zlacker

[parent] [thread] 79 comments
1. messe+(OP)[view] [source] 2022-01-09 03:37:29
The fearmongering about Pluton feels very similar to the criticism that was levied against UEFI Secure Boot when it was being debuted. In the end, x86 systems didn't become any more locked down.

I predict that this will blow over, and won't be a big deal in a few years time once FOSS drivers for what is effectively just a new breed of TPM are released.

If in five years, it turns out I was wrong, I'll eat my hat. Although defining "my hat" by then might be difficult, as it'll probably be subscription based.

replies(16): >>jevote+71 >>guerri+91 >>heavys+j1 >>userbi+k1 >>gruez+J1 >>shmerl+h3 >>zucker+k4 >>datafl+H4 >>Veserv+R6 >>nescio+U6 >>mindsl+b8 >>joseph+k8 >>Ashame+1H >>no_tim+ZH >>tentac+yK >>BlueTe+Wq1
2. jevote+71[view] [source] 2022-01-09 03:46:42
>>messe+(OP)
> In the end, x86 systems didn't become any more locked down.

And non-x86 systems? Wasn't there a line of MS Surface devices where secure boot could not be disabled, and users were stuck with Windows? It feels careless to only care about x86, especially as other platforms proliferate.

In any case, lockdown is not the only threat that Trusted Computing presents. Remote attestation itself is dangerous. If we remove our x86 blinkers and look at the mobile world, we see it's already happening, with countless apps, including ones important to modern day life such as banking, refusing to run on rooted phones.

You may say, "Oh, I will use my x86 desktop system at home for Free Computing, and allow phones, consoles, tablets, surface devices, etc etc, to become locked down." Like the old free speech zones, this is a toothless freedom, tamed and neutered. The user-empowering Free Software you will write will have no users - they will be on locked devices.

replies(3): >>messe+Q1 >>gruez+22 >>my123+B2
3. guerri+91[view] [source] 2022-01-09 03:46:57
>>messe+(OP)
> In the end, x86 systems didn't become any more locked down.

This is not the end. They'll keep pushing, as slow as they need to, with Windows 11 being the next step. They didn't suddenly lose the incentive, they just met resistance.

replies(1): >>A4ET8a+S51
4. heavys+j1[view] [source] 2022-01-09 03:48:09
>>messe+(OP)
Some x86 systems weren't completely locked down, but similar systems successfully lock down millions of phones, tablets and console devices (which are x86 systems these days).

The trend for security in desktop computing that's pushed by these large companies is to, over time, approach similar levels of lock down that mobile devices currently have. Both Windows and macOS are approaching the iOS security model that depends on manufacturers blessing what software can run on their products, and banning software they don't want users to run.

For example, with Defender on Windows and Gatekeeper on macOS, developers need to buy certificates from Microsoft and Apple's partners in order to distribute and run their software on users' desktop computers. If developers want their software to run on Windows or macOS, they need to remain in good standing with Microsoft or Apple. If Microsoft or Apple decides they don't like you or your app, all they need to do is to revoke your signing certificate, and Defender and Gatekeeper won't let your software run on Windows or macOS. That, or they can choose to no longer renew your certificates after they expire.

replies(2): >>gruez+M2 >>messe+W2
5. userbi+k1[view] [source] 2022-01-09 03:48:28
>>messe+(OP)
In the end, x86 systems didn't become any more locked down.

Oh hell yes they did. Look at Intel Boot Guard and all the stuff around that.

replies(1): >>gruez+l2
6. gruez+J1[view] [source] 2022-01-09 03:52:40
>>messe+(OP)
>to the criticism that was levied against UEFI Secure Boot when it was being debuted

...or the fearmongering from up last year regarding TPM and windows 11. People were going hysterical over the thought that TPM might be used for DRM, not realizing that they're already running hardware that does exactly that (intel SGX, amd PSP).

replies(3): >>hermit+i3 >>guerri+t3 >>BlueTe+np1
◧◩
7. messe+Q1[view] [source] [discussion] 2022-01-09 03:53:31
>>jevote+71
While that's true, with regard to some Surface devices, as I understand it, ARM systems have only become more open and interoperable over the past few years; although this holds true a lot more for the server side than desktop side.

The main issue these days is driver support. The PC platform was an anomaly in backwards compatibility, at least historically. I'm not arguing that it's going to be easy for FOSS. It's going to be an uphill battle, regardless of how locked down they are (and I'm just arguing that they won't be that locked down—see the recent M1 Macs for an example; Apple could easily have locked down those systems in exactly the same manner as iOS/iPadOS devices, but chose not to).

replies(2): >>my123+O2 >>lillec+x3
◧◩
8. gruez+22[view] [source] [discussion] 2022-01-09 03:55:08
>>jevote+71
Your ARM smartphone and/or IOT device don't support UEFI or secureboot, yet they were still locked down and you couldn't flash third party OSes. The problem is locked bootloaders, not UEFI or secureboot. Fearmongering over a largely non-problematic implementation (secureboot explicitly allows you to load your own keys) is exactly OP's point.
replies(1): >>jevote+v3
◧◩
9. gruez+l2[view] [source] [discussion] 2022-01-09 03:57:46
>>userbi+k1
>Look at Intel Boot Guard and all the stuff around that.

what am I looking for? It looks like you couldn't load third party/modified firmware with that enabled? I suppose it's strictly more locked down than being able to flash whatever firmware you want, but was there a sprawling scene of modified firmware around at that time? Or did everybody essentially run the stock firmware?

replies(1): >>userbi+t4
◧◩
10. my123+B2[view] [source] [discussion] 2022-01-09 04:00:07
>>jevote+71
> Wasn't there a line of MS Surface devices where secure boot could not be disabled, and users were stuck with Windows?

