC 2004


On Mon, 01 Mar 2004 02:22:58 -0500
seth vidal <skvidal at phy.duke.edu> wrote:

> 
> > The NSA would need to be stupid to do something like this: introduce
> > backdoors in code who has their mark all over it and who is likely to
> > be scrutinized because "it is code from NSA".  What the NSA would do is
> > have one of their guys become a linux contributor without saying
> > he is from NSA.  Even better, corrupt/blackmail one of Linux regular
> > contributors preferrently one who is quite high in the "chain of command".
> 
> yes. Our plan is working perfectly. 
> 
> 
> muahahahahahahahahahahahha
> 
> -sv
> 
> 
> 
> -- 
I find it over the top aswell, the code is open but I'm not sure trusting governments
by default is such a good idea either, The US government (CIA) has already played
this game and is infact credited by some for the fall of the USSR's economy due to
a trojan'd software bug.
http://msnbc.msn.com/id/4394002/
some interesting quotes:
"In order to disrupt the Soviet gas supply, its hard currency earnings from the 
West, and the internal Russian economy, the pipeline software that was to run the
pumps, turbines, and valves was programmed to go haywire, after a decent interval,
to reset pump speeds and valve settings to produce pressures far beyond those
acceptable to pipeline joints and welds,"

"The result was the most monumental non-nuclear explosion and fire ever seen from
space,"

"While there were no physical casualties from the pipeline explosion, there was
significant damage to the Soviet economy," he writes. "Its ultimate bankruptcy,
not a bloody battle or nuclear exchange, is what brought the Cold War to an end.
In time the Soviets came to understand that they had been stealing bogus 
technology, but now what were they to do? By implication, every cell of the 
Soviet leviathan might be infected. They had no way of knowing which equipment 
was sound, which was bogus. All was suspect, which was the intended endgame for
the entire operation."

The code is fine but it deserves the extra scrutiny it is getting.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
URL: <http://listman.redhat.com/archives/fedora-devel-list/attachments/20040301/d43d37d4/attachment.sig>


More information about the fedora-devel-list mailing list