Why Backdoors Are Welcome Mats for Hackers

This past March, a shocking public hazard was released into the world, one that threatened the security of millions of people. The worst part? It could have been easily avoided

I?EU?m not talking about an airborne virus or flesh-eating bacteria. I?EU?m talking about a company intentionally building a backdoor into millions of consumer devices, and then leaving the ?EU?keys?EU? to that door lying out in the open for anyone to snatch up.

For a tech giant, Microsoft certainly messed up in a giant way.

It?EU?s not uncommon to hear about software programs that come with backdoors, entry points that allow anyone with a security key to access devices and networks. Most companies that build backdoors into their products create them in order to help their customers, enabling support staff to remotely assist in the solving of technical issues.

But good intentions do not provide protection, as Microsoft learned.

Microsoft?EU?s security feature, Secure Boot, ensures that a device will boot only using software trusted by the PC manufacturer and is effective for fending off certain types of malware and attacks by hackers. But because Microsoft built a backdoor into the product, things did not go quite as planned.

When the company accidentally leaked the ?EU?golden key?EU? to the backdoor, it gave anyone the ability to unlock any device using Secure Boot, including those seeking to install malicious software.

The researchers who discovered this flaw in March considered the incident a real-world demonstration of the foolishness of the FBI?EU?s demands for companies (such as Apple) to create backdoors for their products.

The Microsoft example shows just how easy it is for a backdoor to put Americans?EU? security at risk. The government?EU?s push for backdoors (and second front doors) jeopardizes the privacy of American citizens without making it any easier to catch the troublemakers. Every backdoor requires some means for access,...

Comments are closed.