frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Michael Truell(CEO, Cursor) on betting everything on a world beyond code

https://twitter.com/ycombinator/status/1932801405229953329
1•babushkaboi•57s ago•0 comments

Disney, Universal File First Major Studio Lawsuit Against AI Company Midjourney

https://variety.com/2025/digital/news/disney-nbcuniversal-studio-lawsuit-ai-midjourney-copyright-infringement-1236428188/
1•lastdong•1m ago•0 comments

Quantity Kills

https://iainmcgilchrist.substack.com/p/quantity-kills
1•walterbell•3m ago•0 comments

Is the 'tech bro-ification' of abortion here?

https://prismreports.org/2025/06/11/abortion-tech-repro-workers/
1•Improvement•3m ago•0 comments

The Highest Form of Culinary Reverence: Ikizukuri

https://wami-japan.com/article/2381/
1•Ch00k•8m ago•0 comments

GM's silent about-face from EV production after losing $6B

https://www.carsandhorsepower.com/news/profit-over-prophecy-how-gm-s-6-billion-income-drop-forced-its-ev-retreat
2•Anumbia•9m ago•0 comments

Text-to-LoRA: Hypernetwork that generates task-specific LLM adapters (LoRAs)

https://github.com/SakanaAI/text-to-lora
2•dvrp•9m ago•1 comments

Text-to-LoRA: Hypernetwork that generates task-specific LLM adapters (LoRAs)

https://twitter.com/SakanaAILabs/status/1932972420522230214
2•dvrp•10m ago•0 comments

EU launches EU-based, privacy-focused DNS resolution service

https://www.helpnetsecurity.com/2025/06/09/eu-launches-eu-based-privacy-focused-dns-resolution-service/
6•stanislavb•13m ago•0 comments

Darknet Market Maximalism

https://antimoonboy.com/darknetmarketmaximalism/
1•opengears•13m ago•0 comments

Navy backs right to repair after $13B carrier goes half-fed

https://www.theregister.com/2025/06/11/us_navy_repair/
3•beardyw•25m ago•0 comments

Before the far right threatened democracy, neoliberalism stripped it down

https://www.policyalternatives.ca/news-research/before-the-far-right-threatened-democracy-neoliberalism-stripped-it-down/
1•bryanrasmussen•27m ago•0 comments

The Law of the Excluded Middle

https://en.wikipedia.org/wiki/Law_of_excluded_middle
1•sans_souse•27m ago•1 comments

A Comprehensive Look at In-Ear EEG Electrodes and Their Applications

https://www.mdpi.com/1424-8220/25/11/3321
1•PaulHoule•30m ago•0 comments

Brian Wilson has passed away

https://www.bbc.com/news/articles/cg71xrxrn8go
1•rock_artist•30m ago•1 comments

Ilya Sutskever Speech: Honorary Doctor of Science from University of Toronto [video]

https://www.youtube.com/watch?v=zuZ2zaotrJs
1•znq•31m ago•0 comments

OsmAnd's Faster Offline Navigation

https://osmand.net/blog/fast-routing/
2•electricant•33m ago•1 comments

AOSP project is coming to an end

https://old.reddit.com/r/StallmanWasRight/comments/1l8rhon/aosp_project_is_coming_to_an_end/
11•kaladin-jasnah•33m ago•1 comments

The Centralization of the Internet

https://www.thepublicdiscourse.com/2021/08/77139/
4•vishnumohandas•41m ago•0 comments

Fulbright Board Resigns After Accusing Trump Aides of Political Interference

https://www.nytimes.com/2025/06/11/us/politics/fulbright-board-resign-trump.html
2•mcyc•41m ago•0 comments

Expanding Racks [video]

https://www.youtube.com/watch?v=iWknov3Xpts
26•doctoboggan•58m ago•2 comments

Lysenkoism

https://en.wikipedia.org/wiki/Lysenkoism
1•downboots•59m ago•0 comments

Ubuntu 25.10 Replaces Sudo with a Rust-Based Equivalent

https://thenewstack.io/ubuntu-25-10-replaces-sudo-with-a-rust-based-equivalent/
1•90s_dev•1h ago•1 comments

Continental divide: Smaller Western European cities are better for your health

https://www.politico.eu/article/small-western-european-cities-healthy-urban-design-index-mobility-green-space/
1•XzetaU8•1h ago•0 comments

9-figure packages for AI Researchers at Meta

https://www.axios.com/2025/06/10/meta-ai-superintelligence-zuckerberg
4•fizx•1h ago•2 comments

