zlacker

The Dangers of Microsoft Pluton

submitted by gjsman+(OP) on 2022-07-26 03:46:19 | 733 points 496 comments
[view article] [source] [go to bottom]

NOTE: showing posts with links only show all posts
8. userbi+17[view] [source] 2022-07-26 05:05:33
>>gjsman+(OP)
What is to prevent school WiFi from one day requiring a Pluton assertion that your Windows PC hasn’t been tampered with before you can join the network?

Remote attestation is the true enemy of your freedom. The power of the authoritarian corporatocracy to force you to use only the (entire) systems they control. It's worth reading https://www.gnu.org/philosophy/right-to-read.en.html again just to see how prescient Stallman was.

◧◩◪
25. enriqu+gc[view] [source] [discussion] 2022-07-26 05:55:06
>>SQueee+0b
But it's still the case... Stallman is quoted every day around here: https://hn.algolia.com/?dateRange=all&query=Stallman&sort=by...
29. peter_+Pc[view] [source] 2022-07-26 06:00:27
>>gjsman+(OP)
Microsoft are trying to enforce a monopoly on hardware, where is the https://www.sec.gov/ on this?
◧◩◪
36. vladva+6g[view] [source] [discussion] 2022-07-26 06:25:40
>>gjsman+R6
> imagine if assertion becomes popular for things such as [...] digital movies

You don't need that. Streaming is already crippled on Linux. Hell, Netflix won't even stream full quality on Chrome!

> https://help.netflix.com/en/node/13444

    4K Ultra HD on a computer

    Netflix is available in Ultra HD on Windows and Mac computers with:

      Microsoft Edge for Windows

      Windows app for Windows 10 and Windows 11

      Safari for MacOS 11.0 or later
39. TeeMas+Ng[view] [source] 2022-07-26 06:30:35
>>gjsman+(OP)
Reminds of of Palladium:

https://www.zdnet.com/article/microsofts-palladium-what-the-... https://en.wikipedia.org/wiki/Next-Generation_Secure_Computi...

◧◩
46. squiff+qi[view] [source] [discussion] 2022-07-26 06:47:34
>>Gh0stR+eg
Sure it's fantastic in a corporate environment. Not so fantastic for personal devices. Basically this: https://youtu.be/XgFbqSYdNK4
◧◩◪
51. aaronb+xj[view] [source] [discussion] 2022-07-26 07:00:25
>>BiteCo+bi
Ron DeSantis doesn't need hardware-level DRM to ban math books.

https://www.baynews9.com/fl/tampa/news/2022/05/06/florida-ba...

If you're worried about book bannings in states like Florida, DeSantis is up for reelection in just over 3 months. Go volunteer or donate money to his opponent (probably Charlie Crist).

◧◩◪◨⬒
60. aaronb+Bk[view] [source] [discussion] 2022-07-26 07:10:13
>>BiteCo+Wj
And we don't need guns to do a genocide. We managed to kill most marican native with blades

To be pedantic, it was diseases and outright, explicit murder. (which is not an excuse. Biological warfare is a modern war crime, after all.)

https://en.wikipedia.org/wiki/Population_history_of_Indigeno...

banking on the wolf to behave in the hen [house] this time

Fair point, but the United States is rapidly moving towards authoritarian governance right now. There are steps that every U.S. citizen who reads my comment can take to help stop this decline immediately. I don't like the idea of this sort of TPM 3.0 module in my computer's hardware, but it's a 'day after tomorrow' problem for me, not a 'right now' problem.

◧◩◪◨⬒
61. aaronb+Ek[view] [source] [discussion] 2022-07-26 07:11:12
>>sascha+rk
Indeed, the XKCD $5 wrench attack vector. https://xkcd.com/538/
67. Random+km[view] [source] 2022-07-26 07:31:11
>>gjsman+(OP)
Obligatory link to the talk from MS where they covered the origins of Pluton on the Xbox: https://www.youtube.com/watch?v=U7VwtOrwceo

The video does a good job of the original threat model for this technology and how it works on Xbox.

◧◩◪◨
83. aplana+Vo[view] [source] [discussion] 2022-07-26 07:59:48
>>POPOSY+mn
It is still under development, but try Keylime[1]. They have also a nice agent written in Rust[2] with low footprint.

I write some notes[3] about how to use it in openSUSE MicroOS / Tumbleweed, but can be extrapolated to many other distributions too.

