zlacker

[parent] [thread] 9 comments
1. mjg59+(OP)[view] [source] 2022-01-09 03:54:28
All Microsoft need to do to block other operating systems from PCs is change their policy around secure boot. All they need to do to prevent unsigned apps from running is change the default behaviour of Windows. The code exists. It's deployed. It's commonly available.
replies(3): >>userbi+B >>transp+81 >>virapt+b2
2. userbi+B[view] [source] 2022-01-09 03:59:58
>>mjg59+(OP)
They need to boil the frog slowly enough that most people won't realise until it's too late.
replies(1): >>Karuna+22
3. transp+81[view] [source] 2022-01-09 04:03:46
>>mjg59+(OP)
Pluton will likely close OEM/firmware security holes that could be used to escape such policy.
replies(1): >>mjg59+F3
◧◩
4. Karuna+22[view] [source] [discussion] 2022-01-09 04:11:40
>>userbi+B
I don't think that analogy works here, since the things we're worried about are binary states. Either you can run arbitrary software, or you can not, etc.
replies(1): >>dane-p+43
5. virapt+b2[view] [source] 2022-01-09 04:12:34
>>mjg59+(OP)
Yup, it's that close. I'm honestly happy there's an outrage ahead of releases of chips like that. Some systems did get secureboot locked down. Maybe we get the policy we got exactly because people are still outraged.

I'll take that any day over ms+Intel releasing a t2-equivalent + SB combo as required in all new certified laptops and people realising too late.

◧◩◪
6. dane-p+43[view] [source] [discussion] 2022-01-09 04:21:27
>>Karuna+22
Perhaps a better analogy then is securing the noose around the neck of the prisoner, but not yet releasing the trapdoor.
replies(1): >>userbi+1o
◧◩
7. mjg59+F3[view] [source] [discussion] 2022-01-09 04:28:08
>>transp+81
Via what mechanisms? Nothing we currently know about Pluton would enable it to do anything like that, as far as I can tell.
replies(1): >>transp+s6
◧◩◪
8. transp+s6[view] [source] [discussion] 2022-01-09 04:53:36
>>mjg59+F3
not much detail, but slide 12 claims: https://www.platformsecuritysummit.com/2019/speaker/seay/PSE...

> Pluton validates and boots Security Monitor

> Security Monitor validates and boots the Linux Kernel

> Application Signatures are verified by SM and Pluton before Linux Kernel loads an application

replies(1): >>mjg59+E7
◧◩◪◨
9. mjg59+E7[view] [source] [discussion] 2022-01-09 05:04:38
>>transp+s6
This design still relies on prior stages of the boot process handing stuff over to Pluton - if there are vulnerabilities in the OEM firmware, they're still going to be exploitable in this model.
◧◩◪◨
10. userbi+1o[view] [source] [discussion] 2022-01-09 08:13:27
>>dane-p+43
...and the people who work on "progressing" this technology are helping to make the nooses better and also putting them on their own necks. (I've used that analogy before. I think it's a great one.)
[go to top]