Concept-Centric Software Development (2023)

https://arxiv.org/abs/2304.14975
1•feifan•1h ago•0 comments

In case of emergency, break glass

https://morrick.me/archives/10048
2•microflash•1h ago•0 comments

Ubuntu 25.10 drops support for GNOME on Xorg

https://discourse.ubuntu.com/t/ubuntu-25-10-drops-support-for-gnome-on-xorg/62538
3•baobun•1h ago•0 comments

Cathemerality

https://en.wikipedia.org/wiki/Cathemerality
3•thunderbong•1h ago•0 comments

Emulating an iPhone in QEMU (Part 2)

https://eshard.com/posts/emulating-ios-14-with-qemu-part2
2•walterbell•1h ago•1 comments
Open in hackernews

Another Crack in the Chain of Trust: Uncovering (Yet Another) Secure Boot Bypass

https://www.binarly.io/blog/another-crack-in-the-chain-of-trust
120•vitplister•1d ago

Comments

db48x•1d ago
> The root cause of this bug, once again, lies in the unsafe handling of NVRAM variables.

Sheer incompetence, in other words.

candiddevmike•1d ago
This is all too common with any kind of user infantilizing security feature. Trust us bro, it's secure.
ahepp•1d ago
I'm not sure I understand why secure boot is user-infantilizing? I think there are some legitimate concerns about where attestation could be headed, but I like the ability to force my machine to only run signed executables.

It seems like the immediate problem here is that most people will never enroll their own keys, and if every vendor's crappy EFI binary gets signed by Microsoft, there will be a huge library of garbage vendor code which is all an attack surface.

AnthonyMouse•1d ago
The problem here is that the signature doesn't do anything for you.

Suppose you want to be assured of the software running on your machine. You go into the firmware, point it at your boot loader and say "only this one". It makes a hash of the boot loader and refuses to use any other one until you change the setting, which requires your firmware password. Your boot loader then only loads the operating systems you've configured, and so on.

That doesn't require any certificates and you get 100% of the benefits. The firmware needs to verify the boot loader and the boot loader the OS etc. The OS doesn't need to verify the firmware because it can't because if the firmware or boot loader was compromised then the code in the OS to validate it would be just as compromised.

The only thing the signature gets you is remote attestation, which is the evil to be prevented. Simple hashing would get you everything else.

And then you also don't get this "garbage code is nonetheless trusted" problem because there is no global root of trust and you never told your firmware to trust this random firmware update utility for somebody else's hardware.

gruez•1d ago
>Suppose you want to be assured of the software running on your machine. You go into the firmware, point it at your boot loader and say "only this one". It makes a hash of the boot loader and refuses to use any other one until you change the setting, which requires your firmware password. Your boot loader then only loads the operating systems you've configured, and so on.

What if you need to update the bootloader?

>The only thing the signature gets you is remote attestation, which is the evil to be prevented. Simple hashing would get you everything else.

TPMs can do remote attestation without signatures just fine, by measuring the hash of the bootloader. It'd be clumsy, but doable, just like your idea of using hashes for verification.

AnthonyMouse•1d ago
> What if you need to update the bootloader?

Then you boot the system from the existing bootloader, causing the booted system to be trusted to supply a new hash.

> TPMs can do remote attestation without signatures just fine, by measuring the hash of the bootloader.

If there are no private keys in the TPM from the factory then there is nothing for a third party to force you to sign the hash with, as intended.

mjg59•20h ago
How does the system know whether the new bootloader is legitimate or not?

All TPMs have private keys from the factory. They're entirely unrelated to the secure boot keys.

AnthonyMouse•12h ago
> How does the system know whether the new bootloader is legitimate or not?

However it wants to. Maybe the existing bootloader (chosen by the owner rather than the vendor) or the OS it loads has its own signature verification system for update packages, like apt-get. Maybe the OS downloads it from a trusted URL via HTTPS and relies on web PKI. Maybe it uses Kerberos authentication to get it from the organization's own update servers. Maybe it just boots an OS that allows the operator to apply any update they want from a USB stick, but only after authenticating with the OS.

None of that is the firmware's problem, all it has to do is disallow modifications to itself unless the owner has entered the firmware password or the system is booted from the owner-designated trusted bootloader.

> All TPMs have private keys from the factory. They're entirely unrelated to the secure boot keys.

The point isn't which device has the keys, it's that it shouldn't contain any from the factory. Nothing good can come of it.

mjg59•7h ago
The situation you're protecting against is one where someone who compromises the OS can make that compromise persistent by replacing the bootloader. That means you can't place any trust in any component after the bootloader, since an attacker could just fake whatever mechanism you're enforcing.