All Windows RT devices (32-bit Arm desktop Windows). Not only Secure Boot was locked down there, but apps had to be signed by Microsoft.

64-bit Windows on Arm adopts the security policy of x86_64 Windows, which means that you can turn off Secure Boot on production hardware. (and run your regular apps too)

◧◩
11. gruez+M2[view] [source] [discussion] 2022-01-09 04:01:38
>>heavys+j1
> Some x86 systems weren't completely locked down, but similar systems successfully lock down millions of phones, tablets and console devices.

so shouldn't we be protesting against the systems that are locked down, instead of protesting against largely non-problematic implementations? For instance, with secureboot you can load your own keys, and the TPM isn't some sort of coprocessor that has access to your entire system.

>If Microsoft or Apple decides they don't like you or your app, all they need to do is to revoke your signing certificate, and Defender and Gatekeeper won't let your software run on Windows or macOS.

I'm not sure about gatekeeper, but at least on windows smartscreen can be disabled. I understand how having a gatekeeper sucks, but I also understand the problem of malicious software, which gatekeeping partially mitigates. In the end the fact that you can disable makes it a non-issue for me.

replies(1): >>im3w1l+Ve
◧◩◪
12. my123+O2[view] [source] [discussion] 2022-01-09 04:01:48
>>messe+Q1
For arm: anything that runs Windows on Arm64 uses UEFI + ACPI, making stuff easier on that front.

Linux drivers for Qualcomm SoCs don't have extensive ACPI bindings at this point in time though, making the use of a separate devicetree necessary for full functionality. This will be mostly ironed out with time I suppose.

replies(1): >>floatb+7S
◧◩
13. messe+W2[view] [source] [discussion] 2022-01-09 04:02:21
>>heavys+j1
> Both Windows and macOS are approaching the iOS security model that depends on manufacturers blessing what software can run on their products, and banning software they don't want users to run.

That's been said for years, and hasn't held true. I can boot a Linux kernel on my M1 macbook. Apple could easily have locked it down in exactly the same manner as their iOS/iPadOS devices, yet chose not to. I can still install whatever I want. The default state of the system has a locked down root volume. And the default behaviour is not to install untrusted software, unless you jump through a couple of hoops. Those are good defaults. Those are damn good defaults for most people. If you're running untrusted code in your webbrowser all day long, you want your base system to be as unmalleable as possible, and as untrusting as possible to third party code. But I can still work around that with almost no hassle. Homebrew still installs software as easily as it used to nearly a decade ago; it just might need the occasional --no-quarantine flag for unsigned software.

Even recently they appeared to have actively assisted in the running on non-macOS operating systems on their hardware: removing the requirement for kernel images to be in mach-O format[1].

[1]: https://twitter.com/marcan42/status/1471799568807636994

replies(4): >>malwar+b5 >>heavys+T7 >>comex+bl >>fsflov+gH
14. shmerl+h3[view] [source] 2022-01-09 04:05:52
>>messe+(OP)
Knowing history of MS I wouldn't call it fear mongering but rather very reasonable concerns. They ended up not materializing as a problem, which is good. But they were very reasonable nevertheless.
◧◩
15. hermit+i3[view] [source] [discussion] 2022-01-09 04:05:52
>>gruez+J1
I was more concerned about the TPM requirement purely due to not having one in my desktop that's otherwise perfectly capable of running Win11 Pro (I know because I've been running Win11 for months on it via the Insiders Program). Yes, the desktop is 8 or 9 years old now, but it's still a 6 core I7 with 64GB Ram and a suitably fast SSD (not nvme, though). To me, it reeks of planned obsolescence in the name of pushing Windows Hello, that I don't need.

I did look into what an upgrade to add a TPM would cost. I was looking at over $400 for a like motherboard to support TPM (without an actual TPM chip), but I'd also lose SATA channels I currently use. At the point of having to replace a motherboard, it starts looking attractive to do a full rebuild, but that's difficult with supply shortages and inflated costs currently.

◧◩
16. guerri+t3[view] [source] [discussion] 2022-01-09 04:07:36
>>gruez+J1
Is your argument that things are bad, so who cares if they get worse?
replies(1): >>gruez+p6
◧◩◪
17. jevote+v3[view] [source] [discussion] 2022-01-09 04:07:44
>>gruez+22
This sounds very much like "there are many ways to lock out users, why are you complaining about this specific method, when other platforms used a different one?"
replies(2): >>shukan+E4 >>judge2+b6
◧◩◪
18. lillec+x3[view] [source] [discussion] 2022-01-09 04:07:50
>>messe+Q1
It's just really sad that Apple doesn't help us with drivers for their hardware, I highly doubt the majority would switch anyways, and assisting with info could be done with less effort if people are already doing reverse engineering work.
replies(2): >>messe+14 >>astran+bi1
◧◩◪◨
19. messe+14[view] [source] [discussion] 2022-01-09 04:11:46
>>lillec+x3
I suspect it's a mix of legal difficulties in releasing the documentation, and a lack of incentive to write it in the first place.

