Host Operating System Selection Wiki Page Discussion

Windows Backdoors

No evidence of backdoors so those points were moved into the user freedoms restrictions.

Adversary Collaboration

This is massive misrepresentation of what’s actually happening and I already debunked this above. Embargoes aren’t malicious.

Duplicate.

That was a bug that was fixed.

Your source doesn’t say that.

Already covered. Second link is also entirely unsubstantiated FUD.

Again, it does not say that.

Opinion by GNU Project
Opinion by Free Software Foundation

GNU/FSF calls everything that isn’t free software “malware”. Their claims are baseless FUD and they are not an authority on security/privacy.

Windows Insecurity

Mostly already covered. First part is a duplicate. Windows not being classed as a “security-focused OS” on some Wikipedia list tells us nothing. There are security-hardened Windows versions although I would never trust/recommend them https://ameliorated.info/

Windows Historic Insecurity

Already covered.

No Security From Diversity

Makes no sense. Every Linux distro runs the same Linux kernel so 1 kernel exploit can affect them all. Distros simply rebranding themselves doesn’t make them immune to exploits that work on another.

It is effectively impossible to directly talk to developers for most people.

Not true at all. No clue where you got that from. Most developers even have Twitter accounts for example.

Freedom Software Superiority

Already covered.

As for the main Host Operating System Selection - Whonix article.

The overview section I wrote before should’ve been kept. You made no points against that.

macOS Hosts

Just FSF/GNU FUD and I’ve already covered why they aren’t an authority.

Recommendation
GNU/Linux Hosts
Recommended GNU/Linux Distribution

Edits I made before to these should’ve also been kept.

This is a backdoor in my book:

Encryption Microsoft has backdoored its disk encryption [archive]. Quote:

But what is less well-known is that, if you are like most users and login to Windows 10 using your Microsoft account, your computer automatically uploaded a copy of your recovery key — which can be used to unlock your encrypted disk — to Microsoft’s servers, probably without your knowledge and without an option to opt out.

“When a device goes into recovery mode, and the user doesn’t have access to the recovery key, the data on the drive will become permanently inaccessible. Based on the possibility of this outcome and a broad survey of customer feedback we chose to automatically backup the user recovery key,” a Microsoft spokesperson told me. “The recovery key requires physical access to the user device and is not useful without it.”

This too:

Software Choice and Deletion Windows has a feature to remotely deleting applications installed through Windows Store [archive] from the computer. At time of writing there are no known cases of abuse of this feature. It was only used for malware removal.

I didn’t see it when I re-read all of this last time. Please copy/paste.

Nobody said that here afaik.

Moved accordingly.

Source?

This is a backdoor in my book:

Encryption Microsoft has backdoored its disk encryption [archive]. Quote:

But what is less well-known is that, if you are like most users and login to Windows 10 using your Microsoft account, your computer automatically uploaded a copy of your recovery key — which can be used to unlock your encrypted disk — to Microsoft’s servers, probably without your knowledge and without an option to opt out.

“When a device goes into recovery mode, and the user doesn’t have access to the recovery key, the data on the drive will become permanently inaccessible. Based on the possibility of this outcome and a broad survey of customer feedback we chose to automatically backup the user recovery key,” a Microsoft spokesperson told me. “The recovery key requires physical access to the user device and is not useful without it.”

This too:

Software Choice and Deletion Windows has a feature to remotely deleting applications installed through Windows Store [archive] from the computer. At time of writing there are no known cases of abuse of this feature. It was only used for malware removal.

I didn’t see it when I re-read all of this last time. Please copy/paste.

Nobody said that here afaik.

Moved accordingly.

Source?

Rewrote that just now:

Tiered Stability (Updates Testing)

Windows forces lower-paying customers to install new updates and gives higher-paying customers the option of whether or not to adopt them. Quote [archive]:

Windows 10 Enterprise does allow users to postpone any update indefinitely but it is only available in bulk licensing.

Entirely unsubstantiated is something else. There’s no claim of proof. Only reasonable suspicion. If that isn’t suspicious, nothing is. Worth mentioning.

