EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS


Guest Post: UEFI’s Effects on the User

Posted in Antitrust, Microsoft, Vista 8 at 10:08 am by Dr. Roy Schestowitz

Windows 8 book

Summary: A contributor’s take and set of thoughts about Microsoft’s latest anti-competitive tactic

Did you know, Microsoft Press (A Division of Microsoft Corporation) has published a Windows 8 book as PDF, titled “Inside Out Windows 8”. The ultimate, in-depth reference Hundreds of timesaving solutions Supremely organized, packed with expert advice Companion eBook (744 pages 34.2 MB)

However, the one and only section (page 25) on UEFI “Secure Boot” doesn’t mention how it functions, works or operates, how to access it or any interoperability. No mention on how to even disable Secure Boot at all.

Such as the undocumented steps below;

1. Boot machine while pressing F10

2. Find Secure Boot in the menu tree, ignore warnings

3. Disable Secure Boot feature

4. Enable legacy boot options

5. Enable specific legacy devices, such as USB devices

6. Save and reboot while holding down F9

Book shot

(No mention in Chapter 27!)

I want to point out there is NO such thing as “Windows Hardware” because Microsoft does NOT manufacture Lenovo, Sony, Toshiba, Acer, Asus, MSI, VIA, HP, Dell, Celvo, Sager, etc…

This is Microsoft extending its own brand (software) upon firmware, claiming it’s their platform. Why do the manufactures accept this theft of their hardware product?

Why doesn’t someone write to the European Court of Justice and file a complaint?

Regarding how UEFI Secure Boot has the side effect of preventing interoperability against competitors and open society by preventing unauthorized firmware, operating systems, or UEFI drivers from running at boot time unless they bear a cryptographic signature by Microsoft, the manufacturer or an UEFI signing key vendor ($99 for an UEFI signing key) for any software that modifies the bootloader that enforces the UEFI secure boot protocol.

Basically, the bootloader is the place where the PC hardware reads instructions to boot up an operating system or program. Windows installs those instructions in the bootloader, just as another operating system like Linux. By making the process proprietary without full documentation, competitors are at a huge disadvantage.

Microsoft has basically inserted themselves as the UEFI gatekeeper for installing not just their software, but any software that modifies the bootloader on a potentially huge number of devices globally around the world.

The main issue with the UEFI secure protocol is that it excludes out ALL other operating systems, for the right of sharing (educational), giving (philanthropy), renting, loaning, and borrowing on other W8 PC system/s hardware to run boxed copies of Windows or Linux on Windows logo hardware, and also impossible to install new versions of Windows or Linux unless your OEM provided a new UEFI digitally signed key. A system that ships with only OEM and Microsoft keys will not boot a generic copy of Linux.

Not to mention, Windows 8 PC owners won’t be able to replace their OS with another like Windows 7, unless they obtain a digitally signed Secure Boot version for their system.

One of the few shortcomings in the UEFI model (and it is a deliberate omission because of the complexity of running a certification system) is that there’s no designated root of trust in the current version 2.3.1. for a centralized vendor-neutral signing authority to provide UEFI keys.

The Windows 8 PC you buy in 2013 will be permanently locked into Windows 8 if Microsoft gets away with their plan. Windows 8 certification does not require that the user be able to disable UEFI secure boot, and hardware vendors have reported already that on some hardware will not have this option available.

Of course, Windows 8 certification does not require that the PC system come with any keys other than Microsoft’s. A system that ships with UEFI secure boot enabled and only includes Microsoft’s signing keys will only securely boot Microsoft operating systems.

Think how this gives great power to Microsoft, for every manufacturer that wants to sell hardware for the Windows 8 PC, needs a UEFI digital signed key, from Microsoft!

Disabling UEFI Secure Boot is NOT offered on ARM systems like Windows 8 RT (Tablets).

The PC user using x64 or x86 systems is not guaranteed the ability to install extra signing keys in order to securely boot the operating system of their choice. The PC user is not guaranteed that their system will include the signing keys that would be required for them to swap their graphics card from another vendor, or replace their network card and still be able to netboot, or install a newer SATA controller and have it recognize their hard drive in the firmware. Of course, UEFI doesn’t provide the means to generate your own UEFI keys either. Just where does that leave the PC user?

The truth is that UEFI using the Secure Boot Protocol v2.3.1 makes it more difficult to run anything other than Windows 8. UEFI secure boot is a valuable and worthwhile feature that Microsoft is misusing to gain tighter control over the market.

As it stands now Microsoft is saying OEMs don’t have to do it. They just have to do it if they want to sell PCs with Windows on them.


