Most active commenters
  • npteljes(6)
  • feanaro(5)
  • Arnt(4)
  • userbinator(3)

←back to thread

The Dangers of Microsoft Pluton

(gabrielsieben.tech)
733 points gjsman-1000 | 45 comments | | HN request time: 0.002s | source | bottom
Show context
userbinator ◴[] No.32234457[source]
What is to prevent school WiFi from one day requiring a Pluton assertion that your Windows PC hasn’t been tampered with before you can join the network?

Remote attestation is the true enemy of your freedom. The power of the authoritarian corporatocracy to force you to use only the (entire) systems they control. It's worth reading https://www.gnu.org/philosophy/right-to-read.en.html again just to see how prescient Stallman was.

replies(12): >>32234704 #>>32235241 #>>32236203 #>>32236379 #>>32236408 #>>32237069 #>>32237245 #>>32238451 #>>32239672 #>>32239680 #>>32239999 #>>32240046 #
1. aplanas ◴[] No.32235241[source]
Windows security models and policies are the enemy, not remote attestation (RA).

RA is a technology that has its fair use, and can be desired for other systems, like in Linux. With a pure RA system your services can decide to trust or not those devices on your network that can be compromised, and report to other devices that there is something suspicious.

As anything, this can be used properly to increase the security of your edge architecture, or wrongly to limit the users actions.

Let me put another example. With RA I should be able to authorize validated systems in my R&D VPN. If you are using your own laptop with the company certificate, and the verifier tag the systems as "unknown" or "unhealthy", it will not allow the access to the internal network, but sure you can still use your laptop for anything else. This, IMHO, is a fair use of this technology.

replies(2): >>32235470 #>>32235515 #
2. POPOSYS ◴[] No.32235470[source]
Is it possible to realize this with Linux systems / networks today? Do you have any good project / description / URL? Thanks!
replies(2): >>32235522 #>>32235567 #
3. fulafel ◴[] No.32235515[source]
Yes, lots of Linux devices apply it like that today: You can't use your banking app or consume DRM crippled media on your Android phone if you have root or run a open source Android distribution.
replies(1): >>32235557 #
4. ajvs ◴[] No.32235522[source]
GrapheneOS remote attestation arguably fits this criteria by being built on Android.
5. Aeolun ◴[] No.32235557[source]
> if you have root

Because god forbid you have control of your own PC?

replies(6): >>32235581 #>>32235770 #>>32235990 #>>32236047 #>>32236569 #>>32237462 #
6. aplanas ◴[] No.32235567[source]
It is still under development, but try Keylime[1]. They have also a nice agent written in Rust[2] with low footprint.

I write some notes[3] about how to use it in openSUSE MicroOS / Tumbleweed, but can be extrapolated to many other distributions too.

[1] https://github.com/keylime/keylime [2] https://github.com/keylime/rust-keylime [3] https://en.opensuse.org/Portal:MicroOS/RemoteAttestation

7. Ycombigatorz ◴[] No.32235581{3}[source]
Because if you have control, so many numerous other parties.
replies(2): >>32235691 #>>32235709 #
8. feanaro ◴[] No.32235691{4}[source]
This doesn't follow at all. Those other parties cannot authenticate as me.
9. palata ◴[] No.32235709{4}[source]
Those are independent. Having root access does not mean that other parties do, but more importantly, NOT having root does not mean AT ALL that other parties don't.
10. npteljes ◴[] No.32235770{3}[source]
Yep! Basically, it's safer if you don't own your PC. Think about users with a million toolbars and Bonzi Buddy installed.

Of course, the system for it is rudimentary, and puts a disproportionate amount of control in the hands of providers. And that works very well for them too.

replies(3): >>32235924 #>>32237198 #>>32238033 #
11. Arnt ◴[] No.32235990{3}[source]
Uhm, these things don't really take away your control, rather, they shift it from you to you.

The software you boot sets up some state and then toggles a bit, and after that something can't be changed. The state is secure against much modification after that time, but not before that time.

The "you" that boots the device are in control, and the "you" that uses the device after that have exactly what "you" set up at boot time, neither more nor less. If both "you" are the same person, then there's no loss of control.

But of course they're often not really the same person. If you want to boot a Microsoft-signed image, the party that boots is more or less Microsoft, not you personally. But in that case, you also want to use that Microsoft-signed OS, right? So the shift towards boot-time control is then a shift from mostly-Microsoft use-time control to mostly-Microsoft boot-time control. Mostly Microsoft here, mostly Microsoft there, even if the two mostlies aren't quite the same percentage it's difficult to regard this as a significant loss of control.

replies(1): >>32236222 #
12. kahnclusions ◴[] No.32236047{3}[source]
I think this is more for Android phones, and preventing a malicious app on your phone from using the root access to hijack data from your banking app.
replies(2): >>32237150 #>>32237449 #
13. TheOtherHobbes ◴[] No.32236192{5}[source]
In a sane society these features would allow secure voting.

