Vista Security Claims Debunked 315
An anonymous reader writes "Apparently Microsoft still hasn't learned that counting vendor acknowledged vulnerabilities isn't a good way to establish the security of an OS. As an analysis of Microsoft's claims on Full Disclosure shows, we see that the methodology used was badly flawed. A bug in Firefox (not to mention emacs), counts as a flaw for Linux, while IE bugs get ignored on Vista's chart. Then we see that vulnerabilities aren't vulnerabilities when they're security-challenged features such as Vista's Teredo. Also, there's far too little consideration given to severity, given that it stoops to counting even extra access restrictions on a file in OSX to have something to show. In short, the original Microsoft analysis was good PR and poor research."
Microsoft found making PR-FUD-ing research (Score:5, Funny)
Re: (Score:3, Insightful)
Re: (Score:3, Funny)
But, I just quit my job at Google and applied to work at Microsoft based on this: http://slashdot.org/article.pl?sid=07/06/27/131421 9/ [slashdot.org].
Re:Microsoft found making PR-FUD-ing research (Score:5, Insightful)
Such straight forward conclusions are impossible to make. Based on the following points.
- If many people are analysing code, you will find more bugs. If you don't review your code (or for example, don't have peer review - which closed source often lacks.) Then no bugs at all will be discovered.
- The existing number of unfound bugs is related to the number of discovered bugs. Well no not really: The number of found bugs is actually related to how long and how many researchers have been testing and actively looking for the bugs and second to that is how buggy the software is. I can assign a team of one researcher with no experience and they'll never find any bugs in the poorest of software.
- A difficult and obscure to exploit bug (one that requires a perfect storm of conditions) is as important as a bug that is easily exploitable(e.g. drive by downloads). Also with that: Bugs that bring down the whole system versus bugs that only fail a single service.(E.g. blue screen versus failing to display a JPG correctly.)
- Differences in reporting models: Total lack of transparency versus an open forum. E.g. Microsoft vs Linux reporting. You can only compare reporting from the same kind of reporting models. E.g. You can compare kHTML versus Mozilla (as they are both open and have similar review structures), but not Windows vs BSD (the dissimilar reviews allow misrepresentation via favourable skews and different classification paradigms.
Re:Microsoft found making PR-FUD-ing research (Score:5, Insightful)
Fixed that for you.
Re: (Score:3, Interesting)
Fixed that for you.
Oh, I dunno 'bout dat. A year or so back, I got email about an open-source program that I'm responsible for, and which has a few hundred users that I know of. It was from a couple of guys in a college course about computer security. They explained a security hole (buffer overflow) and gave an example that exploited it. I fixed th
Re:Microsoft found making PR-FUD-ing research (Score:5, Informative)
- The existing number of unfound bugs is related to the number of discovered bugs. Well no not really: The number of found bugs is actually related to how long and how many researchers have been testing and actively looking for the bugs and second to that is how buggy the software is. I can assign a team of one researcher with no experience and they'll never find any bugs in the poorest of software.
Re:Microsoft found making PR-FUD-ing research (Score:4, Insightful)
Most Secure Windows ever (Score:3, Funny)
Re:Microsoft found making PR-FUD-ing research (Score:4, Informative)
Windows Vista is "dramatically more secure than any other operating system released", Microsoft founder Bill Gates has told BBC News [bbc.co.uk].
(Emphasis added.)
Microsoft "Research" (Score:5, Funny)
Re:Microsoft "Research" (Score:4, Funny)
Re: (Score:3, Funny)
The really sad part.... (Score:5, Insightful)
Unfortunately they seem to be so obsessed with winning by FUDing and spinning that they end up making crap. This is a great disservice to the whole computer industry.
Re:The really sad part.... (Score:4, Insightful)
Re: (Score:3, Interesting)
Re: (Score:3, Interesting)
Perhaps because Windows XP and Vista don't show BSODs anymore but rather just restart the whole system silently, leaving it up to the user's imagination what has caused this? I am not trying to rant (well.. okay, partially I do) but how exactly does stability issues concealment count as good engineering?
