Since the Snowden leaks Surveillance Program by Government Officials Why dose it took 2 years to figure it out that Juniper’s is Backdoor by NSA Surveillance Program? Because they were giving NSA the time to Deploy the new Technology Surveillance Backdoor.

Surveillance and Backdoors have been an important and trending topic over few years and issue got more Promoting over Terrorists attack over the world.


 

Also Read: What Technology Used by Terrorists in Paris Attack? – End-to-End Encryption

But despite all the attention focused on backdoors lately, no one noticed that someone had quietly install backdoors three years ago in a core piece of networking equipment used to protect corporate and government systems around the globe.

Few days before Juniper Networking tech Revealed the “unauthorized” code found in there Operating system running on some of it’s firewalls.

It’s not clear what caused the code to get there or how long it has been there, but the release notes posted by Juniper suggest the earliest buggy versions of the software date back to at least 2012 and possibly earlier.
 Juniper

What They Say’s?

“Juniper discovered unauthorized code in ScreenOS that could allow a knowledgeable attacker to gain administrative access to NetScreen devices and to decrypt VPN connections,” Worrall said.

 

How Backdoor Appear?

This is because of system software vulnerabilities allowing anyone to decrypt VPN traffic and leave no trace of their actions, and allow anyone to complete compromise a device via SSH or telnet vulnerability.

Government official’s can surveillance over anyone through administrator privileges decrypt and spy on thought-to-be-secure traffic, and even remove every trace of there surveillance activity. Company claims they have not heard of any exploits and patched there versions of Screens OS that are available now it’s download page.
Sounds awful, although Juniper claims the company has not heard of any exploitation in the wild so far and released patched versions of Screen OS that are available now on its download page.

Also Read: Why France wanted to BAN Public WiFi And Tor Network?

“If the VPN backdoor doesn’t require you to use the other remote-access [password] backdoor first,” then it would be possible to decrypt historical traffic that had been captured, he says. “But I can imagine designing a backdoor in which I have to log into the box using the remote-access backdoor in order to enable the backdoor that lets me decrypt intercepted traffic.”