In this one... that's not what they'll be used for.

This is the end game for the corporate internet. Not only can all your activity be logged, but if any of it is unwelcome - on any scale, from family to school to work to country to world - you can be locked out.

replies(1): >>32236240 #
14. raxxorraxor ◴[] No.32236222{4}[source]
This is false and just redefining control.
replies(1): >>32236437 #
15. 29athrowaway ◴[] No.32236240{6}[source]
An operating system that prevents other operating systems from being installed is the equivalent of a citizen that becomes a dictator.
16. throwaway1348b3 ◴[] No.32236410{5}[source]
Oh, modern democracies solved this nasty problem of voters possibly making the wrong choice by simply providing only the right choices to chose from: you get two slightly different brands of shit whose policies mostly coincide, enjoy your right to vote.
17. Arnt ◴[] No.32236437{5}[source]
How so? Redefines from what to what? Please elaborate.

Perhaps you mean that if you, as owner and legitimate user of a device, are able to perform a particular change only during a brief window of time rather than at any time of your choosing, then that limits your control over the device? If so, then my answer is yes, certainly it does. But it also limits the access of anyone who impersonates you (such as the evil exploity javascript I make your browser execute).

replies(1): >>32237167 #
18. newsclues ◴[] No.32236569{3}[source]
For me that’s a problem for the average user? That’s everyone else’s problem that idiots don’t care to control their technology and need big tech to do so with an iron fist
replies(1): >>32237006 #
19. npteljes ◴[] No.32236929{5}[source]
I feel like it's flawed. Voters and politicians abuse it left and right - pun intended. I don't think we ever came up with anything more humane though, and I don't wish to change it for anything other - to be honest, for the simple reason of not wanting the responsibility that goes along with it.

Choosing a party is not like choosing an OS for your PC, though. Choosing the OS would be like choosing the political system - and recognizing the incredible privilege I have by being born into a democracy, I very much wouldn't like other people to change it.

Going further into democracy, while you might put an X on a paper sometimes, still forbids a very high number of actions. I'd liken it to having the power of choosing between Apple's App Store and Google's Play Store for your phone. Which, getting back to the point, is safer for the users than installing any third party software. Like how in a well functioning democracy, I'm forbidden to do a great many things, but also I can feel safe in the thought that others have the same restrictions too.

replies(1): >>32237106 #
20. acdha ◴[] No.32237006{4}[source]
Calling the problem is “idiots” is a cognitive trap which prevents you from meaningfully dealing with it. Everyone is at risk from zero-days, almost anyone can be phished (yes, this includes you), many people have no way or time to investigate whether some well-known vendor is misrepresenting their product, and even security experts have to trust other people on a daily basis because they don’t have time to reverse-engineer every software update. Most people who get snide about this are a single malicious package in their favorite programming language away from a big mess!

The best progress we’ve seen in decades came from most people using locked-down phone operating systems, followed by stricter desktop OSes. If you don’t like that trajectory, you should be focused on how to get the benefits with other trade offs. One of the first steps is respecting people enough to understand their needs rather than calling them idiots.

21. feanaro ◴[] No.32237106{6}[source]
So, putting it all together, someone should choose and restrict which OS can be installed on your PC, so that you can feel safe in the thought that everyone has the same restriction?

At least that's how I managed to understand your comment to the best of my abilities, so hopefully I'm missing something. Though if there is such a something, the point did not get across successfully.

replies(1): >>32237389 #
22. ajsnigrutin ◴[] No.32237150{4}[source]
Well that's the problem.... the next step would be requiring users to use MS Edge, because a malicious version of firefox could capture/modify banking/transaction data. Want to pay bills? Give money to microsoft first.
replies(1): >>32248119 #
23. feanaro ◴[] No.32237167{6}[source]
You're wrong because the bootloader is more often locked than not, and there are various other nefarious controls in place that prevent you from doing it without voiding your warranty, such as one-time fuses.

In theory, yes, you could implement it like you said, but that's not what happens in practice nor the direction we've been tending towards in recent times.

replies(1): >>32237411 #
24. adev_ ◴[] No.32237198{4}[source]
> Yep! Basically, it's safer if you don't own your PC. Think about users with a million toolbars and Bonzi Buddy installed.

And it is a pretty terrible solution to the problem.

- It is also keeping the good guys outside too: Anyone that want to analyse and understand the security of the system for good reasons cannot. Excepted if explicitly allowed by the corporation X and that is a terrible security property.