Re:The really sad part.... (Score:5, Informative)
Alternatively, press F8 during bootup and disable automatic restarts.
Re: (Score:3, Interesting)
you really need to learn to read the word "user".
tech based people aren't reall "users" in the base term.
Incorrect. Tech based people are as much of a user as anyone else.
The only difference is that non-tech based people will try to contact the tech-based people in order for the computer to be repaired. A technician will immediately try to get information about that STOP error code and if necessary, guide the user to disable the automatic restart for one session.
Being condescending to someone because they make a valid point only paints yourself as a monkey.
Their point is valid, you are not.
Condescending doesn't mean what you think it means.
If you carefully reread my posting, you will notice that I addressed the first point where erro
Re:I'll call bull (Score:4, Interesting)
I call BS too. I used to have an unstable video driver (open source ATI stuff) and I more than once ssh-ed into my box to restart X-windows.
At least on Linux you still have a chance to recover. At least I have open and closed drivers, at least I have a choice.
BTW, the only time I ever had a kernel panic on Linux was when I had faulty RAM... about 7 years ago.
Re: (Score:3, Interesting)
It gives you a chance to atleast do a controlled restart including a sync. You also have a chance of debugging what went wrong if you are inclined to that.
Arguing that a system that gives you a chance to figure out what went wrong and recover gracefully from it is somehow equal to a system that simply hides everything ugly, booting in mid-whatever is simply
Re:Heh (Score:4, Insightful)
Heh, you've never used any *nix before, except as a toy. There's a fucking mountain of difference. Does your box run any services for the network? Does it share any printers or disks? Does it have any other users logged into it? Does it run any scheduled tasks or background jobs? If you're doing *any* of these things, then there's no way in hell you want the system to reboot. If you're not doing any of these things, you're not running Linux, you're running a bloody X-terminal.
Re: (Score:3)
On may occasions I've had to restart an X session because of faulty display drivers and you can move the running apps to the new one.
I'm not going to hold your hand and tell you how because thats not the way of the linux admins.
]]
--I call bullshit. (And I'm a Linux admin.) Prove your case by sharing the information or GBTW.
Re:The really sad part.... (Score:4, Insightful)
Unlike most people here I do like Vista, but I honestly think that compared to their competitors they have lost a lot of ground in engineering strength compared to what they once were.
Re:The really sad part.... (Score:4, Informative)
No it wasn't. OS/2 was waaaaay ahead of win95 in pretty much every way.
Thing I learned in the marketing class I failed: (Score:5, Insightful)
Re:Thing I learned in the marketing class I failed (Score:5, Insightful)
You haven't read an annual company report recently, or ever for that matter?
Even in sdoftware - or pharmaceutical companies where one would assume that a lot is spent for research the R&D budget is usual ~18% (which varies, of course) while sales and marketing usually eats away approx. half of the costs.
Sales, marketing and distribution is horrendously expensive and gets a far bigger chunk of the budget then R&D.
This is a generalisation, of course, but true for the vast majority of companies.
Re: (Score:3, Funny)
Upfront cost isn't the point (Score:3, Insightful)
Two prime examples from my line of work of people buying into marketing hype with zero understanding of
Not cheaper ... (Score:4, Insightful)
It's not cheaper (quite the contrary), but the effects of marketing are much more immediate than the effects of research. And it's the quarterly report that counts, not how the company is doing in three years.
Re:Thing I learned in the marketing class I failed (Score:3, Interesting)
Microsoft is about making money ... not products (Score:5, Insightful)
This means simply that Microsoft will generally pour just enough resources into a product to beat the competition and dominate the marketplace. We saw that with the browser war. When it had to overtake Netscape it came up with a good product. After it killed Netscape, and there was practically no other comparable browser, resources were taken off the browser product because it was good enough and there was no sense whatsoever in improving it.
