Bonum Certa Men Certa

Guest Post: UEFI's Effects on the User

Windows 8 book



Summary: A contributor's take and set of thoughts about Microsoft's latest anti-competitive tactic

Did you know, Microsoft Press (A Division of Microsoft Corporation) has published a Windows 8 book as PDF, titled “Inside Out Windows 8”. The ultimate, in-depth reference Hundreds of timesaving solutions Supremely organized, packed with expert advice Companion eBook (744 pages 34.2 MB)



However, the one and only section (page 25) on UEFI “Secure Boot” doesn’t mention how it functions, works or operates, how to access it or any interoperability. No mention on how to even disable Secure Boot at all.

Such as the undocumented steps below;

1. Boot machine while pressing F10

2. Find Secure Boot in the menu tree, ignore warnings

3. Disable Secure Boot feature

4. Enable legacy boot options

5. Enable specific legacy devices, such as USB devices

6. Save and reboot while holding down F9

Book shot

(No mention in Chapter 27!)

I want to point out there is NO such thing as “Windows Hardware” because Microsoft does NOT manufacture Lenovo, Sony, Toshiba, Acer, Asus, MSI, VIA, HP, Dell, Celvo, Sager, etc…

This is Microsoft extending its own brand (software) upon firmware, claiming it’s their platform. Why do the manufactures accept this theft of their hardware product?

Why doesn’t someone write to the European Court of Justice and file a complaint?

Regarding how UEFI Secure Boot has the side effect of preventing interoperability against competitors and open society by preventing unauthorized firmware, operating systems, or UEFI drivers from running at boot time unless they bear a cryptographic signature by Microsoft, the manufacturer or an UEFI signing key vendor ($99 for an UEFI signing key) for any software that modifies the bootloader that enforces the UEFI secure boot protocol.

Basically, the bootloader is the place where the PC hardware reads instructions to boot up an operating system or program. Windows installs those instructions in the bootloader, just as another operating system like Linux. By making the process proprietary without full documentation, competitors are at a huge disadvantage.

Microsoft has basically inserted themselves as the UEFI gatekeeper for installing not just their software, but any software that modifies the bootloader on a potentially huge number of devices globally around the world.

The main issue with the UEFI secure protocol is that it excludes out ALL other operating systems, for the right of sharing (educational), giving (philanthropy), renting, loaning, and borrowing on other W8 PC system/s hardware to run boxed copies of Windows or Linux on Windows logo hardware, and also impossible to install new versions of Windows or Linux unless your OEM provided a new UEFI digitally signed key. A system that ships with only OEM and Microsoft keys will not boot a generic copy of Linux.

Not to mention, Windows 8 PC owners won’t be able to replace their OS with another like Windows 7, unless they obtain a digitally signed Secure Boot version for their system.

One of the few shortcomings in the UEFI model (and it is a deliberate omission because of the complexity of running a certification system) is that there’s no designated root of trust in the current version 2.3.1. for a centralized vendor-neutral signing authority to provide UEFI keys.

The Windows 8 PC you buy in 2013 will be permanently locked into Windows 8 if Microsoft gets away with their plan. Windows 8 certification does not require that the user be able to disable UEFI secure boot, and hardware vendors have reported already that on some hardware will not have this option available.

Of course, Windows 8 certification does not require that the PC system come with any keys other than Microsoft's. A system that ships with UEFI secure boot enabled and only includes Microsoft's signing keys will only securely boot Microsoft operating systems.

Think how this gives great power to Microsoft, for every manufacturer that wants to sell hardware for the Windows 8 PC, needs a UEFI digital signed key, from Microsoft!

Disabling UEFI Secure Boot is NOT offered on ARM systems like Windows 8 RT (Tablets).

The PC user using x64 or x86 systems is not guaranteed the ability to install extra signing keys in order to securely boot the operating system of their choice. The PC user is not guaranteed that their system will include the signing keys that would be required for them to swap their graphics card from another vendor, or replace their network card and still be able to netboot, or install a newer SATA controller and have it recognize their hard drive in the firmware. Of course, UEFI doesn't provide the means to generate your own UEFI keys either. Just where does that leave the PC user?

The truth is that UEFI using the Secure Boot Protocol v2.3.1 makes it more difficult to run anything other than Windows 8. UEFI secure boot is a valuable and worthwhile feature that Microsoft is misusing to gain tighter control over the market.

As it stands now Microsoft is saying OEMs don't have to do it. They just have to do it if they want to sell PCs with Windows on them.

