The State Department said Monday that it remains confident in the Federal Bureau of Investigation’s conclusion that North Korea was responsible for the cyber attack on Sony — despite a growing number of voices saying that might not be the case.
There has been some skepticism about North Korea’s involvement since the first reports earlier in December and that has increased in the last week.
- Linguistic analysis of the English suggests a Russian speaker, not a Korean
- The IP addresses used by the hackers were on compromised machines that could have been used by anyone.
- One of the latest reports suggests that a former Sony employee might have been involved, with a small group of others.
The operating system is being offered as a 2.6 gigabyte ISO file, which means it will look like a CD or DVD install disc to most modern operating systems. The operating system can be directly installed from the ISO file and requires about 10 gigabytes of disc space.
I installed mine inside a Virtual Machine — a piece of software that allows it to run inside a window as an application on my laptop — but it’s possible to also run it as the main operating system on a computer.
The installation process is relatively easy. I have most of the main screens below and those that aren’t shown can be clicked through.
The latest version of North Korea’s home-grown desktop operating system, Red Star Linux 3.0, was uploaded to BitTorrent on Monday.
A link to a download file was included in a message on Pastebin that was uploaded by someone who goes by the nicknames “slipstream” and “raylee,” that’s the same person who released the server version of Red Star Linux 3.0 earlier this year.
That previous release was a version for computer servers while this latest release is intended for use on conventional PCs.
I’ve posted an install guide and will have more on the applications in the coming days.
North Korea’s Internet connection with the world suffered outages on December 27 and December 28.
The latest instability on the connection began around 0400 UTC (1 p.m. local time in Pyongyang) on Sunday and continued for a couple of hours, according to monitoring by Dyn Research. The U.S.-based organization recorded several instances in which connections to the four sub-networks that make up the North Korean Internet were completely unavailable.
North Korea has accused the U.S. of disrupting its Internet service and has renewed a call to participate in a joint investigation into claims that it hacked Sony Pictures Entertainment.
[UPDATE: English recording of Voice of Korea added below.]
The country’s websites were offline for more than nine hours on December 22 after an apparent denial of service attack.
In a statement carried by the state-run Korean Central News Agency on Saturday, the country’s National Defence Commission laid blame for the Internet problem at the feet of the U.S., saying the country “started disturbing the internet operation of major media of the DPRK.” More >
What a difference a week makes. The Christmas Day release of “The Interview” is back on and Sony has already begun offering the movie online.
The movie, a comedy in which two TV reporters embark on a secret mission to kill Kim Jong Un, appeared on YouTube and Google Play on December 23 at 1pm ET. It costs $5.99 to rent for 48 hours and $15 to own.
North Korea’s powerful National Defense Commission responded with its first statement on the Sony hack and accusations by the U.S. that it was responsible. The statement was read out on Voice of Korea, the country’s international shortwave radio service, and makes interesting listening. More >
North Korea’s Internet connection with the world has returned to service after a nine and a half hour outage that followed hours of patchy performance.
The cause of the outage is unknown, although several experts think it was probably due to an external distributed denial of service (DDoS) attack. This involves flooding web servers and other Internet hardware with so much traffic that they become overloaded and cannot respond to legitimate traffic. It’s not an actual hack of the system and so the situation is normalized soon after the DDOS flow of traffic stops. More >