The ideal scenario would be Apple pushing their hardware in the server space; that might create an internal incentive for apple to get Linux running decently (or at the very least make Darwin a new competitor in the datacenter).

20. zucker+k4[view] [source] 2022-01-09 04:14:23
>>messe+(OP)
> The fearmongering about Pluton

Part of the reason for this "fearmongering" (if it's fair to call it that) is that Microsoft has released little information about Pluton, besides a press release. Plus, it's not like the fears are completely unfounded based on Microsoft's messaging; Microsoft's press release says Pluton is based off the Xbox[1] (and this paywalled article mentions the same thing[3]), and they've previous said the major goal of the Xbox security system is piracy prevention [2], i.e. DRM. However, I agree with the overall conclusion of the main article that it's probably not much worse that what already exists.

[1] https://blogs.windows.com/windowsexperience/2022/01/04/ces-2...

[2] https://www.platformsecuritysummit.com/2019/speaker/chen/

[3] https://ieeexplore.ieee.org/abstract/document/9354509

◧◩◪
21. userbi+t4[view] [source] [discussion] 2022-01-09 04:16:43
>>gruez+l2
BIOS mods are not exactly common, but there's plenty of people doing it. Projects like coreboot are another example, and of course all the tools around removing as much of the ME as possible. Obviously the "fringe" gets slowly trimmed, and we should be looking out for those like we do canaries in a coalmine.
replies(1): >>gruez+D6
◧◩◪◨
22. shukan+E4[view] [source] [discussion] 2022-01-09 04:17:53
>>jevote+v3
No it’s more like “why complain about a method that isn’t being used to lock down devices instead ones that are actually being used for that purpose”
23. datafl+H4[view] [source] 2022-01-09 04:18:10
>>messe+(OP)
> In the end, x86 systems didn't become any more locked down.

I realize it was only introduced as of ~2012 and it's been 10 years, but I'm not sure we can draw a conclusion on this one just yet. Windows 11 took a huge leap in that direction so for all I know it might take another decade; it certainly doesn't look like they've given up on the idea of locking down the desktop just yet.

replies(2): >>messe+e5 >>gruez+L5
◧◩◪
24. malwar+b5[view] [source] [discussion] 2022-01-09 04:23:05
>>messe+W2
> Apple could easily have locked it down in exactly the same manner as their iOS/iPadOS devices

Yes. That is in fact the problem. They shouldn't have the ability at all. Given the ability it will be done, it is only a question of when and why.

Corps have this ability already and are building in tech to make circumvention even more difficult. We are one update away as it is now.

replies(1): >>messe+p5
◧◩
25. messe+e5[view] [source] [discussion] 2022-01-09 04:23:44
>>datafl+H4
They attempted to lock down the boot process with 32-bit ARM, but backtracked with 64-bit ARM. If the intention was to keep eventually lock it down, why backtrack and open it back up? It's not as if Linux on ARM was a major selling point for their ARM devices.
replies(1): >>datafl+r5
◧◩◪◨
26. messe+p5[view] [source] [discussion] 2022-01-09 04:25:32
>>malwar+b5
How do you propose preventing that, outside of legal remedies? If they design the hardware it obviously can be done. Hell, with the right external chip you could do it with a MOS 6502.

And as for barring it legally, remember that there are valid uses for locked down systems. It can be a useful security barrier.

◧◩◪
27. datafl+r5[view] [source] [discussion] 2022-01-09 04:26:29
>>messe+e5
I actually don't have knowledge of that. Do you know what the reason for the backtracking was?
replies(2): >>messe+06 >>mjg59+76
◧◩
28. gruez+L5[view] [source] [discussion] 2022-01-09 04:28:39
>>datafl+H4
>it's been 10 years, but I'm not sure we can draw a conclusion on this one just yet.

seriously? 10 years is an eternity in tech, and if they really did lock down the desktop a few years from now with some new system (eg. pluton), I'm not really sure that you could say "I told you so" or "TPM caused the platform to be more locked down". It'd be like predicting some sort of smallpox attack by china in 2010, then claiming you got it right in 2020 because of corona. The only plausible scenario where you could plausibly blame TPM/UEFI is if OEMs suddenly decided to remove the ability to add user keys and/or disable secureboot.

replies(2): >>messe+J6 >>datafl+K6
◧◩◪◨
29. messe+06[view] [source] [discussion] 2022-01-09 04:31:40
>>datafl+r5
To be quite honest, I'd be interested myself to find out. I can't see the motivation for changing it, other than they found it not to be beneficial. It seems like opening it up again would just create more problems in the long run if they intended to close it down eventually.

I might look into it, as it sounds like an interesting rabbit hole.

