Language Selection

English French German Italian Portuguese Spanish

German Foreign Office explains open source elimination

Filed under
OSS

The German government has given details of its reasons for migrating the German Foreign office from Linux and free software back to Windows and Microsoft software. The SPD (Social Democrats, the main German opposition party) submitted an initial question on "the use of open source software in the Foreign Office and other Government departments", but, according to the Green parliamentary group, the German government's response left various questions unanswered. These questions have now been addressed by Cornelia Rogall-Grothe, the German government's IT commissioner in a document.

The 39 questions concern both the German government's overall IT strategy and the migration of the German Foreign Office (Auswärtiges Amt, AA). The government's answers in terms of its IT strategy remained rather vague: the commissioner said that free software is not "inherently more secure than proprietary software", and that the German government supports the use of open source "wherever it is suitable and economical". The distribution of open source solutions is promoted by the Centre of Excellence in Open Source, she added.

rest here




More in Tux Machines

Security Leftovers

  • Windows flaw lets attackers take over A-V software

    A 15-year-old flaw in every version of Windows right from XP to Windows 10 allows a malicious attacker to take control of a system through the anti-virus software running on the system.

  • Google Continues to Make Strides in Improving Android Security
  • Google cites progress in Android security, but patching issues linger
  • Dark Matter
    Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware. Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

today's howtos

Kernel Space/Linux

Red Hat News