←back to thread

253 points pabs3 | 2 comments | | HN request time: 0.005s | source
Show context
greatgib ◴[] No.44601921[source]
It's totally crazy that we have to go through Microsoft to sign things to be able to have our OS run on third parties computers, and that Microsoft manage to win about this so easily as it was never seriously challenged.
replies(7): >>44601962 #>>44602085 #>>44602088 #>>44602288 #>>44602373 #>>44602674 #>>44615523 #
sugarpimpdorsey ◴[] No.44602288[source]
It makes more sense if you view it for what it is: Honest Satya's Certificate Authority.

Microsoft showed they can semi-competently run a PKI. The end.

Now had the Linux folks stepped up to the plate early on, instead of childishly acting like Secure Boot was the computing antichrist, the story might be different. But they didn't. We only have shim because some people at Red Hat had the common sense to play ball.

replies(7): >>44602337 #>>44602402 #>>44602511 #>>44602526 #>>44602770 #>>44603173 #>>44604349 #
ACCount36 ◴[] No.44602526[source]
Secure Boot is the computing antichrist, and Linux folk were 100% right to rally against it. As well as a whole bunch of other "Trusted Computing" garbage.
replies(4): >>44602678 #>>44604560 #>>44617843 #>>44656080 #
froh ◴[] No.44602678[source]
mind to elaborate?

I'd love to know if my machine has been compromised with early boot stage "meta-hypervisor" or not.

the promise of secure boot and trusted computing is backdoor-free boot.

what is in your eyes evil and garbage about that?

replies(3): >>44602710 #>>44602712 #>>44602956 #
ACCount36 ◴[] No.44602710[source]
Who controls the fucking certs?

"My computer was compromised with an early boot stage hypervisor backdoor" happens basically never. It's an attack vector that exists almost entirely in the minds of infosec fucktards.

"My brand new device ships with vendor-selected boot certificates that can't be changed, can't be overridden, and control what software I can install onto my own device" happens with every other smartphone, gaming console, car, and even some PCs.

"Trusted Computing" is, and always was, about making sure that the user doesn't actually own his device. This is the real, tangible attack vector - and the target of this attack is user freedom and choice.

replies(4): >>44602865 #>>44603673 #>>44605565 #>>44610047 #
flexagoon ◴[] No.44602865[source]
> Who controls the fucking certs?

Cert authorities, just like in case of SSL. Is SSL also an evil technology designed to take away freedom from the internet?

> vendor-selected boot certificates that can't be changed

That's a lie. Certain drivers are signed with a specific key, and they can only be used when this key is installed, which makes sense. The same thing happens with SSL - if you remove pre-installed CA certs from your device, HTTPS sites will stop working. However, nothing is stopping you from adding your own keys to the system and signing your own software with it.

> happens with every other smartphone, gaming console, car, and even some PCs

How often are you trying to install custom drivers on a smartphone, console or car? Why would you have secure boot issues on those?

> the target of this attack is user freedom and choice.

Which is exactly why users have the freedom and choice to just disable Secure Boot?

replies(7): >>44602927 #>>44602985 #>>44603035 #>>44603119 #>>44603244 #>>44603360 #>>44674181 #
A4ET8a8uTh0_v2 ◴[] No.44603244[source]
<< Which is exactly why users have the freedom and choice to just disable Secure Boot?

I might be misremembering it, but initial plans for Secure Boot were less open. It was only the stink raised that resulted in it being an option.

<< How often are you trying to install custom drivers on a smartphone, console or car? Why would you have secure boot issues on those?

Does it matter? Is it mine? If yes, then it should my concern. But that is the entire problem with trusted computing and recent trends in general. Corps become operators, users are downgraded to consumers.

replies(2): >>44603520 #>>44619602 #
1. hdgvhicv ◴[] No.44619602[source]
“ . But not only were they illegal, like debuggers—you could not install one if you had one, without knowing your computer's root password. And neither the FBI nor Microsoft Support would tell you that.”

That’s what trusted boot is, as predicted in 1997. It will come eventually.

replies(1): >>44621174 #
2. cesarb ◴[] No.44621174[source]
For those who don't know the source of that quote: https://www.gnu.org/philosophy/right-to-read.en.html which was first published in 1997.