◧◩◪◨
30. mjg59+76[view] [source] [discussion] 2022-01-09 04:33:02
>>datafl+r5
Microsoft's 32-bit ARM devices were being sold as appliances, their 64-bit ones are being sold as general purpose computers.
◧◩◪◨
31. judge2+b6[view] [source] [discussion] 2022-01-09 04:33:30
>>jevote+v3
We should be complaining when it happens, not that any of these methods exist - they're super useful to have in many applications, eg. access control door locks, keeping PKI HSMs locked down, etc.
◧◩◪
32. gruez+p6[view] [source] [discussion] 2022-01-09 04:35:28
>>guerri+t3
Well in this case it's not really getting worse. The hardware you bought is already backdoored/locked down. It's like closing the stable door after the horse ran away.
replies(1): >>guerri+87
◧◩◪◨
33. gruez+D6[view] [source] [discussion] 2022-01-09 04:36:49
>>userbi+t4
I'm not exactly sure how me_cleaner works, but AFAIK it still works even with intel bootguard? I believe the way it works is that intel ME are present in the bios as optional modules, and they can be removed without messing up the signature.
◧◩◪
34. messe+J6[view] [source] [discussion] 2022-01-09 04:37:38
>>gruez+L5
In fairness, I think they have a point. 10 years is usually an eternity in tech, but we're talking about a system that's still compatible with systems from the 80s; so I think that expecting things to occur on extended timelines isn't unreasonable.
replies(1): >>gruez+89
◧◩◪
35. datafl+K6[view] [source] [discussion] 2022-01-09 04:37:39
>>gruez+L5
> 10 years is an eternity in tech

Maybe if you're talking Java versions, but not in the desktop OS space. (Look at so many old machines running Windows 7 or earlier right now, and look at long old OSes are officially supported, and how long they're still used afterward.) And besides, even if it was, this wouldn't mean anything. Look at the whole Default Browser fiasco that happened in the last few months. Microsoft went back to engaging in practices they had already settled with the Justice Department two decades ago.

Also look at how they finally made Windows 11 64-bit-only. And even now it still runs 32-bit programs, just the OS is 64-bit. It took two decades after 64-bit CPUs came out to get to this point.

They take their time and meander, and it takes a while. Possibly due to corporate sluggishness, possibly due to wanting to boil the frog slowly, possibly due to wanting to test the waters for a while... who knows why. But speed isn't the main criterion.

replies(1): >>gruez+M9
36. Veserv+R6[view] [source] 2022-01-09 04:38:56
>>messe+(OP)
If they are not going to do it then they can just have their lawyers draft and issue a public, legally binding statement that they will not.

Since they are not going to do it anyways, they are no worse off, and the customers get a legally binding guarantee resolving their concerns, and it provides just cause to the good actors in Microsoft management to head off or remove any elements besmirching Microsoft’s reputation.

Sounds like all wins to me and it is what any B2B contract with Microsoft would do (well in the contract rather than publicly) if they wanted that guarantee so it is not even a particularly novel legal request.

37. nescio+U6[view] [source] 2022-01-09 04:39:03
>>messe+(OP)
Were I to grant what you say, it is /still/ a load of anti-social, dystopian shit flung against the wall for FOSS devs to scrap off (if ever they may), keeping them from doing something more advantageous.

You only condone the poisoning of the well because you take for granted the pro-socially minded developers willing to sacrifice their time and effort to draw clean water for you.

Think of where we'd be if we didn't need to run to stand still.

replies(1): >>messe+W7
◧◩◪◨
38. guerri+87[view] [source] [discussion] 2022-01-09 04:40:53
>>gruez+p6
So two (or twenty) vulnerabilities in your software isn't worse than one?
replies(1): >>gruez+pa
◧◩◪
39. heavys+T7[view] [source] [discussion] 2022-01-09 04:49:14
>>messe+W2
> > Both Windows and macOS are approaching the iOS security model that depends on manufacturers blessing what software can run on their products, and banning software they don't want users to run.

> That's been said for years, and hasn't held true.

It certainly has. Unsigned binaries were recently deprecated entirely on M1 Macs. Microsoft even released versions of the Surface that can only run Windows and only run apps blessed by Microsoft. With each iteration on these products, the screws are tightened a bit more.

Software freedom is not just about being able to run Linux. Most Mac users buy Macs because of macOS and its integrations, running Linux doesn't help them out. Software freedom on macOS definitely does, though. As it stands, that freedom has been chipped away at with new releases of Apple's software and hardware.

For example, I'm the author of several open source utilities for macOS. Users had no problem using the utilities a few years ago, but because they're unsigned or not Notarized, macOS tricks users into thinking that they're either broken or malicious. Even self-signing the apps has macOS treating them as if they're radioactive. Users don't understand the scary signing and certificate alerts, so they end up thinking they've downloaded malware. The solution to this is to pay Apple $100 every year, and then regularly have them scan and approve of the apps via Notarization. That's antithetical to software freedom. Regular users who want to use un-Notarized software are left frightened and without having their needs met. Software freedom is important for everyone, not just developers and power users.

replies(3): >>gruez+Ja >>mlyle+jl >>azalem+iy
◧◩
40. messe+W7[view] [source] [discussion] 2022-01-09 04:49:40
>>nescio+U6
> Were I to grant what you say, it is /still/ a load of anti-social, dystopian shit flung against the wall for FOSS devs to scrap off (if ever they may), keeping them from doing something more advantageous.

> You only condone the poisoning of the well because you take for granted the pro-socially minded developers willing to sacrifice their time and effort to draw clean water for you.

If you're referring to my comment about drivers, then I'd like to remind you that a large amount of work done on the Linux kernel is paid, and isn't performed by volunteers.