We saw it with the IDE's. When Microsoft had to compete with Borland {Borland Pascal; Borland C/C++} it came up with the 'Visual' IDE. Visual C, Visual Fortran. It was a good IDE, and it won against Borland. After that ... it languished. Now ... now that we're seeing the Eclipse IDE and SUN's IDE ... suddenly Microsoft floors the accelerator again.
The same holds for the Operating System itself. Windows was systematically tailored to capture the eye of consumers and businesses, which it did very well. Never mind that the internals were {and still are} cludgy. What the user sees is the user-interface; that's what sells. Security flaws? Well ... as long as there is no competitor to which people can switch while retaining their investment in software and training ... security flaws aren't a show-stopper. Getting their own stuff to work was {previous Windows version have so many tightly coupled components that you never knew what would break next when you changed or added anything}, and that's why Jim Allchin very sensibly steered towards a properly engineered Windows. Vista in other words.
Given that we're seeing Linux, OS-X, and Open Solaris competing in more or less the same market we also saw an increased effort from Microsoft to tart up the user interface. Those transparant windows thingies.
This is something fundamental you have to understand about Microsoft. They are calculating folk, and never ever were trailblazers. Tail-light chasers, yes, but never trailblazers. 'Good Enough' is their goal, and their yardstick is ... the competition. Why? Because to Microsoft 'Good Enough' means 'Good enough to win in the marketplace and bring in revenue'. That's how Microsoft became so rich.
Bad examples (Score:3, Insightful)
Visual Studio vs Borland: VS was never better than Borland on a level playing field. MS only completed by being a bully.
My main point is that MS don't get their products Good Enough. MS get there by putting their effort into attacking the competition rather than by developing (or even offering) good products.
I think MS marketing is more Mafia tactics than anything technical.
Re:Microsoft is about making money ... not product (Score:4, Insightful)
x86 made only incremental gains from the 486 to the Pentium IV. Suddenly, wham! AMD comes out with the 64-bit Opteron and Athlon 64 and they kick the crap out of Intel on price, performance, and power consumption for a year or so.
Now we've seen a ferocious flurry of innovation from Intel, which has suddenly been pouring money into R&D and taking advantage of its superior manufacturing processes. We've got Intel vs. AMD to thank for quad-core, low-power, hardware virtualization... and best of all, $59 dual-core 64-bit processors from Newegg
Now AMD is falling behind fairly rapidly, and we can expect Intel to slack off its R&D correspondingly. But in a year or five, AMD or someone else (VIA? IBM? MIPS?) will be back with something new and send Intel scrambling again.
Re:Microsoft is about making money ... not product (Score:4, Insightful)
x86 made only incremental gains from the 486 to the Pentium IV. Suddenly, wham! AMD comes out with the 64-bit Opteron and Athlon 64 and they kick the crap out of Intel on price, performance, and power consumption for a year or so.
I think you need to seriously revise your x86 history.
That is not to say that x86_64 wasn't a significant improvement, but to basically suggest the Pentium, Pentium Pro/II/III and Pentium 4 were just faster 486s is ludicrous. Each of those CPU families represents a serious increase in the design and capabilities of the x86 platform and they all came from Intel. Indeed, one of the main reasons x86_64 was so significant was because it repesents one of the few times AMD has been the leader, not the follower, in the last few decades.
Re: (Score:3, Funny)
Re:Microsoft found making PR-FUD-ing research (Score:5, Funny)
(*) MS Water(tm) tested at temperatures below 0 degrees C and above 100 degrees C, GNU/Water and H2O-BSD tested between 0 degrees C and 100 degrees C.
As Gunnery Sergeant Hartman would say (Score:2, Funny)
Re: (Score:2)
Re: (Score:3, Insightful)
Shocked! (Score:5, Funny)
You don't need to see our identification. (Score:5, Funny)
Re:You don't need to see our identification. (Score:4, Interesting)
1. I think we all know where the quote is from.
2. Except you.
Not surprising (Score:2, Insightful)
Don't accept abuse. MS apparently lied. (Score:5, Interesting)
Quote from the Slashdot story: "In short, the original Microsoft analysis was good PR and poor research." It amazes me how easily people accept abuse, and give excuses for being abused. It was not "good PR". My best understanding is that Microsoft's analysis was an intentional lie.