Links:



Note: you can obtain the source PDF as Microsoft PDF ebook “Windows 8 Inside Out by Tony Northrup (Nov 23, 2012)”

Library of Congress Control Number: 2012950441

ISBN: 978-0-7356-6381-7

Amazon.com: http://www.amazon.com/Windows-Inside-Out-Tony-Northrup/dp/0735663815/ref=sr_1_1?s=books&ie=UTF8&qid=1354458846&sr=1-1&keywords=9780735663817

Comments

Recent Techrights' Posts

"Victory Day" - Part II: Abject Defeat to Hypocrites and Objectionable People Who Strangle Women Whilst on Microsoft's Payroll
Someone is going to have to pay for this; it won't be us
Rust Propaganda Now Amplified by Slopfarms Powered by Microsoft LLMs, Encouraging the Outsourcing of GNU/Linux Distros to Microsoft/GitHub/NSA (and a Shift Away From GPL/Copyleft)
Moving to Microsoft GitHub and adopting unfinished, untested code for highly critical bits
IBM is Rotting With "Zero Internal Jobs" and Many PIPs (Performance Improvement Plans) on the Way, Typically a Fast Track Towards Layoffs Without Severance
At risk of giving air(time) to tribal sentiments, the internal joke at IBM is that to IBM "AI" stands for "All Indian"
The Gerstnerisation of Microsoft: Seventh Wave of Microsoft Layoffs (Over 20,000 to be Cut) Allegedly Going to Start Shortly, Probably Start of Next Week, Microsoft Spreads Chaff and Noise Before the Big Axes Fall
we might be looking at about 50,000 people that Microsoft gets rid of this year
 
Blizzard/Microsoft Unions Grow Ahead of Mass Layoffs at Microsoft, Apparently Starting Next Week (as Many as 30,000 Workers Laid Off by Year's End)
Microsoft already fired about 5,000-6,000 workers this year by our estimates; that's not counting resignations compelled through pressure (i.e. pushed, did not jump) and contractors
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, May 09, 2025
IRC logs for Friday, May 09, 2025
Links 09/05/2025: Inflation Rising and Rights to Protest Curtailed Some More
Links for the day
Gemini Links 09/05/2025: Good and Evil, LLMs Made the Web Worse Yet Again
Links for the day
European Patent Office (EPO) Faked "Revenue Expansion" by Granting Loads of Invalid, Illegal Patents; Staff Still Wants to Know Where That Money Went
Only about 30% of the EPO's patents are for EU entities/people
Links 09/05/2025: TeleMessage Blunder, More Distractions From Impending Mass Layoffs at Microsoft
Links for the day
GNU (and the FSF) Still Changing the World
Today, in 2025, GNU powers almost everything
Military-Grade Anti-Linux Microsoft Propaganda Using Microsoft LLMs in Fake 'News' Sites (Slopfarms)
This is part of a pattern
Links 09/05/2025: Analog Computer and First time at FOSDEM
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, May 08, 2025
IRC logs for Thursday, May 08, 2025
Links 08/05/2025: Mass Layoffs at Google Again, India/Pakistan Tensions Continue to Grow, New Pope (US) Selected
Links for the day
"Victory Day" - Part I: That is the Day Microsofters Who Assault Women Pay for Their Actions in Foreign Land (Using "Guns for Hire" Who Attack Their Own Country for American Dollars)
Adding a friend from Microsoft to the docket didn't help
Rust is Starting to Seem More Like Microsoft-hosted "Digital Maoism", Not a Legitimate Effort to Improve Security
Maybe this is very innocent, but they seem to have taken a solid, stable program from a high-profile Frenchman and looked for ways to marry it with GitHub, i.e. Microsoft/NSA
Gemini Links 08/05/2025: Practical Gemini Use Case, Shutdown of the Blanket Fort Webring
Links for the day
Links 08/05/2025: "Slop Presidency", US Government Defunds Public Broadcasting
Links for the day
Lasse Fister, Organiser of Libre Graphics Meeting, Points Out the Code of Conduct is Likely Violated by the Same People Who Promote Codes of Conduct (and Then Bully Him Into Cancelling a Keynote)
I am starting to see Lasse Fister as another victim
LLM Slop Attacks Not Only Sites of Free Software Projects But Also Bug Reporting Systems (Time-wasting, in Effect "DDoS")
Microsoft, the leading purveyor and promoter of slop, is a cancer
The Richard Stallman (RMS) "European Tour" Carries on In Spite of the Nuremberg Incident
Some people spoke about how they saw yesterday's talk
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Wednesday, May 07, 2025
IRC logs for Wednesday, May 07, 2025