And as for those that are volunteers, I don't take them for granted. I regularly donate to various FOSS projects. Related to this context, I'm currently a patreon supporter of marcan42's port of Linux to the M1 Mac, and have donated several hundred euro to OpenBSD over the past two years (not including donations from my hosting provider openbsd.amsterdam, which I'll plug here).

replies(1): >>nescio+Se
41. mindsl+b8[view] [source] 2022-01-09 04:51:35
>>messe+(OP)
Characterizing informed discussion about the implications of technology as "fearmongering" or "hysteria" is essentially ignorant.

The specific functionality of remote attestation is so that a remote party can demand you prove what software you are running, and make it so that you cannot lie. Right now you're free to answer whatever you'd like, while running whatever actual software you choose, as long as you stick to the protocol. Protocols (especially well-defined open ones) are our traditional way of mediating between parties with mutually diverging interests. Remote attestation throws away such neutral mediation, making it so that the more powerful party can dictate what software the less powerful party is running.

One implication of a usable implementation of remote attestation is that a website could insist that you are running a certain OS, web browser, etc, and become unavailable to you otherwise. For example, banking websites have a clear path to doing this in the quest for their elusive "security". They already do similarly invasive things that alienate a small portion of users (eg complain about a device being "rooted", blocking VPN/datacenter IP ranges), and so it's a reasonable assumption that they'll adopt such technology for the same regressive goals.

And once it starts being a de facto requirement for users to have such functionality and it becomes easy for developers to use, it will trickle down to lower stakes websites - think anything that currently sees fit to harass you with a CAPTCHA. It's not simply Big Bad Microsoft that will push this onto us, but rather the entire market will gradually shift for "security" (ie corporate whims).

Will Free Software and the Open Internet still exist? Of course! Remote attestation does not prevent you from running whatever software you like on your local computer. But it will further bifurcate the Free user-representing world and proprietary WebTV land - imagine not being able to do online banking or shopping from your ergonomic desktop system, and having to do it from your phone that you also have to upgrade every two years. And the idea that some day ISPs will mandate this type of technology to connect to their network is far fetched, but still within the realm of possibility.

One caveat here is that if the remote attestation is only over the contents of the Pluton chip itself, then it cannot be used to dictate what software is running on the main system. I have no idea if this is the case here or not, but either way the integration of the chip onto the same die as the processor does not bode well for future development.

Furthermore, I do not believe the claim elsewhere in this thread that you could proxy such requests, as a secure remote attestation design involves the attestation result being used to generate a decryption key (eg a TLS session key) that does not leave the trusted software environment. So the system performing the attestation is unable to simply relay back what it has learned. There might be design shortcomings that or implementation bugs that allow for doing so, but the straightforward goal is to close those over time as for any vulnerability.

42. joseph+k8[view] [source] 2022-01-09 04:53:10
>>messe+(OP)
> x86 systems didn't become any more locked down.

But ARM systems sure did. Remember the whole "OEMs are required to make their ARM Windows devices only trust Microsoft's signing key, and not let the end-user turn off Secure Boot or trust any other keys" scandal?

replies(1): >>floatb+pS
◧◩◪◨
43. gruez+89[view] [source] [discussion] 2022-01-09 04:59:55
>>messe+J6
How long computers can last isn't really relevant here. What's relevant is how fast new systems get developed, and whether a given system can be blamed for some action a few decades down the road. For instance, let's look at HTTPS. It was implemented to secure web traffic, but also plausibly can be used to lock down who can publish websites (eg. by refusing to issue certificates). However, in its current form it's not really problematic because there are many easy workarounds (eg. using http, adding an exception, etc.). Suppose 5 years from now all the browser/OS vendors go rogue and lock everything down. All web traffic must be conducted via HTTPS with a valid certificate, and all of the workarounds are removed/patched. Can you point to the introduction of HTTPS and say "see I told you! 1994 was the beginning of the end for the open web. We really should have opposed it when we had the chance!"?
◧◩◪◨
44. gruez+M9[view] [source] [discussion] 2022-01-09 05:06:56
>>datafl+K6
>Maybe if you're talking Java versions, but not in the desktop OS space. (Look at so many old machines running Windows 7 or earlier right now, and look at long old OSes are officially supported, and how long they're still used afterward.)

see: https://news.ycombinator.com/item?id=29860320

>They take their time and meander, and it takes a while. Possibly due to corporate sluggishness, possibly due to wanting to boil the frog slowly, possibly due to wanting to test the waters for a while... who knows why. But speed isn't the main criterion.

But in this case it's not really boiling the frog because it's not really getting worse? All we know so far is that it's TPM but it's easier to update. I suppose this could be used to oppress users by patching jailbreaks faster, but the security benefits at least makes it plausible that they're not doing it as some sort of plan to oppress users.

◧◩◪◨⬒
45. gruez+pa[view] [source] [discussion] 2022-01-09 05:13:13
>>guerri+87
That's not a good comparison because there are multiple bad guys wanting to hack into your computer, and more vulnerabilities mean higher chance that at least one succeeds. For this, we can assume that OEMs/microsoft is on the same side, so the better analogy would be: having 20 NSA root CAs installed on my system isn't worse than only one, at least if my threat model is "NSA hacking my communications".
◧◩◪◨
46. gruez+Ja[view] [source] [discussion] 2022-01-09 05:18:39
>>heavys+T7
>That's antithetical to software freedom. Regular users who want to use un-Notarized software are left frightened and without having their needs met.