My rule number one in dealing with Microsoft: Unless forced by circumstances, never upgrade to a new version of Windows until the second service pack is released. Let other people have the grief. The huge number of bugs in Windows XP before SP2 was very expensive for us. If I remember correctly, SP2 fixed more than 630 bugs, and some of the fixes were not documented. It is not only the vulnerabilities that are expensive.
Quote from the link in the Slashdot story: "Also, the entire networking stack was rewritten for Vista, and that means lots of new bugs are present. I have already spoken to other researchers who have not disclosed such flaws publicly. However, a good start for learning about some is the Symantec paper that analyzed Vista during the BETA phases and revealed numerous issues."
Microsoft has, in my opinion, a long, long history of not allowing their programmers to finish their jobs. There were even security vulnerabilities in the Microsoft Help protocols!
Re:Don't accept abuse. MS apparently lied. (Score:4, Informative)
Better yet:
Wait until the service pack is out and independent reviewers are happy with it. Because if people stick to the rule "after SP X things are fine", it is merely an incentive for Microsoft to rush the service packs until the number X in question is reached.
In the case of Vista, it seems Microsoft was already organizing the beta testing for SP1 before the OS was released to end users:
http://news.com.com/2100-1016_3-6152704.html [com.com]
That article was from January 23rd. Looks like the beginning of a trend to increase the SP count as fast as possible.
Re:Don't accept abuse. MS apparently lied. (Score:4, Insightful)
I don't think it has to be. Let's consider a hypothetical case: suppose you had an chemical plant that for years spewed toxic effluent into the river, and which got a deservedly bad name for this. Then, let's suppose, the cleaned up their act and stopped dumping toxins, maybe compensate the people living locally.
At this point, the company still have a bad image, even though they are now good neighbours, so it's a legitimate tactic to get a PR crew in to address the image problems. You've seen the sort of thing: take some film crews around the plant, make some commercials with lots of pictures of sunlight, ripe wheat, green trees and healthy babies.
On the other hand, they could do pretty much the same thing if they haven't got rid of the toxic effluent, or if they solved the problem by venting it as vapour through the air conditioning system at the nearest school.
The trouble is that companies seem to have figured out that they get about the same effect whether they fix the problem or not. So why spend money fixing the problem if the PR is all that's needed?
So, yeah, PR is pretty much the same thing as lies. It needn't be, and it shouldn't be -- but on the whole, that's the way to bet.
Not that surprised... (Score:5, Insightful)
Of course, if anyone should be counting browser flaws as OS flaws, it's MS. MS makes the case that they can't remove IE from the OS since it is integral to it working properly, yet doesn't count them on the vulnerability list.
Meanwhile, FF doesn't even have to come with a Linux distro, and a bug that compromises FF as an app is much less likely to compromise the OS as a whole.
Looks like more FUD to scare non technical people from "illegal" and "unsafe" Linux.
The Microsoft guy did a second report (Score:5, Interesting)
This just debunks the first report.
Re: (Score:2)
Re: (Score:3, Informative)
Also, none of the vulnerabilities were enumerated, so you couldn't guess at what software was installed on that basis.
So it's quite possible that the report was based on Linux, X11, and GNOME with the minimal amount of other stuff to make the system run, but somehow
Re: (Score:3, Informative)
Some of the issues I noticed in the second report include:
Re:The Microsoft guy did a second report (Score:5, Insightful)
Regardless of whether it does or does not the claims are as silly and irrelevant as the slashdot stories 'proving' that Linux is more secure.
The number of bugs is not relevant, it there is one bug the system is vulnerable. What matters is the window of vulnerability. The time between discovery of the bug by the bad guys and fixing it by the good guys.
