https://www.tomshardware.com/news/juniper-backdoor-nsa-dual-ec,30805.html Juniper recently "discovered" a backdoor in it's ScreenOS software that allows one to decrpyt traffic in ScreenOS' VPN, and another backdoor that bypasses authentication. The backdoor was most definitely code for the NSA that third parties found and used for their own purposes. This NSA backdoor has been in there since 2007 and was leaked a little less than two years ago and now we see the problem with giving government agencies digital lockpicks. Juniper firewalls and routers werent alone in being infected with NSA malware. Dell Servers, hard drives from WD, Seagate, Samsung, and Maxtor, as well as routers and firewalls from Cisco and Huawei are confirmed to be compromised. Youre not even safe if you avoid American companies. Will security companies start reconsidering giving the NSA backdoors anytime soon?
>>3366 >hard drives from seagate god dammit
>>3366 >confirmed to be compromised Compromised how? What can a firewall/router/harddrive malware do? No article on the internet says what the malware actually does
>>3391 presumably it could do stuff similar to >decrpyt traffic in ScreenOS' VPN, and another backdoor that bypasses authentication that said op is a cocksucker and a fearmongerer
>>3392 Look it up for yourself https://gigaom.com/2013/12/29/nsas-backdoor-catalog-exposed-targets-include-juniper-cisco-samsung-and-huawei/ http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html Even Teamspeak had a government backdoor found a while back. If you actually care about these kind of things you should support open source hardware.
What about sonicwalls?
>>3426 The only reason why I don't use open source hardware is I honestly don't know where to get it from, plz halp コンピューター先輩。 username: slim Password: Jim
This seems a bit scary, but really all it affords them is access to idiots and lazy corporate security. Anyone who knows what they're doing should notice these things.