by foodstances on 1/9/22, 2:06 AM with 204 comments
by dane-pgp on 1/9/22, 2:33 AM
The difference now is that Microsoft are saying they will only support machines which have these TPMs, and therefore they can credibly argue in a few years that the only secure PCs (and thus the only PCs that ISPs should allow online) are ones which can produce a remote attestation to prove they are running the latest OS updates (from an OS vendor that is approved by the government).
> If Microsoft wanted to prevent users from being able to run arbitrary applications, they could just ship an update to Windows that enforced signing requirements.
The trap hasn't been sprung yet, but those are the teeth, yes. Then say goodbye to Tor, E2E encrypted messengers, unapproved VPN apps, and bittorrent clients that don't check a Content ID database.
by userbinator on 1/9/22, 4:11 AM
This is merely another battle in the war on general-purpose computing.
They will build their kingdom piece-by-piece, and under innocuous-sounding adjectives such as "safety" and "security".
Each of these pieces may look innocuous and perhaps even helpful, but don't lose sight of their ultimate goal.
Once all the pieces are in place to achieve total lockdown, there will be no going back.
Articles like this that say "it hasn't happened yet" and try to spin a positive narrative are not showing the big picture. Arguably, Big Tech does not want you to see the big picture.
by no_time on 1/9/22, 11:28 AM
[0]: https://www.eff.org/wp/trusted-computing-promise-and-risk
by messe on 1/9/22, 3:37 AM
I predict that this will blow over, and won't be a big deal in a few years time once FOSS drivers for what is effectively just a new breed of TPM are released.
If in five years, it turns out I was wrong, I'll eat my hat. Although defining "my hat" by then might be difficult, as it'll probably be subscription based.
by transpute on 1/9/22, 3:14 AM
1. Xbox Security, https://www.platformsecuritysummit.com/2019/speaker/chen/
2. Azure Sphere (derived from Xbox) with Microsoft Linux kernel, OE/Yocto runtime and QEMU emulation of Pluton for CI/CD, https://www.platformsecuritysummit.com/2019/speaker/seay/
3. DMTF SPDM (PCI device firmware attestation to SoC/RoT), https://www.platformsecuritysummit.com/2019/speaker/plank/
Nov 2020 Intel announcement about Pluton, https://itpeernetwork.intel.com/intel-and-microsoft-plan-to-...
> Secure platforms anchor on a hardware Root of Trust as the foundation. Given Intel’s diverse ecosystem, our vision is to offer multiple Root of Trust options that ensure isolation of resources, keys and security assets. The partnership with Microsoft to offer Pluton will further broaden the choices available to our mutual customers.
Hopefully a future Intel SoC will include an optional FPGA-based RoT where customer hardware owners can load the open-source firmware of their choice.
Edit: Pluton will be included in upcoming Arm laptops with SoCs from the Qualcomm-Nuvia (former Apple M1) team.
by marcodiego on 1/9/22, 3:31 AM
by rackjack on 1/9/22, 3:27 AM
- Microsoft is fucking us over that hard
- Libre software FTW
- Libre software UX sucks
- Repeat
When will the cycle end?
by saxonww on 1/9/22, 4:34 AM
The main thing that comes to mind for me is that since this is integrated into the CPU itself, now 'things' can be strongly and directly tied to the CPU instead of a separate TPM or some collection of hardware identifiers. Was this already possible on x86? My mind immediately went to "this will be used for tighter DRM"; I feel like content owners would like this a whole lot.
by grawprog on 1/9/22, 3:39 AM
I'm so unbelievably sick of this 'security by corporation, it's what's best for you so accept it bullshit.' I really am.
No I don't want proprietary internet enabled hardware on my PC monitoring my software, no it does not make me feel safe and secure, actually, go fuck yourself and whatever marketing bullshit you spew to make this desirable for consumers. I'm honestly so fucking done with this kind of shit.
by AshamedCaptain on 1/9/22, 11:37 AM
by encryptluks2 on 1/9/22, 4:30 AM
by deknos on 1/9/22, 9:10 AM
it is not CURRENTLY a threat, but it builds up to be a threat in the future if we do not stop and/or constrain it.
by IYasha on 1/9/22, 2:16 PM
( fine print: we haven't switched the electricity on yet)
edit: asterisks are somehow omitted
by akagusu on 1/9/22, 4:12 PM
If Microsoft says Windows will only support has with this tech enabled, and since almost every computer on the planet runs Windows, vendors must adopt this tech or go out of the market.
In other words, Microsoft is positioning itself to say to all market players to play by its rules or go out of business.
This is a perfect way to establish control over the market without establish itself as a monopoly, thus not attracting attention from regulators.
by shmerl on 1/9/22, 4:02 AM
This seems to be the biggest issue - hardware locked into requiring Windows to be up to date.
MS can of course ship firmware that's independent of the OS, but knowing MS - they probably won't.
by ece on 1/10/22, 11:43 PM
The thorniest question I think is around TEEs. You either trust ME/PSP/mobile TEEs for their explicitly mentioned uses (fTPM, SVM, Remote attestation..) or you think they should be even more sandboxed or perhaps shouldn't exist at all. I'm all for the middle ground/option here where the user is in control, thought others may disagree. Remote attestation could be a case where the user is losing control, so preserving user control there is important.
by toastal on 1/9/22, 2:03 PM
I don't like the edit at the bottom where the author's like: oh yea, of course this could be a massive issue against FOSS but we should just assume that vendors will think it's impractical. I've seen how banks react to rooted phones, even when rooted to heighten device security--and I've switched banks before because of it. They don't care.
by fartcannon on 1/9/22, 3:33 AM
by flubflub on 1/9/22, 1:17 PM
They ameliorate a lot of low entropy problems for passwords and can improve security. I can't imagine a proprietary one being mandatory. My banking app uses the mentioned remote attestation so I can't use it on my less-Googled Calyx ROM. I just think that's stupid instead of very strong warnings.
by paavoova on 1/9/22, 4:28 AM
by hansjorg on 1/9/22, 10:12 AM
What about trying to secure your software without building the infrastructure for an oppressive dystopian future? Too much to ask?
by 0dayz on 1/9/22, 9:45 AM
Despite the fact I in a way do think tpm like components are a good thing.
by richardfey on 1/9/22, 8:33 PM
by Shadonototra on 1/9/22, 3:31 AM
people are either on macOS/android/iOS or chromium OS