Proprietary Back Doors
Other examples of proprietary malwareHere are examples of demonstrated back doors in proprietary software.
-
Dell computers, shipped with Windows, had a bogus root certificate that allowed anyone (not just Dell) to remotely authorize any software to run on the computer.
-
Baidu's proprietary Android library, Moplus, has a back door that can “upload files” as well as forcibly install apps.
It is used by 14,000 Android applications.
-
Microsoft is attacking computers that run Windows 7 and 8, switching on a flag that says whether to “upgrade” to Windows 10 when users have turned it off.
This, by the way, reaffirms the presence of a universal back door in Windows 7 and 8.
ARRIS cable modem has a backdoor in the backdoor.
Caterpillar vehicles come with a back-door to shutoff the engine remotely.
Mac OS X had an intentional local back door for 4 years.
Users report Microsoft is forcing them to replace Windows 7 and 8 with all-spying Windows 10.
This seems to involve use of a back door in Windows 7 and 8.
-
Most mobile phones have a universal back door, which has been used to turn them malicious.
-
A Chinese version of Android has a universal back door. Nearly all models of mobile phones have a universal back door in the modem chip. So why did Coolpad bother to introduce another? Because this one is controlled by Coolpad.
-
Microsoft Windows has a universal back door through which any change whatsoever can be imposed on the users.
More information on when this was used.
In Windows 10, the universal back door is no longer hidden; all “upgrades” will be forcibly and immediately imposed.
-
Windows 8's back doors are so gaping that the German government has decided it can't be trusted.
-
The iPhone has a back door that allows Apple to remotely delete apps which Apple considers “inappropriate”. Jobs said it's ok for Apple to have this power because of course we can trust Apple.
-
The iPhone has a back door for remote wipe. It's not always enabled, but users are led into enabling it without understanding.
-
Apple can, and regularly does, remotely extract some data from iPhones for the state.
This may have improved with iOS 8 security improvements; but not as much as Apple claims.
-
Windows 8 also has a back door for remotely deleting apps.
You might well decide to let a security service that you trust remotely deactivate programs that it considers malicious. But there is no excuse for deleting the programs, and you should have the right to decide who (if anyone) to trust in this way.
As these pages show, if you do want to clean your computer of malware, the first software to delete is Windows or iOS.
-
In Android, Google has a back door to remotely delete apps. (It is in a program called GTalkService).
Google can also forcibly and remotely install apps through GTalkService (which seems, since that article, to have been merged into Google Play). This adds up to a universal back door.
Although Google's exercise of this power has not been malicious so far, the point is that nobody should have such power, which could also be used maliciously. You might well decide to let a security service remotely deactivate programs that it considers malicious. But there is no excuse for allowing it to delete the programs, and you should have the right to decide who (if anyone) to trust in this way.
-
Samsung Galaxy devices running proprietary Android versions come with a back door that provides remote access to the files stored on the device.
-
The Amazon Kindle has a back door that has been used to remotely erase books.
The Kindle also has a universal back door.
-
HP “storage appliances” that use the proprietary “Left Hand” operating system have back doors that give HP remote login access to them. HP claims that this does not give HP access to the customer's data, but if the back door allows installation of software changes, a change could be installed that would give access to the customer's data.
-
Some D-Link routers have a back door for changing settings in a dlink of an eye.
Here is a big problem whose details are still secret.
-
The FBI asks lots of companies to put back doors in proprietary programs. We don't know of specific cases where this was done, but every proprietary program for encryption is a possibility.
Here is a suspicion that we can't prove, but is worth thinking about.
-
Writable microcode for Intel and AMD microprocessors may be a vehicle for the NSA to invade computers, with the help of Microsoft, say respected security experts.
The EFF has other examples of the use of back doors.