> The point isn't which device has the keys, it's that it shouldn't contain any from the factory. Nothing good can come of it.

TPMs have private keys, and are not involved in enforcing secure boot. The firmware validating the signatures only has public keys.

mschuster91•1d ago
> The problem here is that the signature doesn't do anything for you.

For your own personal machine, sure. But say you're a sysadmin in a company that has thousands of units. Suddenly, a CA infrastructure is much more appealing than having to deal with component hashes.

AnthonyMouse•1d ago
How is it any different? You install the hash of the boot loader when you issue the machine, then use the trusted system to update the hash if necessary.

Also, the concern is that the system comes from the factory with private keys the owner doesn't have access to, allowing the device to defect by informing on them to a third party. Keys installed by the owner rather than the manufacturer are fine, and then such keys also wouldn't be trusting random third party code either.

mschuster91•22h ago
> How is it any different? You install the hash of the boot loader when you issue the machine, then use the trusted system to update the hash if necessary.

With your private CA you can skip the "update the hash" part, removing a crucial step that one might forget in a hurry or that simply might go wrong because of whatever sort of bug or power outage... and brick thousands of machines as a result.

AnthonyMouse•13h ago
The "update hash" part is the counterpart to the "sign the binary" part, so if you forget to do it you're going to have problems either way. Also, this is the sort of thing that large organizations would have automated tooling to do anyway.
mjg59•20h ago
If a device is running code you control, how does it defect?
AnthonyMouse•13h ago
If you can't make it do something you don't want it to do, someone else can't pressure you to do it.
OjotCewIo•1d ago
UEFI variables or not: who in their right mind serializes raw pointer values to any kind of storage (network, disk, nvram, ...)?

Why is it that the most security-sensitive areas are ravaged by the sloppiest programmers and the most negligent managers and business types? I'd like to understand the economics and the psychology behind it.

gmueckl•1d ago
Security is competing with all other requirements that a product has. That's all there is to it.
EPWN3D•1d ago
They're not. They're ravaged by probably the same quality or slightly higher than average. The cost of mistakes is just way higher.
db48x•1d ago
It’s something about hardware companies writing software. The motherboard itself may be excellent, but the BIOS/UEFI/ACPI tables will be horrible.

Meanwhile you look at a company like Oxide that is a software company at heart, and their equivalents are so much better. Like someone actually designed it so that when humans write the software it will still be secure.

bradfa•1d ago
I have a ton of respect for what Oxide did by not using an off the shelf firmware for their Epyc chips. But unless you’re them, AMD is going to send any small customer to Insyde to buy their UEFI and AMD is not going to give you the kind of access and info that normal engineering teams would expect to get in order to implement their own firmware for Zen based Epyc chips.

Most small customers have no choice but to buy a preexisting firmware from an IBV and you get all their security bugs included. You’re lucky if you get full source code and it actually compiles. This is the state of our industry today.

wmf•1d ago
I think you could get AGESA and combine it with EDK2 yourself; it's just person-years of work.
bradfa•20h ago
Unfortunately it’s not quite that simple. Yes you can likely get AGESA but there is a whole bunch of other code you’d still have to write yourself and it’s not trivial without quite a few documents that AMD is unlikely to give you even with normal NDAs.

Now, Intel platforms you maybe have a shot at using EDK2 on, especially those with FSP. But Intel is unlikely to give you any support when something goes wrong and there’s probably no way to pay Intel to change that unless you’re a very big customer.

bcantrill•12h ago
Yes, that's all (unfortunately) correct. Part of the reason that we have been supportive of the openSIL effort[0] is to make our approach more generally attainable -- and of course we have opened our own work[1] and we will continue to be outspoken advocates for transparency at the hardware/software interface[2].

[0] https://github.com/openSIL/openSIL

[1] https://github.com/oxidecomputer/illumos-gate

[2] https://rfd.shared.oxide.computer/rfd/0552

neilv•1d ago
> It’s something about hardware companies writing software.

I've seen enough examples of that, to suspect there's some truth to it, and wonder why that is...

Speculation:

* Systems programming is hard, and systems programmers who are familiar enough with the kind of target hardware are even more rare. A company might decide to hire a hardware engineer who can code, rather than a systems programmer software engineer who knows enough hardware.

* Hardware companies know hardware, and might have hardware engineers as execs and managers, so they probably know how to hire hardware engineers, but maybe not software engineers.

