What’s in Your Computer (and phone, and WiFi)?

gates

Lenovo

This week the news is full of Lenovo, a computer manufacturer that has been selling machines that they have already fitted with what some call Malware or just Adware. Magic in the machine indeed!

The mal/adware in question is made by a company called “Superfish.” The software is essentially an Internet browser add-on that injects ads onto websites you visit. Details here.

Besides taking up space in your computer, the add-on is also dangerous because it undermines basic computer security protocols.

That’s because it tampers with a widely-used system of official website certificates. That makes it hard for your computer to recognize a fake bank website. This means that you are more likely to give all of your personal data away, let nasty things into your computer, and allow people to monitor your use.

No good I hear you say, and all so that they can feed you adverts while you are browsing.

Hidden Extras?

But this news does bring up another question, what else is in the computer? What else is it programmed to do? The simple answer is that I and probably most of you do not know. We have bought a machine that does the things we want it to do, but who knows what else?

Now as I eat my breakfast, I like to read the ingredients on the side of the packet. It is good for language skills as it is usually in several languages. But can I do this with my computer? You don’t get much in the way of documentation with a $400 laptop. Certainly not considering what is inside it.

So the computer company in question have disabled something at their end and the problem is resolved. But if they tell you that they fixed the problem are you going to believe them? After they did something that put your computer and everything saved on it at risk? Or should you put a new operating system on the new machine, wipe the hard drive and start again?

Why do we trust these manufacturers when they consistently do things that are not in our interest? WiFi providers that con your computer into trusting fake certificates so that they can block certain sites (and read your mail or follow your searches)? Samsung that record your voice through your smart TV and send it non encrypted over the Internet to unnamed third parties, social media sites and search engines that collect your data, mobile phone companies that map your every movement, the list goes on.

So if you cannot trust wifi, or computer manufacturers, or Google, or Facebook, or Samsung to treat our data securely and correctly, who can you trust? And more to the point why are we giving them our lives to play with?

US Border Laptop Searches

This week in the US many news outlets are reporting a story that relates to how private the data on your computer, hard drive or mobile phone may be when passing national borders.

In a legal ruling a judge has in effect supported immigration officials’ rights to look inside your computer if you want to bring it in to the USA. The court ruling relates to an incident in 2010 when Pascal Abidor, a student crossing from Canada, had his laptop confiscated and searched.

A Laptop Search

A Laptop Search

The student claimed that this was unconstitutional as the 4th amendment states that “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated….” The US has long held however that this amendment cannot be upheld when dealing with people entering the country.

The judge ruled however that “The agents certainly had reasonable suspicion supporting further inspection of Abidor’s electronic devices”. What is not widely reported is the circumstances that lead to this decision. Abidor has both French and US passports, and upon entering he chose to show the passport that did not contain Visas that demonstrated that he had visited Lebanon and Jordan,  giving officials the impression that he was trying to hide something.

Agents spent five hours searching his laptop and USB drives, and then demanded that he write down his passwords and hand over the laptop and storage media. The laptop was returned by post 11 days later.

There are rules about what the authorities must do with data seized in these cases. All data that is deemed innocent must be destroyed within 7 days of seizure unless permission is given to keep it for longer. Many blogs however cast doubt upon whether an unregulated and poorly reported system can actually enforce this however, an online search of the story gives many different perspectives. The Homeland securities News Wire has one of the most informative.

I presume that like me many of you keep a great deal of personal data on your laptops, from tax returns, bank details, love letters and personal photos, and all of these things may be accessed in a case like this. One issue that has come to the fore has been brought by researchers and reporters, who may not be able to reveal sources of information for ethical, security or legal reasons, but may unwittingly do so by leaving evidence of their informers’ identities on their computers.

The line is blurred here, as today smuggling must include information smuggling and authorities may need to search information media, but an individual must be aware that all information carried over an international border is open to search. This must have repercussions in terms of industrial as well as personal privacy.

Can you recondition an old computer?

There are many ways to deal with old computers. One popular way is to get rid of it. This is because old computers have no value, are slow and take lots of physical space.

The other way to deal with them is to sell them for a super low price so that you can buy a new one without paying too much. However, second hand electronic stuff does not really have any value. For instance, you probably ended up selling a graphic card for $50 that you bought for $200-$300 originally.

So why not keep your old computer and make good use of it.

How to rebuild an old PC

1. Format your hard disk to ensure you have completely remove all the data in it – remember that even formatting your disk might not remove all your data.

2. Install an new Operating System. If you are looking at Windows, XP might be a good choice for an old PC, however 7 also handles low spec hardware pretty well, so is also worth considering. There are several reasons why I think Windows XP is no longer the best choice:

  • License rarity – Windows XP is 3 versions behind the current Windows operating system, meaning few firms still stock XP licenses
  • Support has ended – Microsoft have officially announced the termination of the support for Windows XP in 2014
  • Malware issues – Windows XP is prone to more security risks than more current operating systems, simply because it has been around longer; this means you are likely to need a better antivirus software to keep the PC safe

If you don’t want to go down the Windows route, I highly recommend is the Ubuntu, which is a free Linux OS. There are several free Linux operating systems out there but so far, I think Ubuntu is one of the popular Linux distribution and probably easiest to use.

What is the requirement to run Ubuntu? According to the official site, these are the requirements.

  • 700 MHz processor
  • 512MB of RAM
  • 5GB of hard disc space
  • VGA capable of 1024×768 screen resolution
  • Either a CD/DVD drive or a USB port – or both

I bet you have a better PC than Ubuntu requires 😉 Ubuntu

Uses for an old computer running Ubuntu

No matter how old the computer, it always has uses. Here are some of my suggestions:

  1. Use it for regular web browsing. With a lightweight operating system (which won’t suck up your RAM and CPU usage) your old computer can still perform pretty well for simple web browsing
  2. Use it for data backup. You can always transfer all your important stuff into an old computer, and use it as a backup machine, so you can keep your files safe and access them easily
  3. Home surveillance system. If you buy a webcam or two and install them into your house you could use your old computer to run your own home surveillance system!

So now, if you have an old computer lying around or burred in your storeroom why not dig it out and start making good use of it?

If you have any good idea on how to re-use your old computer, why not share with us below?