UNIX used to be known for its insecurity. Richie and crew invented the buffer overrun bug, Tony Hoare was referring to this blunder in C when he gave his Turing Award lecture he brought up the fact that the first principle of ALGOL 60 had been security.
The perceived level of security of a system has much less to do with familiarity than any actual objective measure. None of the systems that are on the market today is built well enough for its supporters to start challenging others to this type of dick size measurement contest. Its silly and unhelpful.
Re: (Score:2)
This just debunks the first report.
As it stands, this debunks the first and second (i.e., all) reports.
Re: (Score:3, Insightful)
Re: (Score:3, Insightful)
Now... (Score:4, Funny)
Teredo (Score:3, Insightful)
Re: (Score:2, Insightful)
if microsoft opens a door for exploits they have a vulnerability. if another system also has a similar capability is totally irrelevant, also from the point of view of a comparison. the question is, is windows more secure or less secure because of this feature?
Re: (Score:3, Informative)
A vulnerability is a vulnerability regardless of whether other systems have similarly flawed mechanisms.
If Mac OS X had a vulnerability in its Apple File Service, it wouldn't be dismissed simply because Windows doesn't natively support the AFP service.
Re: (Score:2)
Re: (Score:2)
stupid posting filter.
stupid posting filter.
stupid posting filter.
stupid posting filter.
goddammit I need a submit macro.
Submit Macro (Score:5, Funny)
You mean like the "Preview" button right next to the "Submit" one?
Re: (Score:2)
Yep, I would agree with that. Linux would be less secure, because it's hackable over wire, whereas your hypothetical GimpOS can only be hacked from the console. GimpOS may be considerably less capable in many ways, though, as is often the tradeoff.
Since when does acce
Depending upon your definition of "security", yes. (Score:5, Interesting)
Actually, it would be appropriate.
If you can remove an avenue of attack, you have increased the security of your system.
Now, by removing it from the Internet you have also reduced the FUNCTIONALITY of your system.
So you end up with a less functional, more secure system.
Security is all about evaluating the possible threats and reducing their effectiveness.
No. If it is an avenue for attack, it is an avenue for attack.
If it is vulnerable, it is vulnerable.
We've been over this before with Firefox's avoidance of ActiveX. Sometimes, increasing your security simply means NOT including some functionality.
Re: (Score:3, Insightful)
Here's why: assume that windows was technologically backwards and couln't get on the internet. Would you then agree that Linux was less secure, because the possibility exists to hack it over the internet while that possibility does not exist for windows?
Actually, yes, if all other things remain equal. What kind of moron are you imagining who would claim otherwise? I have to call "straw man" on this one.
Let's, in fact, *actually* make things more equal. Two *exactly identical* PCs with *exactly identical* installs of Linux, with one and only one exception: PC A is connected to the Internet, PC B is not. Do you *honestly* believe both PCs are equally secure? That the non-networked PC is not, actually, more secure[*], all other things remaining equal?
[*] I h
Re: (Score:2, Interesting)
Re:Teredo (Score:5, Funny)
Look, Windows can't even compete on features against Puppy Linux.
No Microsoft sales droid will ever get in a pissing contest against a full blown Linux distro with more than 20,000 packages installable. They'd just end up with a wet leg and a deep-seated sense of personal inadequacy.
Re: (Score:3, Insightful)
Re: (Score:2)
Re: (Score:2)
That makes no sense... (Score:2)
So the vulnerabilities in ActiveX and COM shouldn't be counted either since Linux doesn't use those... Or vulnerabilities in DirectX shouldn't count because Linux doesn't use it?? That just isn't logical.
Anything that can be used as a vector to successfully compromise a computer should be counted as a vulnerability because that's what it is.
Re: (Score:3, Insightful)
I am sorry, but that is incorrect. Anything that can be used as an exploit, no matter how big, small or unlikely is a potential exploit and must be listed as a security risk. This is the kind of thinking that causes most security issues. Do yourself a favor and don't think like that. Ruling out a security risk that might happen for any reason is looking the other way, and puts you, your client (employer) and the rest at risk. It might also cost you your job. I have seen people let go for much less.