[1] https://github.com/keylime/keylime [2] https://github.com/keylime/rust-keylime [3] https://en.opensuse.org/Portal:MicroOS/RemoteAttestation

◧◩◪◨⬒⬓⬔
109. walter+Qr[view] [source] [discussion] 2022-07-26 08:29:49
>>p_l+ir
> owner-control of hw should be enshrined in law

Have you seen OCP's Caliptra RoT, which requires OSS firmware, enforced by dual-signing of firmware by both OEM and owner? Currently for hyper-scalers, but this approach can be adopted by other enterprise customers, https://www.youtube.com/watch?v=p9PlCm4tLb8. Attestation will be done to Caliptra, which can then release SoC boot ROM from reset.

◧◩◪◨⬒
123. Someon+6t[view] [source] [discussion] 2022-07-26 08:42:13
>>ajvs+Do
> Mein Kampf is a banned book

Not everywhere in the world (https://en.wikipedia.org/wiki/Mein_Kampf#Current_availabilit...)

In the USA, freedom of speech is in very high regard, and that’s in conflict with the idea of banning any publication.

◧◩◪◨
124. m4rtin+7t[view] [source] [discussion] 2022-07-26 08:42:19
>>eertve+qj
You mean like this ?

https://www.theregister.com/2022/07/11/lenovo_secured_core/

◧◩
127. nptelj+Tt[view] [source] [discussion] 2022-07-26 08:52:31
>>Gh0stR+eg
The way I see it: Whatever happens, the system will get abused, and so, I weigh the potential abuses along with the potential benefits. With remote attestation, you put a lot of control in the hands whoever controls the "remote", making the situation very asymmetrical, and so, ripe for centralized abuse. For example, with centralized trust systems, a leak of the signing keys are devastating for the system. For an example, see the DVD key leak:

https://en.wikipedia.org/wiki/AACS_encryption_key_controvers...

128. 29athr+ju[view] [source] 2022-07-26 08:56:10
>>gjsman+(OP)
Can you trust your computer? by Richard Stallman

https://www.gnu.org/philosophy/can-you-trust.en.html

129. zczc+ku[view] [source] 2022-07-26 08:56:28
>>gjsman+(OP)
Interesting naming. "Microsoft Hell God".

Pluto (Greek: Πλούτων Plouton, "giver of wealth", Pluton in French and German) the most common name for the classical ruler of the underworld. Plouton was one of several euphemistic names for Hades, described in the Iliad as the god most hateful to mortals. https://en.wikipedia.org/wiki/Pluto_(mythology)

132. 29athr+Qu[view] [source] 2022-07-26 09:03:21
>>gjsman+(OP)
This is basically a form of collusion and monopoly between Microsoft and CPU manufacturers.

Microsoft has already tried to monopolize the PC consumer market before. And back then the risks were tiny compared to what is at stake now.

https://www.justice.gov/atr/us-v-microsoft-courts-findings-f...

◧◩◪◨⬒
146. nobody+zx[view] [source] [discussion] 2022-07-26 09:30:55
>>ajvs+Do
It's not banned here in the US[0][1][2]. Nor should it be IMHO.

I say that as a person of Eastern European/Jewish extraction.

Do I like fascists/fascism? No. Do I like Nazis? No.

But I do like freedom of expression. And if the price of that freedom is that hateful scumbags get to speak their piece, that's okay with me. But I'll have something to say about it too. As it should be.

[0] https://archive.org/details/mein-kampf-audiobook

[1] https://harperandharley.org/pdf/mein-kampf/

[2] https://www.amazon.com/Mein-Kampf-Adolf-Hitler-ebook/dp/B002...

◧◩◪
150. dane-p+ty[view] [source] [discussion] 2022-07-26 09:39:46
>>zapthe+Ao
> They actually could easily enforce laws on banned content too

Exactly this. As soon as governments (or lobbyists) discover that this level of control is available to them, they will introduce whatever remaining laws they need, banning E2E encrypted chat apps, or Tor, or bittorrent clients.

I suspect that, like civil asset forfeiture, or running commands on botnet-infected devices[0], these actions will have only the thinnest veneer of "due process" applied to them. After all, if your computer is running "illegal" software, why should the government wait for your permission before deleting that software, or even tell you that it had done it after the fact?

[0] https://uk.pcmag.com/security/139675/us-disrupts-cyclops-bli...

◧◩◪◨⬒⬓
151. nobody+Ay[view] [source] [discussion] 2022-07-26 09:40:46
>>joseph+Yw
> imagine if the proponents of these systems had their way, they'd add remote attestation to websites too. Imagine your bank's website only loading on a "secure" windows environment, non-rooted android phone or an iphone.

