Wednesday, October 18, 2017
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Intel Advances Artificial Intelligence With Nervana Neural Network Processor
Razer Launches Quad-core Blade Stealth Laptop and Core V2 External Graphics Enclosure
Google Designed New Pixel Visual Core Chip Internally
The ZTE Axon M is the First Foldable Smartphone
New Microsoft Surface Book 2 Packs Real Power, Windows 10 Creators Update Release
NXP S32 Automotive Processing Platform Brings Future Vehicles to Market Faster
Google's Advanced Protection Program Adds Security Layers to Gmail
Qualcomm Debuts Snapdragon 636 Mobile Platform, X50 5G Modem For Mobiles
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > General Computing > North K...
Last 7 Days News : SU MO TU WE TH FR SA All News

Sunday, December 27, 2015
North Korea's Red Star OS Spies On Citizens


Researchers have dug into the source code of North Korea's homegrown computer operating system and confirmed Pyongyang's invasive snooping on users.

Speaking to Reuters, Florian Grunow and Niklaus Schiess of German IT security company ERNW GmbH, said that the "Red Star" OS is not just a pale copy of western ones that many have assumed.

The latest version of the OS is based on a version of Fedora Linux and has eschewed the previous version's Windows XP feel for Apple's OSX.

Under the hood, there's a unique code, including a new version of encrypting files. This, the researchers say, suggests North Korea wants to avoid any back doors in the OS - code that might be compromised by intelligence agencies.

The Red Star operating system makes it very hard for anyone to tamper with it. If a user makes any changes to core functions - like trying to disable its antivirus checker or firewall - the computer will display an error message, or reboot itself.

Red Star also is alao cracking down on the underground exchange of foreign movies, music and writing.

It tackles this by tagging, or watermarking, every document or media file on a computer or on any USB stick connected to it.

Interestinlgy, the researchers found no sign in the operating system of the kinds of cyber attack capability North Korea has been accused of.

North Korea uses an intranet system does not connect to the outside internet but allows access to state media and some officially approved websites.




Previous
Next
Galaxy S7 to Be Released In Two Sizes        All News        A Ban on CD Ripping Marks This Year's Lowest Point in International Copyright
Intel Completes Acquisition of Altera     General Computing News      Hon Hai Makes Makes Offer For Sharp: report

Get RSS feed Easy Print E-Mail this Message

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2017 - All rights reserved -
Privacy policy - Contact Us .