Former Hacker Irks Microsoft in EU Dispute


Ah the anti-trust battle continues, good to see someone with technical skills involved, I wonder how the case is coming along, I haven’t heard about it for a while.

Again this is quite an old story.

As an expert witness on digital crime, British computer consultant Neil Barrett has helped prosecutors in the United Kingdom convict murderers and pedophiles.

Now Mr. Barrett is finding out what it’s like to be on trial, as the independent trustee and chief technical expert in the European Union’s mammoth antitrust battle with Microsoft Corp.

European Commission regulators in Brussels chose Mr. Barrett from among Microsoft’s own nominees for the job of judging whether the company is complying with a 2004 EU ruling that it help its competitors design software to mesh with its nearly ubiquitous Windows operating system. Following Mr. Barrett’s scathing assessments of Microsoft’s efforts, the European Commission threatened the company with fines that could exceed €100 million, or $120 million — prompting Microsoft to attack Mr. Barrett’s competence and to accuse him of colluding with its rivals. Regulators last week rose to Mr. Barrett’s defense.

Microsoft accusing someone else of dirty tactics and colluding with competitors? That’s a new one..

In February, Microsoft responded that Mr. Barrett was operating with a “set of basic misunderstandings” about Microsoft programming terms. In another filing to the EU this month, Microsoft accused Mr. Barrett and the regulators of “actively and secretly working with Microsoft’s adversaries.”

Emails the commission gave Microsoft show Mr. Barrett in frequent contact with regulators and Microsoft competitors, which led the company to call Mr. Barrett the “commission’s co-prosecutor.” The growing brouhaha led the normally secretive commission to release the terms of Mr. Barrett’s mandate, which says he should “play a proactive role” in monitoring Microsoft — a clause the commission says gives him freedom to confer with Microsoft rivals. Even Sun Microsystems, which usually declines to comment on the case, made an exception, calling Microsoft’s criticism of him “misplaced.”

I’ll have a Google and see what’s happening nowadays with Mr Barrett.

Source: WSJ

Posted in: Legal Issues, Windows Hacking

, ,


Latest Posts:


Aclpwn.Py - Exploit ACL Based Privilege Escalation Paths in Active Directory Aclpwn.Py – Exploit ACL Based Privilege Escalation Paths in Active Directory
Aclpwn.py is a tool that interacts with BloodHound< to identify and exploit ACL based privilege escalation paths.
Vulhub - Pre-Built Vulnerable Docker Environments For Learning To Hack Vulhub – Pre-Built Vulnerable Docker Environments For Learning To Hack
Vulhub is an open-source collection of pre-built vulnerable docker environments for learning to hack. No pre-existing knowledge of docker is required, just execute two simple commands.
LibInjection - Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS) LibInjection – Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS)
LibInjection is a C library to Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS) through lexical analysis of real-world Attacks.
Grype - Vulnerability Scanner For Container Images & Filesystems Grype – Vulnerability Scanner For Container Images & Filesystems
Grype is a vulnerability scanner for container images and filesystems with an easy to install binary that supports the packages for most major *nix based OS.
APT-Hunter - Threat Hunting Tool via Windows Event Log APT-Hunter – Threat Hunting Tool via Windows Event Log
APT-Hunter is a threat hunting tool for windows event logs made from the perspective of the purple team mindset to provide detection for APT movements hidden in the sea of windows event logs.
GitLab Watchman - Audit Gitlab For Sensitive Data & Credentials GitLab Watchman – Audit Gitlab For Sensitive Data & Credentials
GitLab Watchman is an app that uses the GitLab API to audit GitLab for sensitive data and credentials exposed internally, this includes code, commits, wikis etc


Comments are closed.