If
Remove the power cord too (Score:4, Funny)
er (Score:2)
Re:er (Score:5, Insightful)
Vista updates by default. It is nicely built into the shutdown interface. By default you "update and shut down" if an update is available. Firewall is also built in and seems to be relatively well designed. Very honestly I am impressed with Vista's default security.
The rest of your post I agree with. For example will this help my sister-in-law who loads every toolbar and screensaver known to man? Nope. If a user downloads flaky spyware software, there isn't an OS that can help. But Vista truly is a step in the right direction for the majority of folks who just want to browse and email.
Re: (Score:2)
I actually have about half a dozen icons on my desktop it's impossible to delete. You hit delete, the UAC prompt comes up, you confirm, and *nothing happens*. You'd think that would have come out in beta testing.. maybe it did, and MS ignored it.
I'm currently offloading my work into a win2k3 client ready to ditch vista for good.. taking much longer than I'd hoped, but my six months of vista hell is nearly over (yay!!!). We d
Re: (Score:2)
Re: (Score:3, Informative)
Re: (Score:2)
Re: (Score:2)
Updates on Vista and updates on, say, Ubuntu are quite different. The automatic updates on Vista upgrade the core OS components. The updates on Ubuntu update all of the officially supported pacakges - everything from OpenOffice to The Gimp to Freeciv. If there's a security bug in Photoshop's processing of .tiff files, Vista automatic updates won't help you.
Strangely, It Doesn't Matter (Score:3, Insightful)
I work in a Microsoft shop. And while I have a great boss, (really, no kidding) the company is Microsoft all the way. There is zero logic at play.
But that's the way it goes. I'm old enough to remember when "Made in Japan" was the cultural equivalent of today's "Made in China." That had little basis in reality then, just like Microsoft customers today just aren't ready to comprehend **buying** something other than a Windows box and just take Microsoft's ridiculousness as fact. In time though, I think that can change. Just like the Japanese and their cars.
Get The Facts (Score:2)
Re:Get The Facts (Score:5, Funny)
Given Slashdot's exemplary editorial standards, how could it possibly be otherwise?
This is clearly a gross oversight on Taco's part, and will be looked into with the gravest of concern, there can be no doubt. I suspect your well-crafted tag will don the front page in no time, perhaps even in an extra-crisp font to make up for any negligence and mishandling involved.
I look forward to it with heightened eagerness, and commend you on the alacrity and aplomb you've shown in this, your all-important tag-choosing endeavor.
Godspeed, you will prevail.
And here I was... (Score:5, Funny)
No, this is still good (Score:3, Insightful)
In this narrative, Josh is the typical One-Trick-Pony, Microsoft MC## who blesses Microsoft every day for making his income so easy to come by and truly believes that Microsoft is the hammer and everything looks like a nail. Gunter is an all-around generalist who is unafraid of anything "computer" and knows enough to work on routers, networks, servers and workstations of just about all varieties which happens to include Linux among others.
Josh: "Hey, just read this security assessment comparing Vista and Linux... Vista won by a mile."
Gunter: "Yeah, I saw that... I also saw -->this-- article exposing the flaws and inconsistencies in their comparisons."
The point here is that being readily armed with a rebuttal is handy.
Re: (Score:2, Insightful)
woohoo if only it gave the right reason (Score:2)
It's flimsy but I suppose you could say that recognizing reported flaws and patching them quickly shows a project or vendor takes security seriously but that is all these vulnerability reports are good for. You could say that more reported vul
FUD all around (Score:2, Interesting)
Armchair critique (Score:4, Interesting)
This isn't a debunking.
It's an armchair critique of someone else's work.
A competitor (see Live OneCare) wrote an article about an early BETA of a new OS saying is had some issues? Shocking!
What are you saying here, Kristian? Bugs are inevitable, so we should just give Apple a free pass on their share of problems because, well, it affects all software?
Ok, that's enough of that.
