{"id":40,"date":"2006-02-24T07:28:03","date_gmt":"2006-02-24T07:28:03","guid":{"rendered":"https:\/\/www.darknet.org.uk\/2006\/02\/uk-wants-backdoor-in-next-version-of-microsoft-windows\/"},"modified":"2010-07-21T10:57:36","modified_gmt":"2010-07-21T09:57:36","slug":"uk-wants-backdoor-in-next-version-of-microsoft-windows","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2006\/02\/uk-wants-backdoor-in-next-version-of-microsoft-windows\/","title":{"rendered":"UK Wants Backdoor in Next Version of Microsoft Windows"},"content":{"rendered":"

<\/p>\n

Yes that’s right, big brother wants a backdoor in your operating system even MORE of a reason to use Open Source alternatives that we can audit ourselves eh?<\/p>\n

There has been talk of such things in the past, US government backdoors in common cryptography algorithms and now talks of backdoors in the most popular OS in the world.<\/p>\n

Windows Vista is due to be rolled out later this year. Cambridge academic Ross Anderson told MPs it would mean more computer files being encrypted.<\/p>\n

He urged the government to look at establishing “back door” ways of getting around encryptions.<\/p>\n

The Home Office later told the BBC News website it is in talks with Microsoft.<\/p><\/blockquote>\n

Yes, it bothers me.<\/p>\n

Professor Anderson said people were discussing the idea of making computer vendors ensure “back door keys” to encrypted material were made available.<\/p>\n

The Home Office should enter talks with Microsoft now rather than when the system is introduced, he said.<\/p>\n

He said encryption tools generally were either good or useless.<\/p>\n

“If they are good, you either guess the password or give up,” he said. <\/p><\/blockquote>\n

<\/p>\n

Source: BBC News<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

Yes that’s right, big brother wants a backdoor in your operating system even MORE of a reason to use Open Source alternatives that we can audit ourselves eh? There has been talk of such things in the past, US government backdoors in common cryptography algorithms and now talks of backdoors in the most popular OS […]<\/p>\n","protected":false},"author":25,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[17,4],"tags":[137,135,8864,134,136],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Darknet","author_link":"https:\/\/www.darknet.org.uk\/author\/darknet\/"},"_links":{"self":[{"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/posts\/40"}],"collection":[{"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/comments?post=40"}],"version-history":[{"count":0,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/posts\/40\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/media?parent=40"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/categories?post=40"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.darknet.org.uk\/wp-json\/wp\/v2\/tags?post=40"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}