Ask Catherine & the Solari Team: August 1, 2025 - Tech Corner

James Quaid
August 1, 2025

Solari Report

Ask Catherine

Tech Corner

August 1, 2025

Please log into the Solari Report to access subscriber content.

If you’re not a subscriber learn more here.


LATEST ASK CATHERINE



Latest Money & Markets and weekly interview



LATEST SOLARI culture


MOVIE

BOOK REVIEW

MUSIC

HERO

ACTION


Log in or subscribe to the Solari Report to enjoy full access to exclusive articles and features.

Already a subscriber?

  • Weekly interviews, including the popular Money & Markets show
  • Quarterly deep dives into major trends affecting you day-to-day
  • Aggregation of the most relevant news stories
  • Subscriber-only events and a digital platform to connect with other subscribers
  • Weekly subscriber Q&A sessions with Catherine and the Solari team
Learn More

share Share

9 Comments

  1. SAN FRANCISCO, July 29, 2025 – The Linux Foundation, the nonprofit organization enabling mass innovation through open source, today welcomed the AGNTCY project, an open source infrastructure that enables discovery, identity, messaging, and observability among AI agents from different vendors and frameworks. Cisco, Dell Technologies, Google Cloud, Oracle, and Red Hat have joined as formative members of the AGNTCY project under Linux Foundation governance.

  2. Regarding first question: Linux is rather safe, I’m using it privately and professionally for 20+ years (Linux sysadmin, cyber sec). I would rather stay away from very popular distros like Ubintu though.
    What is much more of concern and almost nobody is talking about is a (allegedly) build-in back door called IME (Intel Management Engine) and its equivalents on other platforms (eg. AMD Secure Technology). Learn about it, search for hackers articles from 2017 and around.
    BTW – comment section doesn’t work when I’m trying to post via Brave browser (probably most secure browser there). I have to use Firefox to post a comment.

    1. Yes, we are not Brave compatible – our tech team does not believe it is as secure as others because it has a Google core.

      1. Thank you Catherine.
        I would argue that whole Brave project is opensource and skilled tech guys can check “what is inside”.
        The google core is also opensource. And, for example, the same core is in Chromium browser, an open source project, and in Chrome, which is closed source and you cannot check “what’s inside”.
        The same is with Android, another project from google, however if you buy the phone with Android firmware preinstalled it is closed source. However, with a little of skill and a right hardware you can use (reflash) opensource Android without google closed source bloatware (called Gapps). Check LineageOS for example, you can use precompiled firmware or compile it by yourself from source code.
        On the other hand – the is no safe browser out there. There is no safe OS out there. There is no safe hardware out there (check info about how IME is working).
        Opensource software gives at least some ability of checking a source code how the software is/should work.

        1. Yes, agree. I do not believe that anything digital does not integrity. So we are building an enormous infrastructure on quicksand. I am reading Paul Emberson’s trilogy now. Curious to see where it leads.

          1. Paul Emberson’s “From Gondishapur to Silicon Valley”? I wasn’t aware of it till now, thank you. I was aware of Rudolf Steiner’s work though.
            Apologize that I will poke the daemon of IME again, but discovery of that shocked me to the core, literally for two days I was walking backward: IME implementation started in 2008, and it is literally computer inside of your computer, with a separate, independent connections to ALL internal devices: RAM memory, hard drive, microphone, camera, wifi, bluetooth etc… As long as it has some power – battery (you wonder why nowadays we cannot remove it), its operating system is working. Constantly. 24/7. You power off your device and if somebody knows how to communicate with IME (it has its own IP stack) it can read/write to your hard drive, enable the camera or mic. Doesn’t matter the encryption level of your data – at some point you decrypted it and the key is stored in RAM memory – accessible for IME.
            If, after booting your device, you would successfully try to kill IME process, it will reboot your device after 30 minutes and restart IME.
            There is no way to remove it and we can only guess that our “smart” phones have a similar capabilities…

  3. BTW the film referred to is Catch Me If You Can – I have just looked it up – with L. De Caprio

    Thank you for an astonishing look at the brazen I am disadvantaged EM

    This will be transmitted/or not via Brave

  4. Re Q1 : Is Linux secure? To the best of my recollection : A decade or two ago, a server in San Francisco (maybe LA) in a secured location had a break-in.
    That server was the primary source of uploads for the Linux OS. Linus Torvalds assembled a team of six trusted developers to review all of the source code for backdoors. This took six months.
    I cannot be sure of everything they found, but it was mentioned that a frequently used function contained code such that if two particular flags were set when the function (eg ‘wait’) was called, a backdoor was created.
    As others have commented, this might only ensure that the Linux OS was secure.

Comments are closed.


© 2025 The Solari Report