{"id":4126,"date":"2013-11-21T01:42:18","date_gmt":"2013-11-20T23:42:18","guid":{"rendered":"http:\/\/www.auditsi.eu\/?p=4126"},"modified":"2013-11-21T01:42:18","modified_gmt":"2013-11-20T23:42:18","slug":"les-systemes-dexploitation-windows-et-mac-os-sont-il-dotes-de-portes-derobees","status":"publish","type":"post","link":"https:\/\/www.auditsi.eu\/?p=4126","title":{"rendered":"Les syst\u00e8mes d&#8217;exploitation Windows et Mac OS sont-il dot\u00e9s de portes d\u00e9rob\u00e9es ?"},"content":{"rendered":"<p style=\"text-align: justify;\">Depuis quelques mois, l&#8217;actualit\u00e9 de la s\u00e9curit\u00e9 des syst\u00e8mes d&#8217;information est largement domin\u00e9e par les r\u00e9v\u00e9lations d&#8217;Edward SNOWDEN sur le programme d&#8217;espionnage PRISM de la NSA.<\/p>\n<p style=\"text-align: justify;\">Entre autres choses, la NSA est suspect\u00e9e d&#8217;avoir fait introduire des <a title=\"Articles sur les portes d\u00e9rob\u00e9es\" href=\"http:\/\/www.auditsi.eu\/?s=porte+d\u00e9rob\u00e9e\">portes d\u00e9rob\u00e9es<\/a> (<em>backdoor<\/em>) dans certains logiciels et syst\u00e8mes d&#8217;exploitation.<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2013\/11\/Logo-Linux.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4128\" alt=\"Logo Linux\" src=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2013\/11\/Logo-Linux.png\" width=\"336\" height=\"391\" srcset=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2013\/11\/Logo-Linux.png 336w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2013\/11\/Logo-Linux-257x300.png 257w\" sizes=\"auto, (max-width: 336px) 100vw, 336px\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">En septembre dernier, un journaliste demandait \u00e0 Linus TORVALDS, le cr\u00e9ateur du syst\u00e8me d&#8217;exploitation alternatif Linux, si la NSA l&#8217;avait contact\u00e9 pour ajouter une porte d\u00e9rob\u00e9e \u00e0 son syst\u00e8me. Ce \u00e0 quoi, il a r\u00e9pondu que non&#8230; tout en acquies\u00e7ant de la t\u00eate&#8230; Cette r\u00e9ponse ambigu\u00eb, toute en contradiction, a fait beaucoup parler et couler beaucoup d&#8217;encre dans les milieux de la presse et blogs traitant de s\u00e9curit\u00e9 informatique.<\/p>\n<p style=\"text-align: justify;\">Depuis, il a effectivement \u00e9t\u00e9 confirm\u00e9 que Linus TORVALDS a bien \u00e9t\u00e9 approch\u00e9 par les services secrets am\u00e9ricains. D\u00e9marche vaine. Rappelons au passage, que le syst\u00e8me d&#8217;exploitation Linux est <em>open source<\/em>. Ce syst\u00e8me, ouvert, est totalement transparent. Toute une communaut\u00e9 de d\u00e9veloppeurs ind\u00e9pendants et tr\u00e8s active gravite autour de ce projet. Toute modification du coeur du syst\u00e8me fait l&#8217;objet d&#8217;un processus de validation pointu. M\u00eame si Linus TORVALDS avait accept\u00e9 la demande des autorit\u00e9s am\u00e9ricaines, l&#8217;intru aurait rapidement \u00e9t\u00e9 d\u00e9couvert.<\/p>\n<p style=\"text-align: justify;\">Si la transparence est de mise chez Linux, qu&#8217;en est-il chez ses concurrents ? La question des <em>back doors<\/em> se pose chez Windows (Microsoft) et Mac OS (Apple). En effet, \u00e0 la diff\u00e9rence des projets <em>open source<\/em>, le code source de ces syst\u00e8mes propri\u00e9taires n&#8217;est pas rendu public par leur \u00e9diteur. Le fonctionnement du noyau interne de ces syst\u00e8mes n&#8217;est donc pas totalement connu et les modifications apport\u00e9es par leurs \u00e9diteurs, notamment par les nombreuses mises \u00e0 jour de &#8220;s\u00e9curit\u00e9&#8221; t\u00e9l\u00e9charg\u00e9es automatiquement par nos ordinateurs, ne sont pas contr\u00f4l\u00e9es par des experts ind\u00e9pendants.<\/p>\n<p style=\"text-align: justify;\">Nul doute que si la NSA s&#8217;est int\u00e9ress\u00e9e \u00e0 l&#8217;adjonction de portes d\u00e9rob\u00e9es sur le syst\u00e8me d&#8217;exploitation Linux (qui \u00e9quipe une part peu repr\u00e9sentative de PC mais une forte proportion de serveurs informatiques), elle a d\u00fb formuler la m\u00eame requ\u00eate aupr\u00e8s de Microsoft et d&#8217;Apple&#8230; Quelle a bien pu \u00eatre la r\u00e9ponse de ces deux \u00e9diteurs am\u00e9ricains ?<\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img decoding=\"async\" src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Les%20syst%C3%A8mes%20d%27exploitation%20Windows%20et%20Mac%20OS%20sont-il%20dot%C3%A9s%20de%20portes%20d%C3%A9rob%C3%A9es%20%3F\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"excerpt":{"rendered":"<p>Depuis quelques mois, l&#8217;actualit\u00e9 de la s\u00e9curit\u00e9 des syst\u00e8mes d&#8217;information est largement domin\u00e9e par les r\u00e9v\u00e9lations d&#8217;Edward SNOWDEN sur le programme d&#8217;espionnage PRISM de la NSA. Entre autres choses, la NSA est suspect\u00e9e d&#8217;avoir fait introduire des portes d\u00e9rob\u00e9es (backdoor) dans certains logiciels et syst\u00e8mes d&#8217;exploitation. En septembre dernier, un journaliste demandait \u00e0 Linus TORVALDS, &#8230;<\/p>\n<p><a href=\"https:\/\/www.auditsi.eu\/?p=4126\" class=\"more-link\">Continue reading &lsquo;Les syst\u00e8mes d&#8217;exploitation Windows et Mac OS sont-il dot\u00e9s de portes d\u00e9rob\u00e9es ?&rsquo; &raquo;<\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Les%20syst%C3%A8mes%20d%27exploitation%20Windows%20et%20Mac%20OS%20sont-il%20dot%C3%A9s%20de%20portes%20d%C3%A9rob%C3%A9es%20%3F\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"ngg_post_thumbnail":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[7,36,35,33],"tags":[603,94,1236,117,1237,1238,97,1240,241,602,93,95,1195,1628,658,1239],"class_list":["post-4126","post","type-post","status-publish","format-standard","hentry","category-breves","category-protection-des-donnees","category-securite-informatique","category-systeme-informatique","tag-apple","tag-backdoor","tag-edward-snowden","tag-espionnage","tag-linus-torvalds","tag-linux","tag-logiciel-libre","tag-mac-os","tag-microsoft","tag-nsa","tag-open-source","tag-porte-derobee","tag-prism","tag-securite-informatique","tag-systeme-dexploitation","tag-windows"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":false,"_links":{"self":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/4126","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4126"}],"version-history":[{"count":4,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/4126\/revisions"}],"predecessor-version":[{"id":4131,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/4126\/revisions\/4131"}],"wp:attachment":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4126"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4126"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4126"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}