- No root access also means very little control or ability to scan the system itself if your are not the X corporation controlling it. That means no possibility to mandate reviewer corporation Y to check that corporation X is doing the right thing. TPMs currently make that even worst by design, they are undocumented and complex, therefore rely on blind trust that company X do the rthe ight thing. And since the Intel management engine fiasco, we do know they are not doing the right thing.

- Bonzi Buddy and toolbar type of problem can be easily avoided by separating properly the normal user account from any admin account(the unix way). It should be painful to be admin but not impossible, just to make sure your grandma do not install a rootkit by mistake when she want her 20% coupon.

In summary: That is mainly bullshit from company X to keep full control on the entire user device, and not for their own good.

replies(1): >>32237867 #
25. npteljes ◴[] No.32237389{7}[source]
I think if I pick two groups: all iPhone users, and all PC users, PC users en bloc are in greater general digital danger than iPhone users. By digital danger, I'm thinking of malware, ransomware, phishing and successful hacking. And I think this is because of how tightly Apple controls their devices. And so, I'd consider an iPhone a safe choice - for example a safe recommendation for someone who doesn't want to spend time managing their device.

This makes sense to entities providing a service, and also for many who doesn't mind not having control over their something, which is, I think, very similar to how we don't really have control over a great many of things. This is the point I wanted to get across to the original commenter, who protested "god forbid you have control of your own PC?".

replies(2): >>32237773 #>>32237872 #
26. Arnt ◴[] No.32237411{7}[source]
Bootloader locking is orthogonal to whether there's a second CPU like that Pluton in the system.
replies(1): >>32237830 #
27. fulafel ◴[] No.32237449{4}[source]
If this was the reason they'd be blocking access from phones that are not up to date on security updates and are being actively exploited by malware to get root.

But it's the other way around, if you improve your old device by installing a up to date Android on your vendor-abandoned previously vulnerable device, you go from working banking to banned from banking.

28. api ◴[] No.32237462{3}[source]
This is the root of the pro market / mainstream market split.

For the pro market people want control. Pros also generally know a bit more about how to use that control and tend to be less likely to end up getting pwned immediately.

For regular users people just want shit that works. Not having control is a feature, because if you have control then the malware you are tricked into installing from "ɡeτflrêfox.com" also has control.

You can see it in the Apple ecosystem with iOS vs. macOS. Macs and iPads are now almost the same hardware. (The M chips are just A chips on 'roids.) But Macs can run other OSes and you can "sudo root." That's because Macs are for pros.

replies(1): >>32238821 #
29. mavhc ◴[] No.32237773{8}[source]
God forbid most people I know have control of their own PC, they have no clue, and nor should they need one.

iPhone users are safer from malware, PC users are safer from governments and Apple controlling what they can do on their computer.

Never-ending balance between safety and freedom.

The computer that requires a physical switch to disable secure boot is a good compromise (see many Chromebooks)

30. feanaro ◴[] No.32237830{8}[source]
To quote you:

> The "you" that boots the device are in control, and the "you" that uses the device after that have exactly what "you" set up at boot time, neither more nor less. If both "you" are the same person, then there's no loss of control.

How is it orthogonal? Okay, we're not strictly speaking of only bootloader locking, but of boot-time-control locking.

replies(1): >>32287906 #
31. npteljes ◴[] No.32237867{5}[source]
I agree. In a proposal like this, security is basically a byproduct, and sometimes not even that[0]. This is also a domain where the governmental and corporate powers have a similar goal, which is wresting away the control from the public / individual. They basically work in synergy, only to a point of course, but still.

Regarding Bonzi Buddy, I disagree. I think user data is as important, if not more important, than root access - which is why I'm dumbfounded when ancient server security features, like Linux's sudo system, are applied to the consumer device like a PC or a smartphone. These contexts are much better server by a sandboxing, permission-based whatever that seems to pick up steam, like the current permission systems on smartphones. Grandma's logins and bank data will be stolen from her own user account just the same as an admin account. Related XKCD[1]

[0] https://en.wikipedia.org/wiki/Security_theater

[0] https://xkcd.com/1200/

replies(1): >>32239554 #
32. feanaro ◴[] No.32237872{8}[source]
> [...] which is, I think, very similar to how we don't really have control over a great many of things.

This is a very handwavey sentence and is doing far too much work in your reasoning. Yes, you don't have control "over a great many things", because the point is so vague so as to be meaningless. But it doesn't at all follow from that vague sentence that we should allow total corporate/government control over our personal digital devices.

In this case, the proposed cure is far worse than the disease.

replies(1): >>32238266 #
33. userbinator ◴[] No.32238033{4}[source]
Think about users with a million toolbars and Bonzi Buddy installed.