Difference: can read the source code. Reverse engineering the binary is way harder.

Not true.

Gross generalization. I haven’t seen any serious rebuttal.

Wondering…
Who is an authority on privacy?

Indeed. The link to Security-focused operating system - Wikipedia is there to explain the term security-focused operating system, not to show that Windows isn’t listed there.

The quote is, bold added:

Due to Microsoft’s restrictive, proprietary licensing policy for Windows, there are no legal software projects that are providing a security-enhanced Windows fork.

ameliorated.info might not be a legal software project. I write “might” because nobody can know until a court solves this question. Also I can’t give legal advice. ameliorated looks anonymous. For good reason. Nobody can survive Microsoft lawyers when software forking Windows without permission.

Since someone might challenge legal vs not legal…
My challenge (going to be expensive if lost): 1) reside inside USA, fork Windows, redistribute, publish real names, get popularity. Then see if Microsoft is going to sue and who wins in court.

Theory vs reality. In theory it could be that way. Many things conceiveable in theory don’t happen in reality. In this case in practice it’s not happening.

Keyword is effectively.
That sentence is not an absolute. Of course, someone somewhere might talk to Windows developers but it’s not the norm.

This point and above I don’t think any progress can be made as for agreement.

That would need a detailed discussion point by point and not just deletion of the whole thing.

Not reviewed yet.

That was debated earlier in this forum thread. I disagree with that and I don’t think it’s productive to debate this ad-infinitum.

Exactly.

Windows officially admits their data mining activity and gives users so-called options to “choose” what they share. Third parties have uncovered time and time again, these user choices are ignored and there is no way to disable data gathering completely.

Let’s take a look at net effect on privacy:

  • A securely coded windows that resists third party spyware + includes data snooping in its core = net loss of end user freedom/privacy and security risk as NSA has been know to use windows error reporting for aiding exploitation.

  • A less defended libre kernel is more vulnerable to active attacks + no privacy invasive code include by default = net gain of privacy by default as nothing is being reported anywhere unless someone decides to target you.

Windows is malware because of what it does. I don’t care if you trust that particular party for some reason with all the data it collects. Their compiler was even caught slipping in telemetry features in apps compiled with it. Classic backdooring.

macOS has added telemetry to their local folder search.


Proprietary software doesn’t need more defenders. I am sure their massive budgets and monopolistic agreements with OEMs and user ignorance has done more than enough to secure their tyranny. Let’s look at how we can improve what we have here so users have a reasonable shot at having any privacy in this age.

It’s not. It’s a backup.

You even acknowledged yourself that it could be a useful feature, not a backdoor and even considered “backdooring” Whonix too.

You’re completely misrepresenting what they’re actually doing. As said in the articles linked, Microsoft gives some companies early access to vulnerability info/releases so they can patch their systems before it’s public.

This is done everywhere and isn’t an issue. Linux does this too.

https://www.kernel.org/doc/html/latest/admin-guide/security-bugs.html#coordination

Fixes for sensitive bugs, such as those that might lead to privilege escalations, may need to be coordinated with the private <linux-distros@vs.openwall.org> mailing list so that distribution vendors are well prepared to issue a fixed kernel upon public disclosure of the upstream fix.

It’s what you’re saying.

It’s still hardly “sabotage”. Should be put in the user freedoms restrictions: “Only paying customers can postpone updates”.

Not a big difference since we’ve already covered that hiding backdoors in open source code is just as easy.

It is.

https://www.gnu.org/proprietary/proprietary.html

Proprietary Software Is Often Malware

“Often” is far too often for GNU/FSF.

Already debunked one of their points above as an example and am not going to spend an entire week debunking the entire website.

Actual respected experts e.g. Bruce Schneier.

Which doesn’t mean anything. Windows is still far ahead than standard Linux distros and even has advantages over Qubes. Where’s CFI in Qubes again?

It doesn’t really matter. It’s still a security-enhanced version.

No, it’s not a theory. It’s a reality and it is happening in practice. There’s plenty examples of widespread Linux malware e.g. Advanced Linux backdoor found in the wild escaped AV detection | Ars Technica

It makes no sense to claim malware on e.g. Debian won’t work on Ubuntu when they use nearly all of the same software. They just come from different repositories.