  • http://www.uefi.org/specs/download/UEFI_2_3_1_Errata_A.zip “UEFI Specification 2.3.1″ (2,139 pages)
  • http://download.microsoft.com/download/A/D/F/ADF5BEDE-C0FB-4CC0-A3E1-B38093F50BA1/windows8-hardware-cert-requirements-system.pdf (291 pages)

Note: you can obtain the source PDF as Microsoft PDF ebook “Windows 8 Inside Out by Tony Northrup (Nov 23, 2012)”

Library of Congress Control Number: 2012950441

ISBN: 978-0-7356-6381-7

Amazon.com: http://www.amazon.com/Windows-Inside-Out-Tony-Northrup/dp/0735663815/ref=sr_1_1?s=books&ie=UTF8&qid=1354458846&sr=1-1&keywords=9780735663817

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

A Single Comment

  1. Tony Northrup said,

    December 14, 2012 at 4:28 pm


    Hi. I’m the author of Windows 8 Inside Out.

    Regarding the book, you’re right that the coverage of Secure Boot is brief, and perhaps too brief. However, since the book is about Windows 8 and Windows 8 users shouldn’t ever need to configure Secure Boot, it seemed sufficient for my audience.

    Also note that there’s no single process for turning off Secure Boot, because it must be done within the UEFI firmware, and that can be different for every PC (or at least, every UEFI implementation). So, providing step-by-step instructions for that would have been impossible. The lack of a consistent user interface is actually one of the biggest drawbacks to Secure Boot; if users want to turn it off, they need to read the manual, and you know how that goes…

    There’s plenty of information out there about how it works, and in fact I’m in the process of writing a much longer whitepaper for IT audiences.

    People are concerned about Secure Boot because all PCs that get the Windows 8 logo certification MUST support Secure Boot and have it turned on by default. However, that same certification process also requires PCs to:
    * Allow the user to add their own keys, so they can trust any bootloader/OS they want.
    * Completely disable Secure Boot, so the PC operates will load anything (including a bootkit).

    Just wanted to clarify that the concern isn’t, “Users can’t run Linux!” it’s, “Users have to follow potentially confusing steps to change their Secure Boot settings if their favorite Linux distro doesn’t have a certified boot loader.”

    There is a certified shim that Linux distros can use, though I know none of them are especially happy about having to get a cert from Microsoft: http://mjg59.dreamwidth.org/20303.html

    My understanding is that these statements are now incorrect:

    “Windows 8 certification does not require that the user be able to disable UEFI secure boot” and “The PC user using x64 or x86 systems is not guaranteed the ability to install extra signing keys in order to securely boot the operating system of their choice.” The certification does require users to be able to disable Secure Boot, as well as trusting any bootloader they choose.

    However, this statement is true:

    “Disabling UEFI Secure Boot is NOT offered on ARM systems like Windows 8 RT (Tablets).”

    Of course, it’s also true of just about every mobile device (iPhones, iPads, Kindle Fires, most Android devices, etc). Personally, I wish they would just let people load their own software, but the security guy in me understands the risks and the support guy in me knows the headaches.

What Else is New

  1. The Spanish EPO Scandal - Part I

    How García-Escudero Marquez, the sister of a Spanish Senate speaker, got controversially appointed to succeed the (now) EPO's Vice-President Alberto Casado Cerviño

  2. Media Alert: IAM 'Magazine' Does Not Protect Sources

    An important discussion regarding the role of IAM (Intellectual Asset Management) in the debate about EPO abuses

  3. Richard Stallman and Eben Moglen on the Microsoft-Red Hat Deal

    Founder of Free software and author of the GPL (respectively) comment on what Microsoft and Red Hat have done regarding patents

  4. Links 30/11/2015: Linux 4.4 RC3, Zaragoza Moving to FOSS

    Links for the day

  5. Public Protests by European Patent Office (EPO) Staff Weaken the EPO's Attacks on the Media

    Where things stand when it comes to the EPO's standoff against publications and why it's advisable for EPO staff to stage standoffs against their high-level management, which is behind a covert crackdown on independent media (while greasing up corporate media)

  6. Why the European Patent Office Cannot Really Sue and Why It's All -- More Likely Than Not -- Just SLAPP

    Legal analysis by various people explains why the EPO's attack dogs are all bark but no bite when it comes to threats against publishers

  7. How the EPO Twisted Defamation Law in a Failed Bid to Silence Techrights

    Using external legal firms (not the EPO's own lawyers), the EPO has been trying -- and failing -- to silence prominent critics

  8. East Texas and Its Cautionary Tale: Software Patents Lead to Patent Trolls

    Lessons from US media, which focuses on the dire situation in Texas courts, and how these relate to the practice of granting patents on software (the patent trolls' favourite weapon)

  9. The Latest EPO Spin: Staff Protesters Compared to 'Anti-Patent Campaigners' or 'Against UPC'

    Attempts to characterise legitimate complaints about the EPO's management as just an effort to derail the patent office itself, or even the patent system (spin courtesy of EPO and its media friends at IAM)

  10. The Serious Implication of Controversial FTI Consulting Contract: Every Press Article About EPO Could Have Been Paid for by EPO

    With nearly one million dollars dedicated in just one single year to reputation laundering, one can imagine that a lot of media coverage won't be objective, or just be synthetic EPO promotion, seeded by the EPO or its peripheral PR agents

