Bonum Certa Men Certa

TPM is Fake Security, Explains Cory Doctorow's Latest Article

posted by Roy Schestowitz on Jan 19, 2024

TPM

HEAD over to the latest from Cory Doctorow. Here is a portion:

As a science fiction writer, I am professionally irritated by a lot of sf movies. Not only do those writers get paid a lot more than I do, they insist on including things like "self-destruct" buttons on the bridges of their starships.

Devil

Look, I get it. When the evil empire is closing in on your flagship with its secret transdimensional technology, it's important that you keep those secrets out of the emperor's hand. An irrevocable self-destruct switch there on the bridge gets the job done! (It has to be irrevocable, otherwise the baddies'll just swarm the bridge and toggle it off).

[...]

The big idea was to stick a second computer inside your computer, a very secure little co-processor, that you couldn't access directly, let alone reprogram or interfere with. As far as this "trusted platform module" was concerned, you were the enemy. The "trust" in trusted computing was about other people being able to trust your computer, even if they didn't trust you.

So that little TPM would do all kinds of cute tricks. It could observe and produce a cryptographically signed manifest of the entire boot-chain of your computer, which was meant to be an unforgeable certificate attesting to which kind of computer you were running and what software you were running on it. That meant that programs on other computers could decide whether to talk to your computer based on whether they agreed with your choices about which code to run.

This process, called "remote attestation," is generally billed as a way to identify and block computers that have been compromised by malware, or to identify gamers who are running cheats and refuse to play with them. But inevitably it turns into a way to refuse service to computers that have privacy blockers turned on, or are running stream-ripping software, or whose owners are blocking ads: [...]

[...]

These separate, non-user-accessible, non-updateable secure systems serve a nubs of certainty, a remote fortress that observes and faithfully reports on the interior workings of your computer. This separate system can't be user-modifiable or field-updateable, because then malicious software could impersonate the user and disable the security chip.

It's true that compromised computers are a real and terrifying problem. Your computer is privy to your most intimate secrets and an attacker who can turn it against you can harm you in untold ways. But the widespread redesign of out computers to treat us as their enemies gives rise to a range of completely predictable and – I would argue – even worse harms. Building computers that treat their owners as untrusted parties is a system that works well, but fails badly.

This relates to the very same people who push "secure boot" and keep lying about its security advantages. Earlier this week yet another major UEFI security issue was discovered and/or publicised.

"Typically," Ryan has said, "when someone starts throwing those words [“Secure” and “Modern”] around to the point of abuse, I just start tuning out."

Well, "abuse" is an understatement.

Doctorow did not forget to mention GNU/Linux and 'secure" (not) boot:

But we keep running as hard as we can in the opposite direction, leaning harder into secure computing models built on subsystems in our computers that treat us as the threat. Take UEFI, the ubiquitous security system that observes your computer's boot process, halting it if it sees something it doesn't approve of. On the one hand, this has made installing GNU/Linux and other alternative OSes vastly harder across a wide variety of devices. This means that when a vendor end-of-lifes a gadget, no one can make an alternative OS for it, so off the landfill it goes.

It doesn't help that UEFI – and other trusted computing modules – are covered by Section 1201 of the Digital Millennium Copyright Act (DMCA), which makes it a felony to publish information that can bypass or weaken the system. The threat of a five-year prison sentence and a $500,000 fine means that UEFI and other trusted computing systems are understudied, leaving them festering with longstanding bugs:

https://pluralistic.net/2020/09/09/free-sample/#que-viva

Here's where it gets really bad. If an attacker can get inside UEFI, they can run malicious software that – by design – no program running on our computers can detect or block. That badware is running in "Ring -1" – a zone of privilege that overrides the operating system itself.

Here's the bad news: UEFI malware has already been detected in the wild:

https://securelist.com/cosmicstrand-uefi-firmware-rootkit/106973/

And here's the worst news: researchers have just identified another exploitable UEFI bug, dubbed Pixiefail: [...]

The article is long and detailed. It contains many links.

Doctorow is no stranger to this topic. For several years he has warned about what he typically dubs the "war on general-purpose computing".

Unlike the militants (like Matthew J Garrett), Doctorow is approachable and kind. He says it like it is, whereas Garrett et al lick the boots of Microsoft. They reckon it'll pay better. When called out or exposed they get all threatening and SLAPPy.

