Bonum Certa Men Certa

EPO Whistleblowing: How (Not) to Use Machines at the Office

Control Risks and EPOSummary: What Control Risks and the EPO's management probably hope staff won't know and therefore, potentially, self-incriminate

STAFF of the EPO, as we noted here a few days ago, no longer trusts phones at the Office, but what about the PCs and the printers? Thankfully, having inquired for a while, we have been able to gather some information and now is a good time to share it, for the safety of EPO workers who are under the vigilant eyes of Team Battistelli and unaccountable goons like Control Risks.



"Anyone who uses an EPO computer to do anything at all is in danger," one reader told us.

“It is thus imperative that any file which is published isn't 100% identical to the original, even if it was widely distributed internally in the first place.”
      --Anonymous
"It is pretty much established that ALL user computers at the EPO are equipped with key logging software," said an anonymous person. This is apparently well understood by now. No wonder the atmosphere at work is so depressing. There have been studies conducted which explain the effect of never having any privacy, let alone a sense of privacy.

"I obviously couldn't study the currently installed machines myself," one reader told us, "but I trust my sources on this. The amount of data transmitted and stored is trivial, and putting myself in the skin of a spy, I would suppose that the logging includes the list of opened windows with the ID of the one in focus, with occasional screen captures. That's fairly easy to implement."

As some people put it, Windows is almost designed and even optimised for spying. There are many surveillance add-ons sold for it, and Vista 10 is spyware out of the box (for Microsoft to spy on every keypress and much more).

“There are commercial programs offered on the market that monitor and log any data traffic to and from attached USB ports.”
      --Anonymous
"Using hooks in the file system," a reader of ours hypothesised, "you could also check whether someone uploads a file in Chrome or Firefox for transmission, e.g. in a webmail window, so you don't even need to doctor and compromise the browsers.

"It would also be easy to scan EPO computers for an identical copy of any file which shows up on the Internet. Someone who would want to leak a document would have to store it on his/her local drive first, and that leaves traces. This wouldn't require excessive resources if you work with file signatures computed hash functions.

"It is thus imperative that any file which is published isn't 100% identical to the original, even if it was widely distributed internally in the first place."

Obviously it would be unwise to use a computer at work for subversive activities in the first place. It's safer to do so from home or some open network.

"I often work with bitmap conversions," a person once advised us, "which strips all original metadata and of any stuff which could be easily hidden in PDFs. The Adobe format is ugly and complex, and provides PLENTY of opportunities for introducing side channels, e.g. orphan objects, extra entries in character coding vectors, or even the ordering of objects within a page, which PDF linearization wouldn't defeat. Technically, you could still watermark a document using character kerning, which is harder to defeat with bitmap transformation, but this would require an infrastructure just for that, and that would require RATHER smart operators."

“One can only send a document to one's own e-mail address these days.”
      --Anonymous
Going back to the point about Windows, especially recent versions of it, it's probably not wise to use it because spying is often done by numerous parties (including Microsoft) at the same time. Personal data is later being passed around or even sold.

One reader reminds us: "There are commercial programs offered on the market that monitor and log any data traffic to and from attached USB ports. It would be slightly safer to obfuscate a file before saving it to an USB stick, but there are still traces. I know of places who use these, but I don't know if the EPO is among them. By the way, our beloved NSA files patents for "butt plugs" for insertion into USB ports."

Just to complete the picture, someone told us that if people use the machines at the Office, then "Xerox" may appear in the document producer metadata and "chances are," in such a case, "that the document was scanned on these high performance network printers which are widely used at the EPO. These used to be in open access, but current models require the user to present his ID badge in order to access the scan menu. One can only send a document to one's own e-mail address these days."

Our sources believe that computer keyboards are equipped with smart card readers, but we don't know whether the smart card must be left inserted in order to work. In any case, the screen lock delay is quite short, so one can hardly use the excuse "someone must have entered my office when I went out to take a leak".

Any public file produced by the Register or Espacenet is generated on the fly from internal bitmap images and contains metadata which could betray the IP of the requester, so sources would want to cleanse these too.

At Techrights we use various methods to eliminate or at least significantly reduce the risk of sources being found through metadata. Nevertheless, if during transmission there is identifying information and if Control Risks can observe the session, then there is risk of useful interception. We previously provided information on how to securely send data to us. Some of the above observations hopefully increase awareness of the traps and the weaknesses that are EPO-specific.