Actually, IIUC this is already the case on Android[0].

Some (many? most?) banks/banking apps are rejecting (and/or complaining about) access from rooted phones right now.

I can't confirm this personally, as I'd rather have my tonsils extracted through my ears than use a surveillance device^W^W smart phone to do anything financially related.

Perhaps someone who uses banking apps on their surveillance device could chime in on that?

[0] https://www.howtogeek.com/241012/safetynet-explained-why-and...

◧◩◪
177. vander+fE[view] [source] [discussion] 2022-07-26 10:38:52
>>raxxor+bz
So basically, Cory Doctorow's "The Upcoming War Against General Computation"?

https://boingboing.net/2011/12/27/the-coming-war-on-general-...

https://github.com/jwise/28c3-doctorow/blob/master/transcrip...

Don't know enough about the subject to tell if his "attempts to control general computation will converge on rootkits" prediction has held up.

◧◩◪◨⬒⬓⬔
181. lostin+zE[view] [source] [discussion] 2022-07-26 10:42:24
>>nobody+Ay
Yes, this is already the case on Android. Two years ago I canceled smart-id contract (https://www.smart-id.com/) and stopped using any "smart" devices. Because one day the smart-id app ceased to work on my rooted smartphone.

Soon my old 3G dumbphone will be useless as the mobile operator ends the service. People are pushed to newer phones^W surveillance devices and I have to hunt for real 2G phone soon.

◧◩◪◨
196. q-big+eH[view] [source] [discussion] 2022-07-26 11:04:27
>>vander+fE
To this talk, there exists a less well-known sequel:

DEF CON 23 - Cory Doctorow - Fighting Back in the War on General Purpose Computers

https://www.youtube.com/watch?v=pT6itfUUsoQ

◧◩◪◨
217. SSLy+FK[view] [source] [discussion] 2022-07-26 11:36:41
>>eertve+qj
>As of January 2021 deleting SecureBoot keys and installing your own keys (for example by using KeyTool) will brick the device. This is a problem that is similar to one which has been reported on some other Lenovo laptops [0] and is likely due to a faulty firmware. If the device is stuck in a boot loop after replacing the SecureBoot keys, the only way to repair it is by replacing the mainboard of the device.

[0] https://forums.lenovo.com/t5/ThinkPad-X-Series-Laptops/BIOS-...

From https://wiki.archlinux.org/title/Lenovo_ThinkPad_T14/T14s_(I...

◧◩◪
220. xjay+YK[view] [source] [discussion] 2022-07-26 11:39:02
>>raxxor+bz
2013: German Federal Government Warns on the Security Dangers of Windows 8 https://www.infosecurity-magazine.com/news/german-federal-go...

2015: Governments recognize the importance of TPM 2.0 through ISO adoption https://www.microsoft.com/security/blog/2015/06/29/governmen...

2022: Microsoft Can Kiss My A* | Do You Own Your PC? [Smart App Control] https://www.youtube.com/watch?v=Lv5xHfZnk4s&t=163s

The Trojan Platform Module (TPM)

◧◩
234. acdha+9N[view] [source] [discussion] 2022-07-26 11:57:42
>>userbi+17
> It's worth reading https://www.gnu.org/philosophy/right-to-read.en.html again just to see how prescient Stallman was.

I think it’s also worth asking why he didn’t have more impact despite pretty clearly seeing this problem. Part of the answer has to be resource disparities but I don’t think it’s just that - Linux didn’t really capitalize at all on Microsoft’s lost decade, and much of the innovation in security has happened on other platforms. I think there’s also some kind of blind spot in the open source community where a lot of people see this as something other people need, not them personally.

◧◩◪◨
237. acdha+WN[view] [source] [discussion] 2022-07-26 12:03:08
>>dx034+iK
Banning their use in classrooms is lesser but still a step on that path, and the same Republicans trying to do that are not going to stop at schools after they win but will rather see that as an invigorating first step in a long campaign. For example, book sellers in Virginia are currently fighting a lawsuit against an attempt which would ban private sales:

https://www.virginiamercury.com/2022/07/06/free-speech-group...

◧◩◪◨⬒
275. cesarb+LV[view] [source] [discussion] 2022-07-26 12:53:46
>>jhansc+Xq
> you can disable secure boot.

That's not always the case: https://www.softwarefreedom.org/blog/2012/jan/12/microsoft-c... "Disabling Secure [Boot] MUST NOT be possible on ARM systems."