I say let them be. As long as they also have the freedom to remove or not install such software, it's a good thing. Instead we have locked-down devices with the functional equivalent of such unwanted software, protected so that you cannot remove it without somehow getting root.

"Those who give up freedom for security deserve neither."

replies(1): >>32238267 #
34. npteljes ◴[] No.32238266{9}[source]
I agree. It's basically appointing a dictator and hope that they'll stay benevolent.

With my reasoning I wanted to capture what people might think, while accepting something that they have no control of. I have a hard time with this, because I got a PC in my formative years and I loved to tinker with it, and hated, and still do, everything that stood in the way of that. But the general population doesn't share this experience. And if I look at my own life, I only have this experience with computers (and smartphones), all the other things are, even if not centrally managed, out of my control. At the first wrong noise I have to call an expert who hopefully fixes it and is hopefully benevolent to me, because I have no clue what happens to the device I own. Or even my own body, now that I think about it. And so, the PC and the phone is just in a long list of things that people depend on, but not control.

The addendum being here, and what most people miss who feel the way I described above, is that our ever-connected devices make a "paper trail" unprecendented in history. And it can be centrally managed, activated, replayed, assembled, or even more tracking could be remotely controlled to an extent[0] - and to an even larger extent with a specialized application[1]. This is where the otherwise similar level of "not being controlled" can lead to a much worse situation than ever before. And I wish I could point this out empathetically to people without sounding like a lunatic.

[0] https://money.cnn.com/2014/06/06/technology/security/nsa-tur...

[1] https://en.wikipedia.org/wiki/Pegasus_(spyware)

35. lotsofpulp ◴[] No.32238267{5}[source]
My parents grew up in a non English speaking developing country, and they cannot be reasonably expected to learn the nuances of malware laden links to figure out which English text link is good or bad.

Do they deserve to not be able to shop online without fear of having their payment information stolen? Or mistyping a URL in their non native language and ending up at a scam website that installs malware? Or simply having a device that comes to a crawl such that they cannot reliably video call their grandkids?

replies(2): >>32238391 #>>32239292 #
36. npteljes ◴[] No.32238391{6}[source]
I don't mind the lock, but why don't we have the key? There's no reason to centally hold these hostage.
37. katbyte ◴[] No.32238821{4}[source]
You can also disable all the system integrity protection stuff on macOS pretty easily if you do want to mess around where apple rather people not.
38. agileAlligator ◴[] No.32239292{6}[source]
The problem you are describing will be irrelevant in a generation or two, as kids grow up on the internet.
replies(1): >>32239646 #
39. iggldiggl ◴[] No.32239554{6}[source]
> like the current permission systems on smartphones

Ugh, except that one goes overboard in the completely opposite direction, and often doesn't let me properly share data between apps even when I want to.

40. corrral ◴[] No.32239646{7}[source]
I can assure you that the upcoming generations aren't much better at any of this, on average.

And no, it's not smartphones' faults. Most people just don't "get" desktop OS paradigms, or how web pages work, or any of that, and they don't really care to.

replies(2): >>32246795 #>>32251662 #
41. userbinator ◴[] No.32246795{8}[source]
Most people just don't "get" desktop OS paradigms, or how web pages work, or any of that, and they don't really care to.

That's because they "won't miss freedom they never had".

42. kahnclusions ◴[] No.32248119{5}[source]
Are you saying the bank doesn’t have the right to define what kinds of software are permitted to access its systems?

We’re not just talking about the freedom to run software on your own device here, we’re talking about interacting with outside systems. There is an important distinction in context.

replies(1): >>32248808 #
43. ajsnigrutin ◴[] No.32248808{6}[source]
It's a browser.

As long as it adheres to basic web standards, I believe no, the bank should have no say in what browser you use to access their webpage.

44. agileAlligator ◴[] No.32251662{8}[source]
Nah dude. Most young people nowadays have an inbuilt sense of which links are sus; it's not exactly rocket science. If it looks sus, it is.
45. Arnt ◴[] No.32287906{9}[source]
That CPU is set up by the kernel at boot time, given the code to run, then some hardware bits are toggled such that the main CPU can't write later, it can only access the separate CPU via a defined API.

The kernel could do the same with an in-kernel process. It wouldn't have quite the same depth of defense against userspace sandbox escapes, but could be done. That's roughly how /dev/random was implemented for many years.

Look at the APIs provided — it's nothing new. It's nothing OSes haven't provided before, it's just further removed from a Chrome/FF/Safari sandbox escape, because overcoming the write-once hardware toggles is harder than getting kernel read/write primitives for a sandbox privilege escalation.