World

North Korea’s Computer Operating System Includes Spy Tools

This is no surprise that North Korea uses their capability to spy on their citizens to manage their image and population. Having a computer in North Korea is a luxury and a curse. I found it interesting that they mimicked Apple’s design in order to create their own operating system. The BBC article below gives you some analysis of their operating system.

Desiree- Managing Editor of SOFREP

The first in-depth analysis of North Korea’s internal computer operating system has revealed extensive spying tools capable of tracking documents shared offline and deleting suspicious files without permission, according to two German researchers.

You've reached your daily free article limit.

Subscribe and support our veteran writing staff to continue reading.

Get Full Ad-Free Access For Just $0.50/Week

Enjoy unlimited digital access to our Military Culture, Defense, and Foreign Policy coverage content and support a veteran owned business. Already a subscriber?

This is no surprise that North Korea uses their capability to spy on their citizens to manage their image and population. Having a computer in North Korea is a luxury and a curse. I found it interesting that they mimicked Apple’s design in order to create their own operating system. The BBC article below gives you some analysis of their operating system.

Desiree- Managing Editor of SOFREP

The first in-depth analysis of North Korea’s internal computer operating system has revealed extensive spying tools capable of tracking documents shared offline and deleting suspicious files without permission, according to two German researchers.

The system, Red Star OS, was designed by the notoriously secret state to superficially mimic Apple’s OS X, but hidden extra features allow it to watermark files uploaded to the computer and link them permanently to a user.

The covert tools were discovered by Florian Grunow and Niklaus Schiess, who presented their findings yesterday at the Chaos Communication Congress tech conference in Hamburg.

Mr Grunow and Mr Schiess, from German IT security company ERNW GmbH, spent a month pouring over the code of Red Star OS version 3.0, which was first leaked about a year ago.

The system’s coders “did a pretty good job” of mimicking the basic design and functionality of Apple computers, Mr Grunow told the BBC, but with a twist.

Read More- BBC

Image- Reuters

About SOFREP News Team View All Posts

The SOFREP News Team is a collective of professional military journalists. Brandon Tyler Webb is the SOFREP News Team's Editor-in-Chief. Guy D. McCardle is the SOFREP News Team's Managing Editor. Brandon and Guy both manage the SOFREP News Team.

COMMENTS

You must become a subscriber or login to view or post comments on this article.

More from SOFREP

REAL EXPERTS.
REAL NEWS.

Join SOFREP for insider access and analysis.

TRY 14 DAYS FREE

Already a subscriber? Log In