Recent Techrights' Posts

United States Entering the $100 Trillion Debt Trap, We Compare GAFAM Debt
Google's debt is about 6 times less than Amazon's
Software Freedom Conservancy (SFC), Inc. vs. Vizio, Inc. Is Costing the Free Software Foundation Money
FSF subpoena and deposition
They Try to Replace the Creators of GNU/Linux and Hijack Their Word, Work, and Reputation
gnu.org is down at the moment; now I'm told it's back but very slow. DDoS?
Links 05/05/2024: Political Cyberattacks From Russia and Google Getting a Lot Worse
Links for the day
 
On Character Assassination Tactics
The people who leverage these dirty politics typically champion projection tactics
Links 06/05/2024: Scams and Politics
Links for the day
Gemini Links 06/05/2024: Reading and Computers
Links for the day
GitLab's Losses Grew From $172,311,000 to $424,174,000 Per Annum
Letting this company have control over your (or your company's) development/code forge may cost you a lot in the future
statCounter's Latest: Android Bouncing to New All-Time Highs, Windows Down to Unprecedented Lows
Android rising
Can't Bear the Thought We're Happy and Productive
If someone is now harassing online friends, attacking the wife, attacking my family (not just attacking and defaming people I know online) there are legal ramifications
IRC Proceedings: Sunday, May 05, 2024
IRC logs for Sunday, May 05, 2024
Over at Tux Machines...
GNU/Linux news for the past day
Erinn Clark & Debian: Justice or another Open Source vendetta?
Reprinted with permission from disguised.work
Death of Michael Anthony Bordlee, New Orleans, Louisiana
Reprinted with permission from disguised.work
The Revolution Continues
Today we've published over 20 pages and tomorrow we expect more or less the same
Death of Dr Alex Blewitt, UK
Reprinted with permission from disguised.work
Following the Herd (or HURD)
Society advances owing to people who think differently and promote positive change, not corporate shills
Thiemo Seufer & Debian deaths: examining accidents and suicides
Reprinted with permission from disguised.work
Gemini Links 05/05/2024: Infobesity and Profectus Beta 1.0
Links for the day
Running This Site Mostly a Joyful Activity
The real problem or the thing that we need to cancel is this "Cancel Culture"
Australia Has Finally Joined the "4% Club" (ChromeOS+GNU/Linux)
statCounter stats
Debian as a Hazardous Workplace Where No Accountability Exists (Nor Salaries)
systematic exploitation of skilled developers by free 'riders' (or freeloaders) like Google, IBM, and Microsoft
Clownflare Isn't Free and Its CEO Openly Boasted They'd Start Charging Everyone to Offset the Considerable Losses (It's a Trap, It's Just Bait)
Clownflare has collapsed
Apple Delivered Very Disappointing Results, Said It Would Buy Its Own Shares (Nobody Will Check This), Company's Debt Now Exceeds Its Monetary Assets
US debt is now 99.98 trillion dollars
FSFE Still Boasts About Working Underage People for No Pay
without even paying them
IRC Proceedings: Saturday, May 04, 2024
IRC logs for Saturday, May 04, 2024
Over at Tux Machines...
GNU/Linux news for the past day
The Persecution of Richard Stallman
WebM version of a new video
Molly de Blanc has been terminated, Magdalen Berns' knockout punch and the Wizard of Oz
Reprinted with permission from disguised.work
[Meme] IBM's Idea of Sharing (to IBM)
the so-called founder of IBM worshiped and saluted Adolf Hitler himself
Neil McGovern & Debian: GNOME and Mollygate
Reprinted with permission from disguised.work
[Meme] People Who Don't Write Code Demanding the Removal of Those Who Do
She has blue hair and she sleeps with the Debian Project Leader
Jaminy Prabaharan & Debian: the GSoC admin who failed GSoC
Reprinted with permission from disguised.work
Jonathan Carter, Matthew Miller & Debian, Fedora: Community, Cult, Fraud
Reprinted with permission from disguised.work
Techrights This May
We strive to keep it lean and fast
Links 04/05/2024: Attacks on Workers and the Press
Links for the day
Gemini Links 04/05/2024: Abstractions in Development Considered Harmful
Links for the day
Links 04/05/2024: Tesla a "Tech-Bubble", YouTube Ads When Pausing
Links for the day
Free Software Community/Volunteers Aren't Circus Animals of GAFAM, IBM, Canonical and So On...
Playing with people's lives for capital gain or "entertainment" isn't acceptable
[Meme] The Cancer Culture
Mission accomplished?
Germany Transitioning to GNU/Linux
Why aren't more German federal states following the footsteps of Schleswig-Holstein?
IRC Proceedings: Friday, May 03, 2024
IRC logs for Friday, May 03, 2024
Over at Tux Machines...
GNU/Linux news for the past day
Alexander Wirt, Bucha executions & Debian political prisoners
Reprinted with permission from disguised.work
Links 03/05/2024: Clownflare Collapses and China Deploys Homegrown Aircraft Carrier
Links for the day
IBM's Decision to Acquire HashiCorp is Bad News for Red Hat
IBM acquired functionality that it had already acquired before
Apparently Mass Layoffs at Microsoft Again (Late Friday), Meaning Mass Layoffs Every Month This Year Including May
not familiar with the source site though