←back to thread

The Dangers of Microsoft Pluton

(gabrielsieben.tech)
733 points gjsman-1000 | 1 comments | | HN request time: 0.216s | source
Show context
Gh0stRAT ◴[] No.32235028[source]
I'm completely missing how his example of a Word document that can only be opened by approved users on approved hardware within the corporation is supposed to be a bad thing.

Honestly, that sounds pretty fantastic. I've been using 3rd party tools/extensions to do this sort of thing in corporate and government environments for years, but having the attestation go all the way down to the hardware level is a big value-add, especially with so much ransomware/spyware/extortion/espionage going on these days.

Can someone please explain to me how the author might see this level of security as a bad thing?

replies(18): >>32235120 #>>32235149 #>>32235164 #>>32235474 #>>32235546 #>>32235795 #>>32235875 #>>32236359 #>>32236639 #>>32236668 #>>32236673 #>>32236797 #>>32236864 #>>32237450 #>>32237580 #>>32238544 #>>32238583 #>>32240740 #
squiffsquiff ◴[] No.32235164[source]
Sure it's fantastic in a corporate environment. Not so fantastic for personal devices. Basically this: https://youtu.be/XgFbqSYdNK4
replies(1): >>32235580 #
nine_k ◴[] No.32235580[source]
Well, don't put that on a personal device.

It's like your company giving you serious protecting gear to wear while doing your work on a nuclear reactor is a good thing. But having to wear such gear at home is not a popular choice, and should not be required.

replies(1): >>32235778 #
palata ◴[] No.32235778[source]
How do you choose what you put in your CPU? What when Windows forces you to have that kind of hardware?

You can choose not to wear that gear, but choosing to not use Windows is much more complicated, at least for most people.

replies(1): >>32236066 #
josephg ◴[] No.32236066[source]
I imagine if the proponents of these systems had their way, they'd add remote attestation to websites too. Imagine your bank's website only loading on a "secure" windows environment, non-rooted android phone or an iphone.

Once these chips are in everyone's devices, it would be quite easy to add this stuff technically. And in doing so, break the web on non-approved hardware or software (like linux).

Edit: Actually on the subject of worst case scenarios: If the trusted computing attestation process was extended through the web browser, it would be possible to build a website which is impossible to scrape or interact with in any unapproved way, from any unapproved device. Eat your heart out Aaron Schwartz.

replies(1): >>32236166 #
nobody9999 ◴[] No.32236166[source]
> imagine if the proponents of these systems had their way, they'd add remote attestation to websites too. Imagine your bank's website only loading on a "secure" windows environment, non-rooted android phone or an iphone.

Actually, IIUC this is already the case on Android[0].

Some (many? most?) banks/banking apps are rejecting (and/or complaining about) access from rooted phones right now.

I can't confirm this personally, as I'd rather have my tonsils extracted through my ears than use a surveillance device^W^W smart phone to do anything financially related.

Perhaps someone who uses banking apps on their surveillance device could chime in on that?

[0] https://www.howtogeek.com/241012/safetynet-explained-why-and...

replies(2): >>32236537 #>>32237180 #
lostinthought ◴[] No.32236537[source]
Yes, this is already the case on Android. Two years ago I canceled smart-id contract (https://www.smart-id.com/) and stopped using any "smart" devices. Because one day the smart-id app ceased to work on my rooted smartphone.

Soon my old 3G dumbphone will be useless as the mobile operator ends the service. People are pushed to newer phones^W surveillance devices and I have to hunt for real 2G phone soon.

replies(2): >>32236733 #>>32236789 #
1. Avamander ◴[] No.32236733[source]
Your 3G dumbphone is not as dumb as you think. Considering the threat models from that era, it's most likely more manageable remotely and less compartmentalised.

Btw, you could acquire a Mobile-ID SIM that will work on a rooted phone (but also with feature phones, if you wish).