←back to thread

253 points pabs3 | 1 comments | | HN request time: 0s | source
Show context
greatgib ◴[] No.44601921[source]
It's totally crazy that we have to go through Microsoft to sign things to be able to have our OS run on third parties computers, and that Microsoft manage to win about this so easily as it was never seriously challenged.
replies(7): >>44601962 #>>44602085 #>>44602088 #>>44602288 #>>44602373 #>>44602674 #>>44615523 #
sugarpimpdorsey ◴[] No.44602288[source]
It makes more sense if you view it for what it is: Honest Satya's Certificate Authority.

Microsoft showed they can semi-competently run a PKI. The end.

Now had the Linux folks stepped up to the plate early on, instead of childishly acting like Secure Boot was the computing antichrist, the story might be different. But they didn't. We only have shim because some people at Red Hat had the common sense to play ball.

replies(7): >>44602337 #>>44602402 #>>44602511 #>>44602526 #>>44602770 #>>44603173 #>>44604349 #
ACCount36 ◴[] No.44602526[source]
Secure Boot is the computing antichrist, and Linux folk were 100% right to rally against it. As well as a whole bunch of other "Trusted Computing" garbage.
replies(4): >>44602678 #>>44604560 #>>44617843 #>>44656080 #
froh ◴[] No.44602678[source]
mind to elaborate?

I'd love to know if my machine has been compromised with early boot stage "meta-hypervisor" or not.

the promise of secure boot and trusted computing is backdoor-free boot.

what is in your eyes evil and garbage about that?

replies(3): >>44602710 #>>44602712 #>>44602956 #
ACCount36 ◴[] No.44602710[source]
Who controls the fucking certs?

"My computer was compromised with an early boot stage hypervisor backdoor" happens basically never. It's an attack vector that exists almost entirely in the minds of infosec fucktards.

"My brand new device ships with vendor-selected boot certificates that can't be changed, can't be overridden, and control what software I can install onto my own device" happens with every other smartphone, gaming console, car, and even some PCs.

"Trusted Computing" is, and always was, about making sure that the user doesn't actually own his device. This is the real, tangible attack vector - and the target of this attack is user freedom and choice.

replies(4): >>44602865 #>>44603673 #>>44605565 #>>44610047 #
1. gsich ◴[] No.44605565{5}[source]
I do.