288. crudbu+OY[view] [source] 2022-07-26 13:12:47
>>gjsman+(OP)
Is Pluton IP open? All hardware vendors embracing this is not the right path for security / computing.

Why can't hardware vendors embrace standards-based open platforms like Global Platform [1].

[Edit] Google is also pushing Android Ready SE Alliance [2].

[1] https://globalplatform.org/

[2] https://security.googleblog.com/2021/03/announcing-android-r...

◧◩◪◨⬒⬓⬔
293. nptelj+101[view] [source] [discussion] 2022-07-26 13:19:50
>>adev_+eP
I agree. In a proposal like this, security is basically a byproduct, and sometimes not even that[0]. This is also a domain where the governmental and corporate powers have a similar goal, which is wresting away the control from the public / individual. They basically work in synergy, only to a point of course, but still.

Regarding Bonzi Buddy, I disagree. I think user data is as important, if not more important, than root access - which is why I'm dumbfounded when ancient server security features, like Linux's sudo system, are applied to the consumer device like a PC or a smartphone. These contexts are much better server by a sandboxing, permission-based whatever that seems to pick up steam, like the current permission systems on smartphones. Grandma's logins and bank data will be stolen from her own user account just the same as an admin account. Related XKCD[1]

[0] https://en.wikipedia.org/wiki/Security_theater

[0] https://xkcd.com/1200/

◧◩
301. userbi+x31[view] [source] [discussion] 2022-07-26 13:36:26
>>__void+wk
no, I don't need a unique identifier

People fought against that and actually won, 23 years ago: https://news.ycombinator.com/item?id=10106870

Unfortunately, that may have been the only victory, as they slowly started introducing a lot of other stuff silently under the guise of "security".

"not secure by design" nowadays comes close to being a coveted feature

Absolutely. As the saying goes, "insecurity is freedom".

◧◩◪◨⬒⬓⬔
359. virapt+ys1[view] [source] [discussion] 2022-07-26 15:24:47
>>raxxor+nk1
I don't think it's going to be useful this way for DRM. TPM is useful for verifying your boot chain is secure and validating this to an external party. But locally you can lie to apps all you want. You can emulate the TPM device (https://qemu-project.gitlab.io/qemu/specs/tpm.html) - it can tell you whatever you want. Locally it's as useful as hiding the DRM in a driver. Rising the bar a bit, but you can still work around it.
◧◩◪◨
365. RajT88+bu1[view] [source] [discussion] 2022-07-26 15:34:13
>>autoex+JP
Yes, you'll likely have to keep re-doing it.

As far as scripts for it, this thread has some sage advice:

https://www.reddit.com/r/privacy/comments/n3v0s5/disable_win...

The tools to disable telemetry and bloat:

https://github.com/irmatade/sharpapp https://www.oo-software.com/fr/shutup10 https://github.com/Sycnex/Windows10Debloater

MSFT doc on what all telemetry is gathered, and what is considered "required" telemetry (although they give you enough info to block it at the router):

https://docs.microsoft.com/en-us/windows/privacy/configure-w...

I do like Win10 as an OS. On the whole I'd say the Satya era of MSFT is a mixed bag, but better on the whole than it was before.

◧◩◪◨⬒⬓⬔
385. merlin+jD1[view] [source] [discussion] 2022-07-26 16:19:43
>>bongob+tE
Apparently it has also been banned in places for Fatphobia among other progressive reasons[0].

[0] When It Comes to Banning Books, Both Right and Left Are Guilty | Opinion: https://www.newsweek.com/when-it-comes-banning-books-both-ri...

◧◩◪
393. Gh0stR+9G1[view] [source] [discussion] 2022-07-26 16:32:06
>>POPOSY+qn
The plugin my current employer uses is so well integrated that I don't even know its name. (I suspect it may be developed internally)

At a past job, we used Entrust [0] and I'm aware of Virtru [1] as well.

Edit: I forgot about Sharepoint, which also sort-of fills the ACL document-sharing niche. (though I'm less certain about whether it uses encryption to enforce its access policies)

[0] https://www.entrust.com/ [1] https://www.virtru.com/

◧◩
407. gjsman+EN1[view] [source] [discussion] 2022-07-26 17:05:59
>>mjg59+VJ1
You are incorrect yourself in several ways here.