It's easy to argue "give me software freedom or give me death!" if you're a technically competent user that probably won't fall for a trojan, but what about everyone else? Don't you think there's a reasonable argument to locking down systems to improve security? To be clear, I'm not arguing for sacrificing software freedom wholesale for security, only in default configurations.

replies(1): >>wiz21c+Tl
◧◩◪
47. nescio+Se[view] [source] [discussion] 2022-01-09 05:59:48
>>messe+W7
You seem to have not understood what I've said. Whatever good will you may extend, the attitude betrays the complacency of an alms-giver. I merely wish to point out how FOSS can be manipulated by such an attitude to provide a fig leaf -- in "a few years time" -- for the rent-seeking behavior I'd hope you condemn.

Let me also apologize for my manner. I'm inept at expressing what I think is important without alienating those that might be most receptive to it. Truly, I wish I could have said what I needed more gracefully. I didn't mean to give offense.

◧◩◪
48. im3w1l+Ve[view] [source] [discussion] 2022-01-09 06:01:17
>>gruez+M2
It is not a non-issue. Because 95% of people will not disable it. This means that if Microsoft asks some company to make changes to their program, then they will have a lot of leverage behind that ask. Even if you personally disable the gatekeeping, you will be affected indirectly as the market for non-compliant programs will be unsustainable. Everything you run will be microsoft compliant, outside maybe one or two hyper-niche things.

This is what Android has taught us.

replies(1): >>Godel_+jn
◧◩◪
49. comex+bl[view] [source] [discussion] 2022-01-09 07:23:00
>>messe+W2
However, if you jump through those hoops, you lose certain functionality, namely Apple Pay and the ability to run iOS apps on Mac.
◧◩◪◨
50. mlyle+jl[view] [source] [discussion] 2022-01-09 07:23:52
>>heavys+T7
> Unsigned binaries were recently deprecated entirely on M1 Macs.

Except bins signed by self-signed certs are still treated basically the same as unsigned binaries were before.

replies(2): >>my123+Ju >>heavys+nf2
◧◩◪◨⬒
51. wiz21c+Tl[view] [source] [discussion] 2022-01-09 07:30:27
>>gruez+Ja
The argument doesn't hold. It uses the 99.9% of the users to crack down on the 0.1% (the devs) who have the ability to redefine what software is. Doing so, the big companies make sure they have the ability to rule their ecosystem. Using the argument of security, I'm sure they'll have the go from the governments.

So why would a company want total control on its ecosystem ? Because government don't want social unrest. So if you can ensure your platform is free of "terrorist", then you can discuss with government better. For example, if you're secure, you can position yourself as a reliable player on banking, e-health, etc. That is, you gain a very strong position to shape society in ways you're interested in. Don't forget that big companies have the power to do that and that those who command them are not required to be benevolent. They are private companies so there's no oversight on which interest they serve first.

It's not all doom and gloom though . As computer gets into our lives, more and more government and parliaments will become aware of the issue and there will be a place to fight for our rights. It's already the case.

The only thing that matter is : a computer is a general purpose machine and must stay a "general purpose" machine.

replies(3): >>JCWasm+Eo >>0dayz+yy >>gruez+Nc1
◧◩◪◨
52. Godel_+jn[view] [source] [discussion] 2022-01-09 07:45:22
>>im3w1l+Ve
Except there are a ton of people (as in millions of them) who have smartscreen disabled because they're using a non-microsoft antivirus program. So no, this is a non-issue.

Also, smartscreen is not a naive block of unsigned code. Code blocking is reputation based, and people disabling smartscreen and running a binary contributes to that reputation. Which means that people like gp are actively helping by continuing to use Windows and running safe-but-unsigned apps. So, to reiterate, not an issue.

◧◩◪◨⬒⬓
53. JCWasm+Eo[view] [source] [discussion] 2022-01-09 08:00:11
>>wiz21c+Tl
> The only thing that matter is : a computer is a general purpose machine and must stay a "general purpose" machine.

Fully agreed. This is the most important point. No company or vendor should prevent me from running the software I want, in the way I want, be it modified for my own purposes or not.

Sure, if you only look onto the security side it may be more secure if you can only run approved software, but it is in no circumstances okay to reduce the freedom of a user on his/her private machine. (In a business setting it makes sense to only allow software approved by the IT-Department)

◧◩◪◨⬒
54. my123+Ju[view] [source] [discussion] 2022-01-09 09:07:08
>>mlyle+jl
You don't even need a true signature. An ad-hoc one (which can be linker-generated) and has no cryptographic key attached is considered as valid.
replies(1): >>darkwa+gy
◧◩◪◨⬒⬓
55. darkwa+gy[view] [source] [discussion] 2022-01-09 09:47:38
>>my123+Ju
And in the next N releases of macOS those features will be quietly removed since 99% users are running properly notarized binaries anyway...
replies(2): >>myname+oR >>user-t+8G1
◧◩◪◨
56. azalem+iy[view] [source] [discussion] 2022-01-09 09:47:51
>>heavys+T7
Heck, the amount of work it takes just to install gdb and debug another process on Mac OS is insane. There's no clear instructions on apple's website: the best thing to do is follow a stack overflow post with something like 14 instructions on how to generate the right kind of self-signed cert, acknowledge all the warning messages, and then follow the various comments for os-version specific alterations. It took me ages.
◧◩◪◨⬒⬓
57. 0dayz+yy[view] [source] [discussion] 2022-01-09 09:51:15
>>wiz21c+Tl
This rhetoric about evil """the government""" spying on you because terrorists is at this point quite out of date or even stale.