Still not true. It’s easy to talk to Microsoft devs. Again, many even have Twitter accounts where any random person can talk to them. I can even give examples if you want me to.

  • Files on devices can be deleted if they were downloaded from sources competing with Apple companies.

I don’t see that in the GNU page.

  • Intentional backdoors allow remote root privileges, wipes and deletion of applications.

No, the “remote root backdoor” was a bug that was fixed. Perfect example of GNU’s FUD. They immediately call every bug in proprietary software a “backdoor” with no evidence of such.

The deleting apps thing is behind a paywall so I can’t see it.

  • An insecure design allows execution of malicious code by applications and the extraction of messaging history.

Big deal. It had a few bugs in the past. Everything has.

  • Devices are bricked if fixed by an “unauthorized” repair shop.

That’s true and is shitty but it’s not a privacy/security issue.

  • Devices are bricked that were unlocked without permission.

This just seems like they fixed a verified boot bypass.

  • Biometric markers like fingerprints are used for device authorization.

That’s not an issue. You can get fingerprint readers on Linux too.

  • Extensive personal information is sent to Apple servers, such as:

All telemetry can be disabled.

And there were no real rebuttals to my points.

Straw man. Not once have I claimed that Windows doesn’t have privacy issues. I’ve acknowledged Windows’ privacy issues numerous times now. Read the discussion, stop making wild assumptions and stop putting words in my mouth.

I know Windows is spyware. I’m not claiming otherwise.

All macOS telemetry can easily be disabled and you can verify that it is with simple network monitoring.

Good to see we agree on something. I equate privacy with security because they are very much related in the real world especially for whistleblowers.

That’s besides the point. Most people don’t know about it and will never disable it. Defaults matter. Windows in theory also allows you disable its spyware.

macOS asks about telemetry during install and makes it extremely easy to disable.

It doesn’t respect those options fully unlike macOS.

honestly, i don’t think this is truly fair. it was a horrible choice of variable wording on microsoft’s part, which also became public knowledge around the same time of the controversy involving the secret nsa router closet with at&t as i recall. microsoft did ackowledge the controversy. but, if i also recall correctly, the discussions on this broke down.

this also wouldn’t be the first time that something shady or unethical was exposed with microsoft. as an example, despite microsoft’s “anti-piracy” aggressive litigation stance, metadata in wav files for their media player with xp demonstrated that a version of soundforge was used to process the wav files was supplied by a well known cracking group. despite the horrible public relations that could have caused, microsoft missed that, even though it should have been obvious. microsoft has a rediculously huge development team, both in house and out sourced. is it that unrealistic to believe that employees involved may be nefarious in the context raised in this paragraph regarding “nsakey”? it’s a valid concern, despite being paranoid.

yes, i agree with you that “open source” doesn’t absolutely provide greater security. but, the option to audit is there, which is absent with microsoft. and that is a fair critique at the end of the day. does “open source” make something more secure? obviously not. the ancient bash vulns discovered way too late obviously prove that. but, they were discovered eventually due to it being open source, which may never have been discovered or addressed by the likes of microsoft absent a very open and problematic exploit in the wild that stood to harm their stock prices. if the exploit was discovered by microsoft privately, and it didn’t stand to affect their market share if not disclosed, it’s not an unfair critique to believe that microsoft may have avoided addressing it if the thought was there that it could harm their bottom line if publicly addressed. after all, that’s the oracle way, no?

furthermore, since you brought up the debate regarding privacy vs. security, it would appear that we agree that debian respects privacy more than microsoft, apple, google, etc. whonix host is looking to plug the security holes that exist in vanilla debian. thus, when whonix host is reaady, while i agree with you that the “linux is more secure than windows” argument is largely bogus from various technical standpoints at this point as far as exploits are concerned, i think the whonix team will be able to make a case for being better for both privacy and security once whonix host is released. in my honest opinion, that should be the focus. once whonix host is ready for delivery, the “other os” wikis can be focused on that, which i think will be more beneficial.

