zlacker

[parent] [thread] 18 comments
1. marcod+(OP)[view] [source] 2022-01-09 03:31:00
Will this allow my computer, in the future, to be as locked as current smartphones? Will this allow software to refuse to run or services to refuse to work depending on third party software I have installed?
replies(2): >>mjg59+R >>mindsl+ke
2. mjg59+R[view] [source] 2022-01-09 03:38:06
>>marcod+(OP)
Everything needed to lock down your computer as much as a phone already exists, there's no need for a TPM or Pluton to do so.
replies(3): >>userbi+k2 >>joseph+s9 >>no_tim+nH
◧◩
3. userbi+k2[view] [source] [discussion] 2022-01-09 03:51:09
>>mjg59+R
There's a huge difference between "exists" and "is now commonly available and made easier to use". The frog-boiling is slow, but an increasingly large number of us are becoming aware of this new rise of corporate authoritarianism, and we know how it will end if we do not fight it as hard as we can.
replies(1): >>mjg59+H2
◧◩◪
4. mjg59+H2[view] [source] [discussion] 2022-01-09 03:54:28
>>userbi+k2
All Microsoft need to do to block other operating systems from PCs is change their policy around secure boot. All they need to do to prevent unsigned apps from running is change the default behaviour of Windows. The code exists. It's deployed. It's commonly available.
replies(3): >>userbi+i3 >>transp+P3 >>virapt+S4
◧◩◪◨
5. userbi+i3[view] [source] [discussion] 2022-01-09 03:59:58
>>mjg59+H2
They need to boil the frog slowly enough that most people won't realise until it's too late.
replies(1): >>Karuna+J4
◧◩◪◨
6. transp+P3[view] [source] [discussion] 2022-01-09 04:03:46
>>mjg59+H2
Pluton will likely close OEM/firmware security holes that could be used to escape such policy.
replies(1): >>mjg59+m6
◧◩◪◨⬒
7. Karuna+J4[view] [source] [discussion] 2022-01-09 04:11:40
>>userbi+i3
I don't think that analogy works here, since the things we're worried about are binary states. Either you can run arbitrary software, or you can not, etc.
replies(1): >>dane-p+L5
◧◩◪◨
8. virapt+S4[view] [source] [discussion] 2022-01-09 04:12:34
>>mjg59+H2
Yup, it's that close. I'm honestly happy there's an outrage ahead of releases of chips like that. Some systems did get secureboot locked down. Maybe we get the policy we got exactly because people are still outraged.

I'll take that any day over ms+Intel releasing a t2-equivalent + SB combo as required in all new certified laptops and people realising too late.

◧◩◪◨⬒⬓
9. dane-p+L5[view] [source] [discussion] 2022-01-09 04:21:27
>>Karuna+J4
Perhaps a better analogy then is securing the noose around the neck of the prisoner, but not yet releasing the trapdoor.
replies(1): >>userbi+Iq
◧◩◪◨⬒
10. mjg59+m6[view] [source] [discussion] 2022-01-09 04:28:08
>>transp+P3
Via what mechanisms? Nothing we currently know about Pluton would enable it to do anything like that, as far as I can tell.
replies(1): >>transp+99
◧◩◪◨⬒⬓
11. transp+99[view] [source] [discussion] 2022-01-09 04:53:36
>>mjg59+m6
not much detail, but slide 12 claims: https://www.platformsecuritysummit.com/2019/speaker/seay/PSE...

> Pluton validates and boots Security Monitor

> Security Monitor validates and boots the Linux Kernel

> Application Signatures are verified by SM and Pluton before Linux Kernel loads an application

replies(1): >>mjg59+la
◧◩
12. joseph+s9[view] [source] [discussion] 2022-01-09 04:56:50
>>mjg59+R
We want there to be less ways of doing that. The fact that one way already exists doesn't mean that we should be okay with more. The desired end goal is that eventually there's zero ways to do this, and we'll never get there if we keep moving in the wrong direction and justify it by not already being there.
◧◩◪◨⬒⬓⬔
13. mjg59+la[view] [source] [discussion] 2022-01-09 05:04:38
>>transp+99
This design still relies on prior stages of the boot process handing stuff over to Pluton - if there are vulnerabilities in the OEM firmware, they're still going to be exploitable in this model.
14. mindsl+ke[view] [source] 2022-01-09 05:46:31
>>marcod+(OP)
"Secure boot" and "remote attestation" are complementary features.

Specifically secure boot is what makes it so that "your" computer is unwilling to run software that has not been approved by the company that made it. This has existed for quite some time, and is responsible for the locked down mobile ecosystem as well as the inability to remove the Intel ME and AMD PSP embedded malware from recent PCs.

Remote attestation has not been widely implemented yet, but will make it so that remote services refuse to work unless you are running only software that the service approves of. I'm not sure how much Pluton moves the needle forward, but any amount is not good. If remote attestation comes into full effect, many websites will only be usable on newer computers and websites will be able to forcibly disable software the website finds objectionable, like say Adblock.

replies(1): >>no_tim+1I
◧◩◪◨⬒⬓⬔
15. userbi+Iq[view] [source] [discussion] 2022-01-09 08:13:27
>>dane-p+L5
...and the people who work on "progressing" this technology are helping to make the nooses better and also putting them on their own necks. (I've used that analogy before. I think it's a great one.)
◧◩
16. no_tim+nH[view] [source] [discussion] 2022-01-09 11:38:26
>>mjg59+R
...no? How would MS force me to install an AGESA update that supposedly restricts me in booting unsigned code? That's where the newly announced remote attestation comes in.

On the other hand, on PCs with Pluton chips they can change their minds any second.

replies(1): >>mjg59+vJ
◧◩
17. no_tim+1I[view] [source] [discussion] 2022-01-09 11:45:34
>>mindsl+ke
>I'm not sure how much Pluton moves the needle forward

A lot. They only need to wait for Pluton enabled PCs to reach critical mass. Compared to TPM's, Pluton is inside the chip thus not vulnerable to bus tampering and is not a standard but a "product", meaning Microsoft will have the ability to make changes without intervention from other companies.

◧◩◪
18. mjg59+vJ[view] [source] [discussion] 2022-01-09 12:02:04
>>no_tim+nH
The described functionality of Pluton doesn't allow it to prevent you from booting unsigned code. Your system firmware would need to ask Pluton for permission, and if it doesn't do so then no number of Pluton firmware updates is going to make it able to prevent that.
replies(1): >>no_tim+XK
◧◩◪◨
19. no_tim+XK[view] [source] [discussion] 2022-01-09 12:19:49
>>mjg59+vJ
On a second though, you are right. I mentally confused "not being able to boot unsigned code" and them being able to make booting unsigned code as useless as possible through attestation (possibly no internet, no DRM'd software, legally acquired or not)
[go to top]