I'm far more worried about companies locking things down due to legitimate concern (security) with malicious intent.

Than being arrested for being mistaken for osama bin laden because I decided to grow a beard.

58. Ashame+1H[view] [source] 2022-01-09 11:41:30
>>messe+(OP)
MS literally has to sign and approve the bootloaders from any distribution, or you basically risk your distribution not booting on a majority of x86 systems. And there is always the push by MS to make these bootloaders as restrictive as possible, to prevent the situation where you use one of them to boot some software that will break Windows' FDE. So as a result we end up with e.g. automatic lockdown mode in Linux when booted from a secure boot system.

How did x86 not become more locked down as a consequence of this?

You can disable all of it (on some devices only!) but the war is already lost: most people are not going to do it, so distros have to pass through these hoops.

◧◩◪
59. fsflov+gH[view] [source] [discussion] 2022-01-09 11:45:07
>>messe+W2
> > Both Windows and macOS are approaching the iOS security model that depends on manufacturers blessing what software can run on their products, and banning software they don't want users to run.

> That's been said for years, and hasn't held true.

https://news.ycombinator.com/item?id=25074959

60. no_tim+ZH[view] [source] 2022-01-09 11:53:54
>>messe+(OP)
>If in five years, it turns out I was wrong, I'll eat my hat. Although defining "my hat" by then might be difficult, as it'll probably be subscription based.

Wanna bet that by 2030 there will be atleast one major commercial bank that enforces attestation on it's E-Banking features even on desktops?

61. tentac+yK[view] [source] 2022-01-09 12:23:16
>>messe+(OP)
> once FOSS drivers for what is effectively just a new breed of TPM are released.

I genuinely wonder if Microsoft will put any people on this for Linux. They purport to 'love it', but aside from a few Embrace Extend and Extinguish[0] strategies like Edge, WSL, VS Code etc. I haven't seen anything that made me jump out of my chair in amazement.

Maybe they'll surprise me.

[0]: https://en.wikipedia.org/wiki/Embrace,_extend,_and_extinguis...

replies(1): >>transp+311
◧◩◪◨⬒⬓⬔
62. myname+oR[view] [source] [discussion] 2022-01-09 13:36:59
>>darkwa+gy
That’s certainly an option. But absolutely nothing points to it being the actual thing that will happen other than wild baseless speculation.
◧◩◪◨
63. floatb+7S[view] [source] [discussion] 2022-01-09 13:43:29
>>my123+O2
Didn't Linux developers say that Qualcomm's ACPI tables are a horrific Windows-specific mess that has close to zero standard PNP* things?
replies(1): >>my123+sy1
◧◩
64. floatb+pS[view] [source] [discussion] 2022-01-09 13:46:03
>>joseph+k8
These 32-bit SurfaceRT/etc. devices were a complete failure; this has nothing to do with current Surface Pro X etc. which do allow everyone to easily turn Secure Boot off.
◧◩
65. transp+311[view] [source] [discussion] 2022-01-09 14:48:28
>>tentac+yK
Pluton has been supported by Microsoft Linux for several years and their Azure Sphere support contract promises Liunx security updates for 10+ years, https://www.platformsecuritysummit.com/2019/speaker/seay/
◧◩
66. A4ET8a+S51[view] [source] [discussion] 2022-01-09 15:19:14
>>guerri+91
True, but some of the responsibility lies with the users. If they can't be bothered to care, then maybe some pain is warranted.

In my particular case, I stopped upgrading Windows around 7. It is only last year that I decided to upgrade and that was also the year I moved to linux as my main driver. I am not an average user, but I am not kernel contributor either. I am just a guy, who wants some stuff done on a PC I own.

And that might be part of the issue. People need to feel the pain from the devices they have been sold so that they can learn why freedom and ownership is important.

◧◩◪◨⬒⬓
67. gruez+Nc1[view] [source] [discussion] 2022-01-09 16:01:59
>>wiz21c+Tl
>The argument doesn't hold. It uses the 99.9% of the users to crack down on the 0.1% (the devs) who have the ability to redefine what software is.

I'm not sure what the "crack down" is when you can disable it fairly easily.

>So why would a company want total control on its ecosystem ? Because government don't want social unrest.

You'd think that if they want to suppress uprisings, the mechanism they use to do so will be slightly more robust than a setting in the developer options.

>The only thing that matter is : a computer is a general purpose machine and must stay a "general purpose" machine.

How is this related to what we're talking about? What gatekeeper/smartscreen is doing is effectively operating a whitelist system. The platform itself is still open, and you could still do whatever you want before. What's more is that you can disable the system, so I'm not seeing what the issue is.