> The claimed requirement to remove the third party UEFI CA certificate from 2022 Secured Core PCs is entirely unrelated to Pluton (it's required regardless of whether Pluton is enabled or not, and even whether the CPU has Pluton or not)

Pluton is de-facto a Secured Core PC implementation, and Secure Core PCs are also making this change. Thus it effects both Pluton and Secured Core, but the new requirement does not effect non-Pluton and non-Secure-Core systems. Because Secured-Core PCs are currently niche and will no longer exist once Pluton is broadly adopted, Pluton will be the first appearance of this change for the vast majority of users.

If I'm selling a 12th Gen Intel system right now, I can keep the 3rd-party UEFI certificate enabled. If I am selling a 12th Gen Secure Core PC, then this year I must disable that certificate, but my non-Secured-Core PCs can again keep it open. When Pluton arrives, that door must be shut.

You can verify this with Microsoft's Secured Core PC documentation:

https://docs.microsoft.com/en-us/windows-hardware/design/dev...

> Most of the description of Pluton is actually a description of a TPM. You don't need DICE for remote attestation. TPMs are already a hardware keystore.

To an extent. The original TPM is very finicky as documented by the comments on this post and elsewhere - even changing a RAM stick could invalidate the TPM's assertion. For this reason, the TPM was very unideal for DRM due to it's all-or-nothing approach, which Microsoft Pluton does not make the mistake of repeating, allowing for much more granular security that makes it much more easily applied. The second reason why Pluton is much more dangerous is that the TPM could be easily virtualized or hacked over the bus rendering DRM use-cases quite broken, whereas Pluton supports neither weakness, making its DRM potential (again) much more potent. Finally, using DICE, unlike a TPM, the Pluton is explicitly designed to give a computer a permanent identity that can never be erased, which (again) TPM does not guarantee.

Useful HN comment explaining: https://news.ycombinator.com/item?id=25193346

That's actually the big reason why the Remote Assertion is an important point here. The TPM version of it was almost unusable outside of very niche business applications and BitLocker, while with DICE, the Pluton is far more potent. (After all, if TPM worked fine on it's own, why does DICE even exist?)

I think the last point to further back this view I will also add is these comments from a Microsoft employee on the subject.

https://lobste.rs/s/fdguww/dangers_microsoft_pluton#c_tdlo1r

> System firmware is already being updated via Windows Update. The discussion about Pluton and Windows Update is around Pluton getting firmware updates that way (the existing story around firmware updates for TPMs is largely not good)

Microsoft themselves states in Pluton's announcement that Pluton will hardware-integrate with Windows Update for various system firmware, through their "chip-to-cloud" security initiative. To quote them:

"One of the other major security problems solved by Pluton is keeping the system firmware up to date across the entire PC ecosystem. Today customers receive updates to their security firmware from a variety of different sources than can be difficult to manage, resulting in widespread patching issues. Pluton provides a flexible, updateable platform for running firmware that implements end-to-end security functionality authored, maintained, and updated by Microsoft. Pluton for Windows computers will be integrated with the Windows Update process in the same way that the Azure Sphere Security Service connects to IoT devices."

This is a little frustratingly vague and thus part of the reason why Pluton requires some speculation. Judging by the reference to "different sources that are difficult to manage", it appears you don't update Pluton, Pluton updates you. Pluton has an active role in your system's security, whereas TPM was only passive.

◧◩◪◨⬒⬓
431. gjsman+H82[view] [source] [discussion] 2022-07-26 18:45:56
>>mjg59+J62
I'm not entirely sold for a few reasons.

1. This would require that Intel and AMD find it less intrusive to build an entire additional SoC into their processors, on whatever node necessary, than to package their software for Windows Update. Also, it leaves out the question, why couldn't Microsoft have required that AMD and Intel just implement a TPM outside of the PSP/ME with similar hardware protections? Intel would have vastly preferred that, as then they could have just marketed it as part of their vPro solution.

2. For RIoT, it was reported by IEEE in their report that the Pluton does implement RIoT, and this report was endorsed by the Vice President of OS Security at Microsoft as the best write-up so far just yesterday (see https://twitter.com/dwizzzleMSFT/status/1551594590087438336). So there is more to the story than you believe on this subject. Unless the Vice President of OS Security at Microsoft who actually worked on Pluton is incorrect, Pluton does have RIoT.

