DarkDragon wrote:The CIA and NSA have many people working for them day by day on finding security holes. Bricking a device is no problem for them, they just buy a new one. If they want to find a hole in a closed source system they will find it. By using an open source software you can ensure, that people around the world will check the system for security holes and eventually report them. CIA/NSA will never report them.
Stop overestimating them. 2 days ago I've spend 4+ hours learning that lot of data leaked from CIA, I can say the methods and tools they're using are generally primitive and targeted on stupid averaged user.
Nothing you can't find on any hacker forum, some tech blog or even here on forum sometimes, in tips & tricks section, hah.
That doesn't help to hack someone who cares about security and knows enough, and obviously doesn't allows to hack some HW in conditions I've described. Unless you are someone like Ben Laden, they just have no enough resources to spend them on something like that old HW [used by 0.00001% of all users], or just on some closed and not-enough-popular systems. Not saying than in remote cases, they can't know what the system it is [if something was done to nicely hide that].
Thus, they are cool against averaged user which blindly uses modern popular stuff, which has a lot of holes and lot of interested ppl are searching and selling exploits for those holes in that modern fashioned stuff.
But well, even that is much better that russian special services, lol, as russians are "hacking" mostly in a way of sending spam with malware, or coming to an owner of some web-service and threatening him with prison if he will not give them all the data (because they even have not so much funds to make or buy wide range of own exploits/tools as CIA, or just because they are not ones who uses methods from civilized countries).
I had much more irrational paranoia about special services abilities, until examined those leaked docs.
Also, this is another stupid myth about better open source security. You said too - holes are present always, and even in those mentioned docs there is enough of 0-day exploits CIA successfully uses to hack popular open-source soft.
I previously said about opensource, should add that "it becomes more secure as army of code maintainters grows, but not more secure against special services, buying 0-day exploits from a lot of hackers and having some army of own hackers". Generally only huge developers teams like Google, MS, Apple, etc have enough resources to keep their open-sourced soft less or more secure against anyone.
For lesser projects and developers higher security through opensource looks like a great and painful myth. In both cases, I'm pretty sure CIA and NSA just love open-source. Because it is so simple and cheap... comparing to efforts and moneys needed to disassemble & patch some 40mb executables of modern software, with a lot of new pain as soon as new heavy-modified version of it arrives ^_^ For example, even just if you take typical open-source project and pass in through some powerful C/C++ static code analyzer like PVS Studio... event this simple step will bring you a list of possibly exploitable holes.