◧◩◪◨
68. astran+bi1[view] [source] [discussion] 2022-01-09 16:30:05
>>lillec+x3
The supported method is virtualization.
◧◩
69. BlueTe+np1[view] [source] [discussion] 2022-01-09 17:10:08
>>gruez+J1
Well my PC does NOT have any of those (AMD Bulldozer), so you can understand how I would be annoyed that this decision makes it ever less likely for me to be able to upgrade to another x86 in the future. (Thankfully, we're not in the nineties/oughties any more with computers becoming effectively obsolete in a year...)
70. BlueTe+Wq1[view] [source] 2022-01-09 17:20:11
>>messe+(OP)
AFAIK I can easily disable Secure Boot in the UEFI.

Is there an easy way to disable TPM / Intel IME / Intel SGX / AMD PSP ?

(I'm only aware that Dell can disable Intel IME on request... but only if you're a company buying a large amount of PCs ?)

replies(1): >>heavys+7j2
◧◩◪◨⬒
71. my123+sy1[view] [source] [discussion] 2022-01-09 18:02:35
>>floatb+7S
> Windows-specific mess that has close to zero standard PNP* things

Those are hardware dependent platform devices. Qualcomm didn’t have another option. (Nor do other manufacturers really)

On x86, a virtual PCIe bus abstraction is heavily used, which is not the case for those SoCs.

(And well, if Linux wants to boycott full support of their SoCs, their choice. They just can’t blame Qualcomm anymore at that point.)

Another thing of note is the use of a PEP (power management plug-in) in the OS instead of having power management done in AML. The ACPI spec allows a manufacturer to do this. It isn’t used only by Qualcomm, but is totally unsupported on Linux today.

replies(1): >>floatb+9D1
◧◩◪◨⬒⬓
72. floatb+9D1[view] [source] [discussion] 2022-01-09 18:35:23
>>my123+sy1
Manufacturers have the option of producing standards-compliant goddamn hardware! Say for PCIe, even if it's a buggy and quirky implementation but it does support ECAM, you can still expose a PNP0A08 and deal with quirks in firmware (hello Socionext/Marvell/NXP).

> PEP (power management plug-in) in the OS […] ACPI spec allows a manufacturer to do this

Doing management in AML is almost the whole point of ACPI. Microsoft pushing this PEP thing into the ACPI spec is bad. This is the "letter" of ACPI now, unfortunately, but it's very much against the original "spirit" of ACPI :/

replies(1): >>my123+DJ1
◧◩◪◨⬒⬓⬔
73. user-t+8G1[view] [source] [discussion] 2022-01-09 18:54:38
>>darkwa+gy
Why would that happen in the next N releases, when it hasn't happened in the previous M releases? What's changed?
replies(1): >>mlyle+9L1
◧◩◪◨⬒⬓⬔
74. my123+DJ1[view] [source] [discussion] 2022-01-09 19:18:54
>>floatb+9D1
> Manufacturers have the option of producing standards-compliant goddamn hardware

For PCIe indeed, but that’s not when the issues are present the most. There’s no standard register interface for integrated GPUs, modems…

> but it's very much against the original "spirit" of ACPI

Yup, it’s what Device Tree does too however, shifting this to the OS.

Another downside is trying to have a good driver-less boot scenario when PEPs are used, for the system to be able to go far enough until drivers can be installed. (N/A to Linux which is hostile to not in-tree drivers, but very much a concern on Windows)

◧◩◪◨⬒⬓⬔⧯
75. mlyle+9L1[view] [source] [discussion] 2022-01-09 19:27:57
>>user-t+8G1
I think there's some perception by people like this that --- there's some massive goal towards restricting users, and each change in the security policy is an incremental step.

But it doesn't really make sense:

- All the technical work to restrict users could certainly be done in one release: it's not that hard.

- As to market acceptance, I don't think any of the changes re: binary signing are "getting users used to" being restricted.

So, requiring signed binaries doesn't appreciably make the technical or market challenges of restricting unapproved apps easier.

◧◩◪◨⬒
76. heavys+nf2[view] [source] [discussion] 2022-01-09 23:10:06
>>mlyle+jl
From my post:

> Even self-signing the apps has macOS treating them as if they're radioactive.

replies(1): >>mlyle+Jn2
◧◩
77. heavys+7j2[view] [source] [discussion] 2022-01-09 23:37:13
>>BlueTe+Wq1
At least with the hardware I'm familiar with, you can turn off the TPM via the BIOS. IME/SGX/PSP, not so much.
replies(1): >>joseph+Rj2
◧◩◪
78. joseph+Rj2[view] [source] [discussion] 2022-01-09 23:42:32
>>heavys+7j2
> you can turn off the TPM via the BIOS

In theory you can. In practice, programs will refuse to run if you do this: https://www.techspot.com/news/91138-valorant-anti-cheat-syst...

That goes for Secure Boot too, btw.

replies(1): >>BlueTe+qn2
◧◩◪◨
79. BlueTe+qn2[view] [source] [discussion] 2022-01-10 00:07:09
>>joseph+Rj2
Yeah, hence the normalization (or lack thereof) of those features being critically important to the discussion.
◧◩◪◨⬒⬓
80. mlyle+Jn2[view] [source] [discussion] 2022-01-10 00:09:17
>>heavys+nf2
It's reasonable to know the app isn't self-signed and having to do the right-click "Open" for the first launch.

I appreciate that I can both benefit from PKI attestation of apps (for a small degree of protection against malware), and I can override it and run unsigned stuff.

[go to top]