but I am a paranoid person and I do not like the idea of backdoors in my OS regardless of who is doing it.
I feel your pain.
But alas I have to agree with ShelLuser in that you simply can't avoid the possibility of backdoors. Even if you could go over all the OS code, that doesn't guarantee you are free from "backdoors". Your machine probably has some firmware (BIOS etc..) that you cannot see the code for. You could of course compile some of the free/open source loaders (like coreboot), but that would of course mean trusting your compiler and firmware as explained by Murph. This leads to a case of it being turtles all the way down since you cant really compile clean firmware (or an OS for that matter) without relying on some other possibly suspect firmware.
Simple answer: by making sure said computer isn't connected to the Internet. In FreeBSD terms: by running this command: # service netif down
. Or, if you'd like to remain connected to your local network: # route del default
.
If you can't trust your software, why not at least stop it from talking to anyone? A mighty good idea. But I'm skeptical that you can really do that since you can't trust your hardware (and my transitive property, your software)
Just because you turned your network interface off from within the OS, are you sure its really off? The network interface controller (NIC) is after all a piece of hardware that's often built right in to the motherboard. As Murph mentioned, it has its own firmware. Maybe when you turn it off, it just stops talking to the OS and keeps broadcasting. I have checked the 2.4 and 5 GHz bands and determined the NICs on my boxes do in fact stop broadcasting on standard WiFi bands when "off", but I lack the time and equipment to verify that its not gossiping about me on other bands. And yes it could possibly broadcast on other bands. Although not an advertised capability, have you actually taken an electron microscope to the NIC's integrated circuits and verified that it can only operate on those two bands? It wouldn't be that hard for No Such Agency to pay a chip manufacturer to add an "extra feature" to their chips, and its very hard to verify the integrity of hardware in the age of ICs.
Of course you could do as I did with my "crypto box". I actually physically took the NIC out (older boxes often have the NIC attached to the bus rather than the mobo and thus it can be removed easily) along with anything else that could possibly broadcast a signal. Or wait. Did I? I did mention I can't actually verified the integrity of the rest of the hardware. Maybe my 1 gig ram chip has a small antennae and micro controller in it that can broadcast the contents of my ram at will. Or maybe my hard disk. Or maybe even my CPU. Even if I did have thousands of years and an electron microscope to verify that all the ICs are doing as they're supposed to, and found that all the hardware was in fact trustworthy, hardware is after all, circuitry. Any wire with varying current going through it will produce an electromagnetic signal... Your CPU produces a weakly detectable signal at the band being equal to the clock rate. I suspect that it would be possible to tell precisely what op code was executed by the amplitude of the signal each cycle since each op code has a different set of transistors being flipped to the "on" state. And there's no shortage of devices Big Brother could use to listen to this signal. Your naive girlfriend's iPhone... those danged Google cars... Your WPA "secured" wifi router... The possibilities are endless...
How's your paranoia now?
What would probably work is faraday caging whatever area you use the computer in. This is somewhat common practice in high security government buildings to stop their air-gapped networks from being eaves-dropped on. Of course most people, including me, are unable/unwilling to turn a room of their residence into a copper clad dungeon... You also would need to do something about the "oversized rats" that might rudely infest your faraday cage room while you step out, without so much the courtesy of leaving you a search warrant.
You could *just* get/build yourself a PDP-8. Big brother would have a very difficult time backdooring a system made from discrete transistors without you noticing it. Alas 12 bit 1960s DEC architecture is not supported by FreeBSD...
Or you could just accept we live in a surveillance state and dream of retiring early in Fiji, Vanuatu, or anywhere else that has nice, off-the-grid tropical islands.