  11. EPO: We Have Always Been at War With Europe (or Europeans)

    The European Patent Office (EPO) with its dubious attacks on free speech inside Europe further unveiled for the European public to see (as well as the international community, which oughtn't show any respect to the EPO, a de facto tyranny at the heart of Europe)

  12. What Everyone Needs to Know About the EPO's New War on Journalism

    A detailed list of facts or observations regarding the EPO's newfound love for censorship, even imposed on outside entities, including bloggers (part one of several to come)

  13. EPO Did Not Want to Take Down One Techrights Article, It Wanted to Take Down Many Articles Using Intimidation, SLAPPing, and Psychological Manipulation Late on a Friday Night

    Recalling the dirty tactics by which the European Patent Office sought to remove criticism of its dirty secret deals with large corporations, for whom it made available and was increasingly offering preferential treatment

  14. The European Private Office: What Was Once a Public Service is Now Crony Capitalism With Private Contractors

    The increasing privatisation of the European Patent Office (EPO), resembling what happens in the UK to the NHS, shows that the real goal is to crush the quality of the service and instead serve a bunch of rich and powerful interests, in defiance of the original goals of this well-funded (by taxpayers) organisation

  15. Microsoft Once Again Disregards People's Settings and Abuses Them, Again Pretends It's Just an Accident

    A conceited corporation, Microsoft, shows not only that it exploits its botnet to forcibly download massive binaries without consent but also that it vainly overrides people's privacy settings to spy on these people, sometimes with help from malicious hardware vendors such as Dell or Lenovo

  16. When the EPO Liaised With Capone (Literally) to Silence Bloggers, Delete Articles

    A dissection of the EPO's current media strategy, which involves not only funneling money into the media but also actively silencing opposing views

  17. Blogger Who Wrote About the EPO's Abuses Retires

    Bloggers' independent rebuttal capability against a media apparatus that is deep in the EPO's pocket is greatly diminished as Jeremy Phillips suddenly retires

  18. Leaked: EPO Award of €880,000 “in Order to Address the Media Presence of the EPO” (Reputation Laundering)

    The European Patent Office, a public body, wastes extravagant amounts of money on public relations (for 'damage control', like FIFA's) in an effort to undermine critics, not only among staff (internally) but also among the media (externally)

  19. Links 27/11/2015: KDE Plasma 5.5 Plans, Oracle Linux 7.2

    Links for the day

  20. Documents Needed: Contract or Information About EPO PR/Media Campaign to Mislead the World

    Rumour that the EPO spends almost as much as a million US dollars “with some selected press agencies to refurbish the image of the EPO”

  21. Guest Post: The EPO, EPC, Unitary Patent and the Money Issue

    Remarks on the Unitary Patent (UP) and the lesser-known aspects of the EPO and EPC, where the “real issue is money, about which very little is discussed in public...”

  22. Saving the Integrity of the European Patent Office (EPO)

    Some timely perspective on what's needed at the European Patent Office, which was detabilised by 'virtue' of making tyrants its official figureheads

  23. A Call for Bloggers and Journalists: Did EPO Intimidate and Threaten You Too? Please Speak Out.

    An effort to discover just how many people out there have been subjected to censorship and/or self-censorship by EPO aggression against the media

  24. European Patent Office (EPO) a “Kingdom Above the EU Countries, a Tyranny With ZERO Accountability”

    Criticism of the EPO's thuggish behaviour and endless efforts to crush dissenting voices by all means available, even when these means are in clear violation of international or European laws

  25. Links 26/11/2015: The $5 Raspberry Pi Zero, Running Sans Systemd Gets Hard

    Links for the day

  26. EPO Management Needs to Finally Recognise That It Itself is the Issue, Not the Staff or the Unions

    A showing of dissent even from the representatives whom the EPO tightly controls and why the latest union-busting goes a lot further than most people realise

  27. Even the EPO Central Staff Committee is Unhappy With EPO Management

    The questions asked by the Central Staff Committee shared for the public to see that not only a single union is concerned about the management's behaviour

  28. The Broken Window Economics of Patent Trolls Are Already Coming to Europe

    The plague which is widely known as patent trolls (non-practicing entities that prey on practicing companies) is being spread to Europe, owing in part to misguided policies and patent maximalists

  29. Debunking the EPO's Latest Marketing Nonsense From Les Échos and More on Benoît Battistelli's Nastygram to French Politician

    Our detailed remarks about French brainwash from the EPO's media partner (with Benoît Battistelli extensively quoted) and the concerns increasingly raised by French politicians, who urge for national or even continental intervention

  30. The Sun King Delusion: The Views of Techrights Are Just a Mirror of EPO Staff Unions

    Tackling some emerging spin we have seen coming from Battistelli's private letters -- spin which strives to project the views of Techrights onto staff unions and why it's very hypocritical a form of spin


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time


Recent Posts