Other Recent Techrights' Posts

EFF Celebrates Microsoft Windows and Microsoft Office as "Digital Inclusion", Mocks GNU/Linux-Based ChromeOS
Yet another example/evidence that EFF has become a rotten pile of junk
 
Keeping Control Out of Dictators' Hands
When people are just "numbers"...
Links 06/10/2024: Misinformation Growing on the Web, "Hey Hi" Hype Waning for Lack of RoI
Links for the day
[Meme] Years Have Passed and EPO Management Still Isn't Obeying a Ruling From a Court Regarding Communications Between Staff
Representatives talking to their staff is "privacy violation"?
Presentations of the Staff Union of the European Patent Office in Its Headquarters Tomorrow After Work
Annual General Meeting and reports
Gemini Links 06/10/2024: SSH Keys and Hobby Game Development
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Saturday, October 05, 2024
IRC logs for Saturday, October 05, 2024
[Meme] How to Keep Granting Hundreds of Thousands of Fake Patents (Without Upsetting Anybody in Politics and Media)
This is very Kremlin-like
EPO Examiners to Adopt Resolution Condemning EPO Management for Breaking the Law in Order to Grant Many Illegal Software Patents
Europe's second-largest institution (EPO) is a law-breaking institution hiding behind the veil of "law"
[Meme] Sup, Nazi?
"Come back, one year"
Calling "Nazi" and "Right Wing" Everyone Who Does Not Agree With You (Even Leftists Whose Views on Some Issues Slightly Differ From Yours)
Oil money has become exceptionally notorious for takeover of online platforms and institutions/NGOs (using them to incite society inwards, not upwards)
EFF Losing the Plot
Like the Linux Foundation and OSI, the EFF has succumbed to corporate influence and is derailing itself (along with its original mission)
Links 05/10/2024: Patents Being Squashed, EFF Insists on Children's Access to Porn
Links for the day
Gemini Links 05/10/2024: Multitudinous Agreeable Futures and Misfin Mail
Links for the day
Links 05/10/2024: Amazon Culling 14,000 Managers, About 160 People Resign From Automattic
Links for the day
Microsoft Moles in Nerdearla, Openwashing and Whitewashing Microsoft With Its Latest Ponzi Scheme and Storytelling
Also GPL violations en masse
The Danger of Outsourcing Your Platform to Social Control Media and Getting "Information" There
Stella is probably not aware of what she has just done
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, October 04, 2024
IRC logs for Friday, October 04, 2024
Links 05/10/2024: Shift to ARM, Microsoft XBox Crisis
Links for the day
[Meme] Who to Trust on Privacy... (Not Someone Who Boasts About Breaking Into Devices Without Authorisation)
You're not even a computer scientist...
When It Comes to Encryption, The Web (as in World Wide Web) Isn't Secure and Uses Weak Ciphers About as Often as Every Day, Even in 2024
Gemini Protocol does not
The GPL Does Not Prohibit Use of Code for Death
Windows kills even more people, but in other ways
Journalism in Europe on Life Support
Assange articulated some of the ordeals he went through
[Video] Stella Assange and Thórhildur Sunna Ævarsdóttir on Protecting Journalists Who Expose Injustice
Stella (the wife) says her husband received an invitation from the committee (PACE) while he still undergoes recovery
[Video] Thórhildur Sunna Ævarsdóttir (Iceland, SOC) Explains That Julian Assange Was Punished for Exposing Crimes (Instead of the Criminals Getting Published)
Thórhildur Sunna Ævarsdóttir speaks out...
Links 04/10/2024: Health, Asia, and Censorship
Links for the day
Links 04/10/2024: Ingrid's Back and Creative Mornings
Links for the day
[Video] The Council of Europe's Parliamentary Assembly on Julian Assange
The Council of Europe's Parliamentary Assembly has voted to confirm that Julian Assange was held as a political prisoner
Links 04/10/2024: Telegram Issues Deepen, Texas Sues TikTok
Links for the day
"The Council of Europe's Parliamentary Assembly has voted to confirm that Julian Assange was held as a political prisoner."
This stuff should not have been in Twitter (X)
Intercontinental Ballistic Missiles (ICBMs) Do Not Run Windows
The projects that deal with ICBMs are extremely unlikely to involve Microsoft
"Microsoft is asking for a handout... yet again"
Just over a month after the last bailout fell through the cracks
One Step Closer to the End of Microsoft's XBox
XBox sales are down over 50% in the past year
GNU/Linux Flaring Up in ASEAN
We said we'd not post statCounter for a few months
Gemini Links 04/10/2024: Asteroid City and Retro Gaming
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, October 03, 2024
IRC logs for Thursday, October 03, 2024