Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. A friend, @chloetankahhui has been speaking up against the proposal to enforce age verification at the OS level, and the QRTs to this shows the extent of naivety that a lot of people have.

A friend, @chloetankahhui has been speaking up against the proposal to enforce age verification at the OS level, and the QRTs to this shows the extent of naivety that a lot of people have.

Scheduled Pinned Locked Moved Uncategorized
11 Posts 2 Posters 45 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • sleepyowl@chaos.socialS This user is from outside of this forum
    sleepyowl@chaos.socialS This user is from outside of this forum
    sleepyowl@chaos.social
    wrote last edited by
    #1

    A friend, @chloetankahhui has been speaking up against the proposal to enforce age verification at the OS level, and the QRTs to this shows the extent of naivety that a lot of people have.

    No one who does hardware security believes that any system is bulletproof, but do you really think that circumventing these things will always be a simple firmware mod or hardware hack?

    Let's dive in. /1

    sleepyowl@chaos.socialS 1 Reply Last reply
    0
    • sleepyowl@chaos.socialS sleepyowl@chaos.social

      A friend, @chloetankahhui has been speaking up against the proposal to enforce age verification at the OS level, and the QRTs to this shows the extent of naivety that a lot of people have.

      No one who does hardware security believes that any system is bulletproof, but do you really think that circumventing these things will always be a simple firmware mod or hardware hack?

      Let's dive in. /1

      sleepyowl@chaos.socialS This user is from outside of this forum
      sleepyowl@chaos.socialS This user is from outside of this forum
      sleepyowl@chaos.social
      wrote last edited by
      #2

      Since the late 2000s, computer chipsets have shipped with security processors like Intel Management Engine and AMD Platform Security Processor.

      Part of their job is to verify that the UEFI firmware is from the computer OEM and has not been tampered with or comes from a 3rd party. /2

      Link Preview ImageLink Preview Image
      sleepyowl@chaos.socialS 1 Reply Last reply
      1
      0
      • sleepyowl@chaos.socialS sleepyowl@chaos.social

        Since the late 2000s, computer chipsets have shipped with security processors like Intel Management Engine and AMD Platform Security Processor.

        Part of their job is to verify that the UEFI firmware is from the computer OEM and has not been tampered with or comes from a 3rd party. /2

        Link Preview ImageLink Preview Image
        sleepyowl@chaos.socialS This user is from outside of this forum
        sleepyowl@chaos.socialS This user is from outside of this forum
        sleepyowl@chaos.social
        wrote last edited by
        #3

        How do these security processors verify the firmware integrity?

        Through a set of cryptographic keys and their hashes, which are used to verify the cryptographic signature of the UEFI firmware. These keys or hashes are *burned* into the processor and cannot be changed. /3

        Link Preview ImageLink Preview ImageLink Preview Image
        sleepyowl@chaos.socialS 1 Reply Last reply
        0
        • sleepyowl@chaos.socialS sleepyowl@chaos.social

          How do these security processors verify the firmware integrity?

          Through a set of cryptographic keys and their hashes, which are used to verify the cryptographic signature of the UEFI firmware. These keys or hashes are *burned* into the processor and cannot be changed. /3

          Link Preview ImageLink Preview ImageLink Preview Image
          sleepyowl@chaos.socialS This user is from outside of this forum
          sleepyowl@chaos.socialS This user is from outside of this forum
          sleepyowl@chaos.social
          wrote last edited by
          #4

          For now, these functions are not strictly enforced or turned on in a lot of consumer devices.

          But is there anything stopping nation states from forcing hardware manufacturers and OEMs to do so?

          What options do you have in such a case? /4

          Link Preview Image
          sleepyowl@chaos.socialS 1 Reply Last reply
          0
          • sleepyowl@chaos.socialS sleepyowl@chaos.social

            For now, these functions are not strictly enforced or turned on in a lot of consumer devices.

            But is there anything stopping nation states from forcing hardware manufacturers and OEMs to do so?

            What options do you have in such a case? /4

            Link Preview Image
            sleepyowl@chaos.socialS This user is from outside of this forum
            sleepyowl@chaos.socialS This user is from outside of this forum
            sleepyowl@chaos.social
            wrote last edited by
            #5

            There have been vulnerabilities in ME and PSP, and there MAY BE a way for users to bypass these checks.

            But this assumes:
            - Someone out there will put in labor to circumvent these things and release it freely, even at great expense.
            - A simple, user doable hack even exists.

            /5

            Link Preview ImageLink Preview Image
            sleepyowl@chaos.socialS 1 Reply Last reply
            0
            • sleepyowl@chaos.socialS sleepyowl@chaos.social

              There have been vulnerabilities in ME and PSP, and there MAY BE a way for users to bypass these checks.

              But this assumes:
              - Someone out there will put in labor to circumvent these things and release it freely, even at great expense.
              - A simple, user doable hack even exists.

              /5

              Link Preview ImageLink Preview Image
              sleepyowl@chaos.socialS This user is from outside of this forum
              sleepyowl@chaos.socialS This user is from outside of this forum
              sleepyowl@chaos.social
              wrote last edited by
              #6

              Again, no one assumes that any system can be made 100% bulletproof. But that was never the point is it?

