Researchers get a glimpse into North Korea’s homemade operating system

three ways kim jong un couldve threatened south korea tech savvy way 7
A group of security researchers have taken an in-depth look at how North Korea’s state-built operating system RedStar OS works and tracks the citizens that use it.

Florian Grunow and Niklaus Schiess from German security company ERNW presented their findings at this week’s Chaos Communication Congress in Hamburg after the duo managed to get their hands on the code for the operating system.

RedStar OS operates much like the totalitarian regime in North Korea. It’s primitive and completely controlled by its creators, though it’s based on Linux’s Fedora 11, an open source technology that is ironically all about free speech and access to information.

The OS that Grunow and Schiess have analyzed is a version from 2013. The researchers have not revealed how exactly they got access to the code, but mentioned they downloaded the code from a site outside North Korea.

The RedStar OS was devised by Kim Jong-il, the father of current leader Kim Jong-un, over a decade ago as a means for North Korea to run a basic internet-like network while also controlling it entirely. The network is actually an intranet running off servers in North Korea, which allows access to a limited number of government-approved sites.

Most striking, the operating system tracks any changes that the user might make to the OS. This is most likely a means to track any possible back doors implanted for foreign agencies to spy on the regime, according to Grunow and Schiess. “They may want to be independent of other operating systems because they fear back doors,” Grunow told The Guardian.

Any time a user inserts a USB stick into their computer, RedStar OS will watermark the files in order to track them, and keep tabs on who has access to them. This is done covertly. “It’s done stealthily and touches files you haven’t even opened,” said Grunow. This is particularly interesting as one of the main avenues for sneaking western or South Korean content like films and TV shows into the hermit kingdom is via smuggled USB drives.

The OS is largely tamper proof, too. Any time a user attempts to make any changes to the main settings, like disabling the antivirus or firewalls, the OS will automatically reboot itself.

However, the researchers found no evidence that the RedStar OS has ever been used in cyber-attacks on foreign targets, despite North Korea being accused several times for attacks on western nations and companies. This doesn’t mean the country wasn’t involved — but it does seem unlikely the attacking computers ran RedStar OS.

Computing

How 5G networks will make low-latency game streaming a reality

Faster speeds and more bandwidth are some of the many promises that 5G can deliver, but for gamers, the most important thing is low latency. To achieve low latency, carriers like AT&T and Verizon are exploring hybrid models for game…
Smart Home

The best smart locks to increase your home security in 2019

A good smart lock should offer a combination of security and convenience. Fortunately, these devices keep your home protected, your family safe, and your belongings secure from possible intruders.
Smart Home

Looking to safeguard your home? These are the best DIY home security systems

Looking for the best DIY Home security systems? These security kits will help you feel safer in no time. Check out our top pick and full list to see which kit will work best for your home.
Computing

Problems with installing or updating Windows 10? Here's how to fix them

Upgrading to the newest version of Windows 10 is usually a breeze, but sometimes you run into issues. Never fear though. Our guide will help you isolate the issue at hand and solve it in a timely manner.
Mobile

Rooting your Android device is risky. Do it right with our handy guide

Wondering whether to root your Android smartphone or stick with stock Android? Perhaps you’ve decided to do it and you just need to know how? Here, you'll find an explanation and a quick guide on how to root Android devices.
Deals

Time to do taxes? Save up to 50 percent on H&R Block tax software this weekend

Tax season is stressful, and with new tax laws in effect this year, it's not a bad idea to get some help. H&R Block has you covered: For two days only, you can save 50 percent on its great software so you can file your taxes online and save…
Emerging Tech

Awesome Tech You Can’t Buy Yet: Robotic companions and computer-aided karaoke

Check out our roundup of the best new crowdfunding projects and product announcements that hit the web this week. You may not be able to buy this stuff yet, but it's fun to gawk!
Computing

Stop dragging windows on your Mac. Here's how to use Split View to multitask

The latest iterations of MacOS offer a native Split View feature that can automatically divide screen space between two applications. Here's how to use Split View on a Mac, adjust it as needed, and how it can help out.
Computing

Breeze through security with these checkpoint-friendly laptop bags

Getting through airport security is a drag, but your laptop bag shouldn’t be. Thankfully, these checkpoint-friendly laptop bags will get you and your gear to your destination with ease.
Computing

The new iMacs push on iMac Pro territory, but how much power do you really need?

With Apple refreshing the higher-end iMacs with newer processors and graphics cards, it moves closer to the iMac Pro. In this guide, we consider the performance, features, and help make sense of the differences between the two.
Computing

Protect your expensive new laptop with the best Macbook cases

If you recently picked up a new MacBook, you’ll want something to protect its gorgeous exterior. Here, we've gathered the best MacBook cases and covers, whether you're looking for style or protection.
Computing

Worried about your online privacy? We tested the best VPN services

Browsing the web can be less secure than most users would hope. If that concerns you, a virtual private network — aka a VPN — is a decent solution. Check out a few of the best VPN services on the market.
Computing

Which mid-range Nvidia Turing graphics card should you buy?

Nvidia's top mid-range cards are all solid performers, but which offers the best bang for buck? To find out where you should spend your money on your next big upgrade, we pitted the GTX 1660 vs. GTX 1660 Ti vs. RTX 2060.
Computing

Convert your PDFs into convenient Word documents with Adobe or a free option

PDF files are great, but few document types are as malleable as those specific to Microsoft Word. Here's how to convert a PDF file into a Word document, whether you prefer to use Adobe's software suite or a freemium alternative.