if anyone thinks i’m off base here, please let me know. but, let’s keep this away from a “microsoft/apple vs. linux” debate. there are way too many subjective uses which makes that debate unfinishable. but, for what whonix adrdesses, which is a fairly specific use case, i think we can do it without engaging that debate.

point blank, whonix will never be a panacea. but, for people who want a best case scenario for anonymity with an operating system, whonix fulfills a need there, which will be even better with whonix host. if we keep the focus on that without engaging in fud, hyperbole, or pie in the sky promises, i will continue to believe, and promote, that whonix is the best os for this use scenario. it will never be perfect. but, what compares?

absent qubes that implemented whonix templates, i can’t offer much as an example in that regard referenced above. but, as someone who was once involved with very problematic activism as far as some govs were concerned, compatriots of mine who didn’t use whonix, but used tor, got busted due to very trivial mistakes. i’m still free. that is a huge selling point for me. whonix was the main difference, and i’m not implying that i engaged in anything criminal. whonix kept me free of harassment that could have affected my immediate freedom, right to travel, or employment opportunities. whonix alone wasn’t the answer there. but it was an incredibly significant part, which freed me of relying on a number of custom scripts and steps to anonymize a debian host, which i’d developed for my own use over years of experience, and could still screw up. and, for that, i will forever be thankful. if the majority of clients i have now knew of my involvement with “anonymous,” i would not have a job, despite being no threat to them. that is part of the reason that i started publicly sharing an originally private document through anonymous on how to set up a basic system using debian as a host with whonix as virtual machines. and it’s why i publicly updated it for years.

in the end, i think we all need to keep focused on the notion that whonix is both a secure and private os for people who want anonymity. that is the end goal, correct? the debates on the flaws of other operating systems are less relevant there, since the enhancements that whonix team actively works on is better for people who want anonymity in comparison to the others. let’s keep the focus there. we don’t need to bother with the “linux vs” arguments, since this is “whonix vs” for those who want an anonymity geared operating system.

1 Like

Since I won’t have time soon for this the potentially remaining Windows / macOS enhancements suggestions from this post Long Wiki Edits Thread - #1793 by @madaidan I’ve created ticket ⚓ T993 improve Windows Hosts / macOS wiki mentions as reminder and mentioned this in on the related wiki pages.

Added to wiki just now.

I disagree and then you are going to say “I don’t have to to refute them”. I.e. no agreement will be reached. But it’s not necessarily you that has to refute them anyhow. GNU/FSF are popular. Meaning:

  • If GNU/FSF make libelous claims, it is likely that they will be on the receiving end of a defamation lawsuit. This didn’t happen yet to my knowledge.
  • The internet is big. Others would have made a rebuttal. If you can find a good one, that might be a a good alternative as rebuttal.

Any write-up is non-perfect and the GNU one was a comprehensive one.

Agreed. Who build the security and for what purpose. Benefit of user or maximizing profit at expense of privacy and security from vendor.

It’s besides the point. Please don’t cling on a single phrase “Level Security” and then view everything through that lens. That chapter has to be viewed in a bigger context.

The headline iPhone and Android Level Security for Linux Desktop Distributions is also bad for other more pragmatic reasons. Through conversations I’ve learned that many people know about how bad many phones/mobile apps are in their default configuration for privacy they equate this with security, and then intuitively discard the idea that iPhone / Android have any worthwhile security features worth porting to Linux desktop. I.e. even if iPhone and Android Level Security for Linux Desktop Distributions was fully possible in theory and even if madaidan would agree, it would still be bad self-representation of the project. Will change chapter title to Kicksecure Development Goals.

Project Zero: Mitigations are attack surface, too

Interesting. Added.

Kicksecure: Difference between revisions - Whonix

Please don’t do “burn the house down” / delete all changes. Rejected edit. Took some changes suggested with modification by me. And added more content.

2 Likes

No, I’ve even refuted some of their points above.

Big companies like Google or Apple don’t care about them.

I’m not clinging to that. I don’t really have much of an issue with the title.

