Most active commenters

    ←back to thread

    658 points transpute | 14 comments | | HN request time: 0.819s | source | bottom
    Show context
    codedokode ◴[] No.35844123[source]
    Isn't it good? Does leaked key mean that now owners of hardware will be able to read and modify the firmware, including IME, and check it for backdoors?

    Such keys should be in the hands of users, not Intel.

    replies(5): >>35844144 #>>35844419 #>>35844928 #>>35845513 #>>35845801 #
    QuiDortDine ◴[] No.35844144[source]
    If there was something to leak, it was always going to. Just a matter of when. Pretending otherwise is just security theater.
    replies(4): >>35844147 #>>35844361 #>>35844510 #>>35844608 #
    1. guerrilla ◴[] No.35844147[source]
    Yeah, don't depend on a permanent global conspiracy for your security. Someone always defects and accidents often happen long before that.
    replies(4): >>35844184 #>>35844346 #>>35844567 #>>35846541 #
    2. henriquez ◴[] No.35844184[source]
    It is not a conspiracy. Just like the iOS App Store it is for your own protection. There is no legitimate reason to run your own software on general purpose computing hardware.
    replies(4): >>35844239 #>>35846466 #>>35847367 #>>35847385 #
    3. ChrisClark ◴[] No.35844239[source]
    /s I hope. ;)
    replies(1): >>35844530 #
    4. brookst ◴[] No.35844530{3}[source]
    Doesn't really matter /a or not, it's a ridiculously reductive and extremist position either way.

    Security is about tradeoffs, most notably security vs convenience, but also many others.

    Anyone who suggests that their personal preferences in tradeoffs are not just universally correct but also the only reasonable position to hold is just silly.

    replies(1): >>35846570 #
    5. hammock ◴[] No.35844567[source]
    That’s the same argument that people use to support the second amendment (the people’s right to bear arms)
    replies(2): >>35844624 #>>35845896 #
    6. Y_Y ◴[] No.35844624[source]
    Hey, the second amendment says the right to bear arms shall not be infringed, it doesn't say it exists!
    replies(1): >>35845976 #
    7. ◴[] No.35845896[source]
    8. aksss ◴[] No.35845976{3}[source]
    "keep and bear" :^)
    replies(1): >>35851552 #
    9. chaxor ◴[] No.35846466[source]
    I love this comment, thank for such a good laugh.

    I really hope no one would ever think this non sarcastically.

    10. sobkas ◴[] No.35846541[source]
    > Yeah, don't depend on a permanent global conspiracy for your security. Someone always defects and accidents often happen long before that.

    But then we still also have things like Crypto AG.

    11. userbinator ◴[] No.35846570{4}[source]
    It's extremist but unfortunately also an opinion that seems to be nonsarcastically becoming more popular.
    12. vivegi ◴[] No.35847367[source]
    Yeah, right. Wait until the day when iOS App Store infra keys leak.

    Oh no! That will never happen. Because it runs on Apple M1 kryptonite chip that even Superman can't touch. /s

    13. Dalewyn ◴[] No.35847385[source]
    This rings more true than many would want to accept: Most people view and use computers as household appliances; they just use whatever is installed on it and if it breaks they go out and buy a new one.

    For most people there are, in fact, no legitimate reasons to run "their own" software on "general purpose" (read: household appliance) computing hardware. Almost nobody runs custom software on their washing machine or toaster.

    14. Y_Y ◴[] No.35851552{4}[source]
    What do you mean? It also says that states should have militias or something, but I didn't feel that was relevant.