I will dare quote a fair-use bit of the paywalled report:

"Pluton also implements the device identifier composition engine (DICE) specification, as defined by the TCG, along with the Robust Internet of Things (RIoT) specification, as defined by Microsoft, to achieve DICE+RIoT. Using this technology, a device cannot masquerade its boot path; more simply, it provides a strong method for attesting to a device’s current state and status (e.g., patch version, firmware version, etc.). It is important that this is implemented in hardware, rather than firmware, because the hardware which performs the initial measurements and checks on power-on cannot be modified by an attacker. Relying on device attestation rooted in firmware or software is dangerous because if the initial stages of the boot process are compromised then the entire boot process can be falsified and a bogus attestation can be produced. While Microsoft intends for this technology to be compatible with their Azure Attestation service, since it is built using open standards it can be leveraged by any attestation service, which supports DICE+RIoT."

Edit: On that note, I have added an update to the blog post noting this conversation and that while I am not fully convinced of your points, it is also worth reading.

Edit 2: On a third note, I doubt that Microsoft intends "Secured Core" to be a thing that just sticks around forever. Even though this is just speculation, I find it hard to believe Microsoft would not one day make Secured Core or parts thereof (say, everything except the Thunderbolt protection) mandatory. That is yet another possibility, that "Secured Core" become more and more similar to mainline Windows over time. They may have already to OEMs, but I will admit there is no way to prove one way or the other.

◧◩◪◨
436. sandwo+rc2[view] [source] [discussion] 2022-07-26 19:02:42
>>dx034+iK
Books are just information. Information gets banned all the time. Old-timers will remember this:

https://en.wikipedia.org/wiki/Free_Speech_Flag

440. phendr+ef2[view] [source] 2022-07-26 19:16:05
>>gjsman+(OP)
These paranoid delusions never get old. If Microsoft accidentally changes their license agreement to lorem ipsum, bloggers like this will surely be trying to decipher exactly how it steals their freedom. The fatal flaw in these posts is, as it always is, the blind assumption that Microsoft can just do whatever they want, unimpeded. If Microsoft declared, as an april 1st joke, that app PCs henceforth must be painted sky blue, these bloggers would take it seriously. They act as though Microsoft is the high priesthood of computers, and they can declare literally anything with the stroke of a pen. They act like Mac doesn't exist, cheap Linux computers don't exist, RISC-V (which doesn't even run Windows) doesn't exist. Non-Windows-compatible ARM devices don't exist. PC vendors are mindless drones that do whatever Microsoft tells them (even if it means losing billions of dollars to Apple) and they certainly aren't selling (Dell: https://news.ycombinator.com/item?id=4847720) linux (HP: https://news.ycombinator.com/item?id=31617198) laptops (Lenovo: https://news.ycombinator.com/item?id=28186204) right now (and don't even think about installing Linux on your Google Chromebook, it won't work! https://support.google.com/pixelbook/answer/9031351?hl=en ).

The usual rebuttal is "Well, yeah, things are fine NOW, but they're moving the chess pieces into place to do these things LATER". Yawn. I have heard this for 20+ years. See you in another 20...

◧◩
458. userbi+kW2[view] [source] [discussion] 2022-07-26 23:26:40
>>mjg59+VJ1
Arguing about the technicalities DOES NOT MATTER one bit about what the final outcome will be, and in fact appears to be a carefully calculated means of distraction.

everything that the article is worried about being enabled by Pluton is already possible, and has been for years.

There's a HUGE difference between "possible" and "very easy to deploy". https://news.ycombinator.com/item?id=29859106

◧◩◪◨
462. nyanpa+n33[view] [source] [discussion] 2022-07-27 00:44:26
>>resfir+141
If I'm not mistaken, "no one has figured out" is factually incorrect. https://ameliorated.info/ blocks nearly all OS network requests (and hopefully all OS telemetry) by physically removing the relevant files from the system (though this breaks UWP apps, .appx, and such), and disables Windows Update to prevent telemetry components from being reinstalled. I use it on a near-daily basis, and it works quite well in most cases, although having a separate admin account by default, not being able to create new accounts (they show black screens), and missing features (Action Center and notifications) do sting, and I'm worried about the lack of security updates. If you do choose to use it, https://git.ameliorated.info/Joe/amecs is important for configuring the system.
◧◩◪◨⬒⬓⬔⧯▣
474. gjsman+2k3[view] [source] [discussion] 2022-07-27 04:17:46
>>userbi+3j3
Windows has had TPM 2.0 since 2016, and remote attestation can be accomplished with the TPM only without Pluton being necessary. However, Pluton has its own issues and appears to make implementing attestations easier, by supporting different attestation protocols - and by potentially receiving new updates for that functionality later on. Pluton is also significantly stronger against attacks which have occurred on TPMs previously.

https://www.bleepingcomputer.com/forums/t/613941/tpm-20-is-m...

[go to top]