Just look at the comparison table. It’s wrong to pretend that the full system MAC policy in Android and Kicksecure are similar. SELinux is ingrained into Android’s architecture and the entire ecosystem was shaped around it. Additionally, SELinux allows for far more restrictive policies (e.g. ioctl filtering or even just stricter permissions for files) than apparmor.

We’re slapping an apparmor policy on top of an OS that it wasn’t intended for. While this is good and we can make some great progress with it, it’ll never be as good as a strict policy on top of an OS that was designed for it.

Another example is the hardened kernel row. Our hardened-kernel is nice but it’s not the same as Android. Android kernels contain a lot of hardening patches including fine-grained forward-edge Clang Control-Flow Integrity and ShadowCallStack to prevent code reuse attacks (CFI/SCS is only on Pixels >=3 though). CFI isn’t in mainline or linux-hardened and won’t be for a long time. ShadowCallStack isn’t even possible on x86 due to the way it handles returns.

Although, I’m looking more into Android/Qualcomm’s hardening patches and might submit some to linux-hardened (I’ve been talking to Daniel Micay about this on Matrix).

The comparison table is also neglecting to mention all the advantages of Android over Kicksecure. One example is that Android has the majority of the system written in memory safe languages (Java). Another example is that Android/iPhone has modern user space exploit mitigations like CFI/PAC.

This subject is too complex to be a simple Yes/No comparison table which is why I removed it and expanded a bit below it. What I meant by “Security is not just a checklist of features” is that the implementation matters. Not the general topic. Sure, you can have a “sandbox” but that doesn’t mean it’ll actually restrict anything meaningful for example.

I don’t think it should mention mitigations specifically since it’s not just mitigations vendors introduce. They add tons of bloatware that contain their own security vulnerabilities. I’ve found Samsung to be particularly egregious in this regard although sane vendors like Google are usually fine.

I’m not. The comparison table just doesn’t make sense.

1 Like

I missed those, misunderstood, disagreed etc. But anyhow. It’s too much of a detail for me to spend time on it. As said…

…unless there’s a better, similar write-up, the the current links are good enough and I won’t debate them further.

It’s still missing the purpose of that comparison table / chapter. It’s not an security from exploitation from third parties comparison table for Android AOSP vs Linux desktop/server distributions.

That’s good to know and valuable knowledge but again not an security from exploitation from third parties comparison table for Android AOSP vs Linux desktop/server distributions.

It would be a net benefit for the knowledge of the world if this information was documented somewhere. But not on whonix.org. Too time consuming and too far off-topic from the goals of Whonix project to get involved deeply involved into creating a perfect comparison table or write-up on that subject. Wikipedia might be interested to host this information or any other more general knowledge wiki / comparison site. I would certainly a minimum be a reader. Probably also add a link to it from Whonix wiki. Having this information well laid out could help to get these issues fixed. Without awareness of the issue it’s even less likely of getting fixed.

2 Likes

The host OS page is still mostly misinformation. I can go over it again if you want. I’ve also expanded Linux | Madaidan's Insecurities to include more direct comparisons to Windows/macOS.

Split from long wiki edits forum thread to this own topic since way too complex for long wiki edits thread.


https://phabricator.whonix.org/T993

! In T993#20220, @Patrick wrote:
I don’t see what else can be done here. This statement is limited to only what was said in this ticket.

Issue tracker was moved meanwhile to forums as per:
Bug Reports, Software Development and Feature Requests

I am not calling the whole task done.

Split discussion into its own forum discussion.

Host Operating System Selection Wiki Page Discussion

Will continue there.

Patrick closed this task as Resolved.

It’s only really closed once the forum topic says it is. Just doing this since this issue tracker phabricator is being phased out at Whonix project.

! In T993#20223, @Patrick wrote:

! In T993#20220, @Patrick wrote:
I don’t see what else can be done here. This statement is limited to only what was said in this ticket.

If not… Quote and bring up here:

Host Operating System Selection Wiki Page Discussion

To make this less of a daunting task… That ends up in the backlog not being worked on… Since this is one of the most controversial technical discussions here ever…

I suggest this needs to be split into small chunks. Because if it’s too many points at the same time, it quickly gets messy, overwhelming.