              The end game is for manufacturers to harden their devices against cheaper tools and raise the barrier to entry such that it costs a fortune for hackers who might even try. /6

              Link Preview ImageLink Preview ImageLink Preview Image
              sleepyowl@chaos.socialS 1 Reply Last reply
              0
              • sleepyowl@chaos.socialS sleepyowl@chaos.social

                Again, no one assumes that any system can be made 100% bulletproof. But that was never the point is it?

                The end game is for manufacturers to harden their devices against cheaper tools and raise the barrier to entry such that it costs a fortune for hackers who might even try. /6

                Link Preview ImageLink Preview ImageLink Preview Image
                sleepyowl@chaos.socialS This user is from outside of this forum
                sleepyowl@chaos.socialS This user is from outside of this forum
                sleepyowl@chaos.social
                wrote last edited by
                #7

                This is why GiovanH's blog article is a must-read.

                People assume that accessible hacks of invasive systems will always exist, and users hacking their devices is to be expected.

                THIS SHOULDN'T BE A NORM. THIS IS AN ARMS RACE AND WE'RE OUTMATCHED. /7

                Link Preview Image
                A Hack is Not Enough

                Twisted Sister's "there ain't no way we'll lose it" political theory has not held up

                favicon

                (blog.giovanh.com)

                Link Preview Image
                sleepyowl@chaos.socialS 1 Reply Last reply
                0
                • sleepyowl@chaos.socialS sleepyowl@chaos.social

                  This is why GiovanH's blog article is a must-read.

                  People assume that accessible hacks of invasive systems will always exist, and users hacking their devices is to be expected.

                  THIS SHOULDN'T BE A NORM. THIS IS AN ARMS RACE AND WE'RE OUTMATCHED. /7

                  Link Preview Image
                  A Hack is Not Enough

                  Twisted Sister's "there ain't no way we'll lose it" political theory has not held up

                  favicon

                  (blog.giovanh.com)

                  Link Preview Image
                  sleepyowl@chaos.socialS This user is from outside of this forum
                  sleepyowl@chaos.socialS This user is from outside of this forum
                  sleepyowl@chaos.social
                  wrote last edited by
                  #8

                  People who think "oh we'll just buy Chinese motherboards and chips" or "just use open source hardware"

                  WHO FABRICATES THE BOARDS AND CHIPS FOR OSHW? DO YOU BELIEVE STATES LIKE CHINA AREN'T INTERESTED IN SIMILAR MEASURES OF CONTROL?

                  This is the tech equivalent of tankie-ism.

                  /8

                  Link Preview ImageLink Preview ImageLink Preview Image
                  sleepyowl@chaos.socialS 1 Reply Last reply
                  0
                  • sleepyowl@chaos.socialS sleepyowl@chaos.social

                    People who think "oh we'll just buy Chinese motherboards and chips" or "just use open source hardware"

                    WHO FABRICATES THE BOARDS AND CHIPS FOR OSHW? DO YOU BELIEVE STATES LIKE CHINA AREN'T INTERESTED IN SIMILAR MEASURES OF CONTROL?

                    This is the tech equivalent of tankie-ism.

                    /8

                    Link Preview ImageLink Preview ImageLink Preview Image
                    sleepyowl@chaos.socialS This user is from outside of this forum
                    sleepyowl@chaos.socialS This user is from outside of this forum
                    sleepyowl@chaos.social
                    wrote last edited by
                    #9

                    Go on, circumvent these measures & keep our tech open and free.

                    But know that many hackers find basic hardware hacking tools too costly and out of reach. WE'RE OUTRESOURCED.

                    PUSH BACK BEFORE THESE POLICIES BECOME NORMALIZED. DON'T RELY ON HACKING ALONE TO SAVE US.

                    /END

                    valpackett@social.treehouse.systemsV 1 Reply Last reply
                    0
                    • sleepyowl@chaos.socialS sleepyowl@chaos.social

                      Go on, circumvent these measures & keep our tech open and free.

                      But know that many hackers find basic hardware hacking tools too costly and out of reach. WE'RE OUTRESOURCED.

                      PUSH BACK BEFORE THESE POLICIES BECOME NORMALIZED. DON'T RELY ON HACKING ALONE TO SAVE US.

                      /END

                      valpackett@social.treehouse.systemsV This user is from outside of this forum
                      valpackett@social.treehouse.systemsV This user is from outside of this forum
                      valpackett@social.treehouse.systems
                      wrote last edited by
                      #10

                      @sleepyowl FWIW the current "contract" for what "a PC" even is (i.e. the requirements to get WHQL certified by MS) specifically defines that it must be possible to completely disable OS verification (UEFI Secure Boot) or use the user's own keys for it, out of the box without any extra requirements.

                      Firmware verification on every boot (Boot Guard et al) —which has already been widely enabled in Intel-based PC laptops of the last decade— did not change that, on its own.

                      Of course the policies are subject to change, but I think even Microsoft themselves would be really pissed about having to change any of this due to legal bullshit.

                      1 Reply Last reply
                      0
                      • valpackett@social.treehouse.systemsV This user is from outside of this forum
                        valpackett@social.treehouse.systemsV This user is from outside of this forum
                        valpackett@social.treehouse.systems
                        wrote last edited by
                        #11

                        @bunny pushback was definitely a part of it; also failure in the market. The 32-bit Windows RT devices were trying really hard to be iPads, but absolutely no one wanted just the walls with no garden inside.

                        1 Reply Last reply
                        0
                        • R relay@relay.infosec.exchange shared this topic
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • World
                        • Users
                        • Groups