Post
Topic
Board Development & Technical Discussion
Re: Why did satoshi develop bitcoin in windows?
by
pebwindkraft
on 12/02/2018, 21:02:14 UTC
Properly secured Windows (except Windows10) computer is unbreakable. Even for NSA. Why? Because a 0-day in network stack or network card drivers is only way to hack it. Manually install all security patches. Disable all auto updates. Disable unnecessary services and configure firewall to reduce attack surface. It is it. I challenged to hack my Windows 7 or Windows XP machine to steal all my coins back then. Nobody succeeded. In such case the NSA/CIA/FBI will try to get physical access to machine to install malware or read disk contents.

It is ridiculous how paranoid some Windows haters are. They obviously never been hackers themselves and also dont know how police and spy agencies do things.

More notable thing that probably nobody noticed is that Satoshi's hard drive was using NTFS compression, most likely on whole partition. This is very untypical to have NTFS compression enabled on whole partition upon manual formatting.

Doesn't make sense to me. In order to be sure that something is not hacked, you would need to at least know what the code is doing. Sure this doesn't mean that Linux isn't hackable, everything with code is, but my point is.. how do you even know what updates to enable and what other updates to ignore? Updates are packages of closed source code. You are trusting to believe what it says on the description but you don't know what you are actually installing with each update, one of these updates could contain a backdoor for the NSA or something. You can block ports with a firewall, but that's about it. A keylogger that's embedded in a file that is part of the OS would go ignored by firewalls for instance. For example, imagine that the reporting tool in windows which is just an exe, sends a text file with keystrokes to someone... how would you even notice if you can't see what Dw20.exe is doing? (or any other closed source executable for that matter).

It goes even further... last year it was discovered, that all HP machines had a sound driver, which would log all keystrokes into a log file. The original intend is for sure unknown, but the idea was, that you had to capture the control keys to change the volume (and more). So there was debug code in the executables, and they have been detected fairly late. There is no evidence, that this data was used to be sent anywhere, but if a sound driver is able to log keystrokes, even those which are irrelevant for its function, then security in a layered fashion is not one of the strong points of this operating system. Now try to get the source code of this sound driver! You won’t, it’s also closed source. Same could be true for WiFi cards... closed source. Now compare this to Unicode systems. You can install proprietary software, but you must not! And you can read source codes of majority of the OS, and you can even modify it in a way, that you see, what is going on under the hood. You can’t do this with Windows. There is a reason, why this OS is not used in high secure environments...