Please bring up one small point. (Or I will soon bring up one small point and ask for clarification.) Then stick to that point until that’s resolved. And meanwhile that point is being discussed, don’t bring up other stuff. One point such as “this and this is a Windows backdoor or not”. If it’s not possible in this forum thread, use a separate one and make the on-topic very clear. I’d then try to moderate as restrictive as possible and move any posts too broad back to this one.

Not sure when we start this modus of operation. In separate forum topic, post any time.

Otherwise, you could also have patience with me for a week or so. It’s “just” 63 posts for now. I am going to re-read all. And then, I’ll be attempting to integrate your criticisms and answer them right on the same wiki page.

In other situations I also often very much understand the usefulness of sometimes to make a “summary answer”. If too many people bring up too many things, not everything can get answered. Cannot discuss with everyone until consensus is found or giving up due to fatigue. Similar for long articles / wiki pages where one feels that just too much is wrong to go into everything in detail. However, in this case, in improvements should be made, I very much suggest to split into small chunks, keeping working on it continued. It’s not that many bullet points in total.

1 Like

It is effectively impossible to directly talk to developers for most people.

Well, twitter with a 140 character limit isn’t exactly known for being a productive discussion platform.

Any examples of any productive discussions that resulted in enhancements and/or bug fixes?

The main point is:

There is no public issue tracker for Microsoft Windows. In comparison for Open Source projects, issue tracker are most often public for everyone (with exception of security issues under embargo until fixed).

I guess I don’t need to show examples for that.

How’s that done for Windows?

Word definitions: Spyware is a type of malware.

Quote wikipedia malware [archive]:

A wide variety of malware types exist, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and scareware.

If that definition is accepted… It therefore follows, if one agrees that “Windows is Spyware”, it then logically follows “Windows is also Malware”. This is to explain the GNU Project opinion of calling Windows “Malware”.

1 Like

Twitter is where nearly all of the security community is. For example, here a few Microsoft security researchers I follow:

https://twitter.com/dwizzzleMSFT
https://twitter.com/JosephBialek
https://twitter.com/epakskape
https://twitter.com/AmarSaar
https://twitter.com/metr0
https://twitter.com/Lee_Holmes
https://twitter.com/spoofyroot
https://twitter.com/xjamesmorris

Same goes for other companies like Google, Apple, Amazon, Facebook, etc.

Here’s an example of one directly relevant to us and resulted in an improvement to kconfig-hardened-check:

https://twitter.com/dvyukov/status/1245969522869309441

It depends on the issue. Microsoft regularly assign CVEs to security issues.

https://msrc.microsoft.com/update-guide/vulnerability

I meant spyware as derogatory term for “lots of privacy invasive telemetry”, not in a literal sense.

1 Like

Alright. I am dropping the “talk to developers” directly point.

My main point:

There is no public issue tracker for Microsoft Windows where any reasonable user is allowed to post or reply. There is a public list of vulnerabilities [archive] but without public discussion among developers and/or users. In comparison for Open Source projects, issue tracker are most often public for everyone to post and reply (with exception of security issues under embargo until fixed).

There is https://answers.microsoft.com but I’ve never seen developers asking users for debug information (maybe rarely needed due to telemetry?) or telling what bug gets fixed with what update, any workaround, bug confirmed/closed/wontfix etc.

1 Like

Here’s one I found randomly: Redirecting

Please use the feedback option within the browser (Alt+Shift+i) to report the error when it happens, including diagnostic data so they can see what’s going wrong.

There’s also https://techcommunity.microsoft.com/

A volunteer moderator isn’t a developer.

Redirecting

I’ve looked thorugh a few random threads but cannot see any Microsoft employees either.

All seems user-to-user.

This is much different from let’s say Debian or Qubes where almost every ticket at some point gets tagged/reply from some developer.

Microsoft internally certainly must have some issue tracker but it’s not public. That’s the difference I would like to work out. Safe to say, Open Source development generally “more open”. Windows development detail discussions seem a lot more private.

…if you have any re-wording suggestions for that.

1 Like