I feel Kristian really needs to perform his own research and analysis, and draw his own conclusions.
PS: Don't mod this as flamebait until you read Kristian's entire post. Really.
This was fairly obvious at the time. (Score:5, Insightful)
Any observer from a tech background would know that this would turn his results to shit, but he is;
Vista on Firewalls... (Score:5, Funny)
I Am So Amazed That MS Would Deceive (Score:5, Funny)
Like literally copying/stealing other people's code line for line and putting it in their OS? (Stacker)
Like putting in software hooks to see if competing office products were running and then crash them or make them run slow? (WordPerfect)
Like swapping code in an OS and a browser to make it appear that the browser was integral to the OS to weasel out of antitrust issues? (Win98 / Explorer)
Naw... I just can't believe that MicroSoft would stoop so low as to try to promote its "ground-up" new OS (that amazingly has many of the exact same vulnerabilities as XP) as being hardened and more secure than Linux and OSX>
They wouldn't do anything like that, would they?
Slander and Libel (Score:4, Interesting)
Stuff like this seems very close to being Slander and Libel [wikipedia.org]. I'm sure a more informed reader will know why it isn't, but even then, it just seems quite close to being so. There are many organizations and individuals with an invested interest in the promotion and sale of Linux.
Brandon Petersen
Emacs is a bug? (Score:3, Funny)
And my Porsche has an annoying leak (Score:3, Insightful)
See it's not about theory, fanboys. It's about practical outcomes. Per person per unit per second per whatever the practical outcomes of MS 'security' are disaster and failure compared to everything else. Period full stop. And if all the fanboys in the world, got off
You can wave your MS flag in my face all.fucking.day. telling me about the theoretical import of security gaps in some other widget and it won't amount to anything because the effect of these gaps is maybe 0.0001% of the effect of yours.
So suck it up, my pimpled minions - your God is a cardboard God.
Re: (Score:2)
Obscure? And the 2nd study is just as bad! (Score:5, Insightful)
Then you claim that the second report addressed all those issues. That's not at all true. Sure, it doesn't count Firefox bugs any more, but that's not the real problem with the study. The real problem is that counting vendor-acknowledged bugs isn't a security metric at all! That's right, it's not the least bit useful for giving either an academic or real-world measure of security. You can't rescue the original study from that flaw without redoing it and abandoning the original premise.
But I guess you wouldn't know that, because you don't know these "obscure" sites that people who know about computer security do. I mean, next thing you know, people will be citing virtual unknowns like Bruce Schneier as if they knew anything about security! Or maybe Fyodor, I bet he doesn't know a damn thing about networking. What did he ever do? Make up that silly fake application they used as a "hacking" tool in the Matrix movies? [/sarcasm]
Re:Obscure? And the 2nd study is just as bad! (Score:5, Insightful)
"The numbers" would certainly look very different if Microsoft adopted the methodology used by most open source projects of fully disclosing every bug. Or if open source projects mirrored Microsoft's practices. It is very well known that Microsoft does NOT fully disclose all bugs and many cumulative patches silently fix MANY problems. The severity of bugs is also classified very differently.
You are right about one thing, it is all a numbers game. But you are WRONG that it means anything, even that Microsoft is improving. It means NOTHING. Nothing at all. It's only a numbers game. Even if someone else games the numbers differently and Linux-based systems look better, it still means nothing to compare numbers of bugs when very different philosophies and practices govern which bugs are fully disclosed and how their severities are rated.
Re:Where is the debunking? (Score:5, Informative)
That's because you are gullible enough to believe the hype, aggravated by your lack of will to perform a basic search for the facts. Here is a bit of debunking from a quick google search.
From Secunia's advisory atatistics:
Those are real world facts supported on real world evidence which is freely available to the public. It isn't a random blog entry which is based on god knows what data which is only known by the author and possibly doesn't even exist. So where in fact is there a need to "debunk" a moronic, unsubstantiated claim made by some microsoft employee, specially when there is all that evidence right in front of everyone's face?