* Hardware companies respect hardware engineers, and not so much software people. You don't need all those hard math and engineering classes to be a "coder". Even their 12yo can make an app, but you usually need a team with a ton of hardware education and experience to produce a viable board or IC. ("Coding" even sounds like a tedious but straightforward clerical task.)

Other speculation, or does anyone know?

db48x•1d ago
All of that sounds very plausible to me.
privatelypublic•1d ago
Knowing several deep hardware people: they're incredibly dismissive of vulnerabilities. Direct quote (as best I can remember) "Some PhD student can figure out theoretical power attacks. They're not relevant to actual products"

Same person thinks I'm literally paranoid for splitting home, IoT, and Security cameras into separate networks... despite the cameras and dvr being the banned/recalled costco ones.

nikanj•22h ago
To be fair, many CVEs are just that
worthless-trash•21h ago
Everyone says that till they get remote rootkitted in ane exploit chain that uses a moderate rated cve.
privatelypublic•13h ago
More like: go see fusee gelee. Nvidia didn't do boundary checking on their usb DFU boot and it compromised every nintendo switch up to that date, and (i expect) got all nvidia shields' level 2 widevine keys revoked.
miki123211•20h ago
It's not a point of competition, plain and simple.

Better software doesn't sell more hardware. From those companies' point of view, what matters is hardware features to make consumers want the product, and manufacturing efficiency to make margins high. The quality of what's in the ROM is no more important than the quality of the fans, servos, DACs or what have you. As long as the parts don't break too often and are within specifications, they're good enough, no point in wasting money to make them better.

This, of course, is true until it isn't. At some point, somebody comes along who disrupts the space completely by making the software great and well integrated (or just by making it do what people have previously had to do in hardware), and traditional companies don't know how to cope.

neilv•11h ago
So it might be a mix of cost-engineering, and (consequently) not having the organizational capability to do software better on the occasions that would actually would be worthwhile?
scraptor•1d ago
When's the last time you made a motherboard purchase decision on the basis of firmware quality? Or rather, when's the last time a corporate purchasing manager got fired for buying motherboards with low quality firmware?
coderatlarge•1d ago
> When's the last time you made a motherboard purchase decision on the basis of firmware quality?

i would argue every apple macbook purchase implicitly includes this.

db48x•1d ago
At the Internet Archive we occasionally had to return big batches of hard drives because of firmware bugs. That had to have ruined someone’s day, but apparently not enough to actually level up their engineering so that it wouldn’t happen again.
FirmwareBurner•23h ago
Enterprise datacenter customers is a different kettle of fish than accounting making decisions on which fleet of laptops the rank and file get to use.

The former decision is made by engineers, the latter by bean counters.

eviks•1d ago
The economics is there is little cost to having vulns, so you don't incur the extra cost to hire/push devs to code securely?
quotemstr•19h ago
> Why is it that the most security-sensitive areas are ravaged by the sloppiest programmers and the most negligent managers and business types?

Lemon market: https://www.sfu.ca/~wainwrig/Econ400/akerlof.pdf

Buyers can't distinguish good work from bad, so they pay only average price and thereby drive out the high-quality sellers.

getcrunk•1d ago
Yea but when things like this keep happening … it becomes a pattern. A very convenient one at that.
baxtr•1d ago
> Because the attacker’s code executes before the operating system even loads, it opens the door for attackers to install bootkits and undermine OS-level security defenses.

Excellent.

fsflover•1d ago
Fortunately there's a FLOSS alternative: TPM with Heads, https://osresearch.net/. Works for me.
1oooqooq•1d ago
why not secure boot with your own keys?

... granted, effectively removing Microsoft keys is a pain on some consumer devices, but still easier than this

dietr1ch•1d ago
My first encounter with UEFI turned out to be quite expensive because UEFI was way too new and easy to brick. I guess things are better now, but toying around with this might still be a risk not worth taking as a consumer.
hulitu•1d ago
> I guess things are better now,

A bit. But compared to BIOS is still crap. The main advantage of UEFI over BIOS is that it offers RCE. /s

worthless-trash•21h ago
Do most UEFI allow for the "R" in RCE?
getcrunk•1d ago
What hardware do you use the most recent supported seems like the Librem offerings. Which are intel 10th gen. Otherwise it’s gets pretty ancient
fsflover•21h ago
Indeed I'm using a Librem laptop with Pureboot. Librem 14v1 has been discontinued, Purism is developing the second version, hopefully with a newer CPU.
jerhewet•1d ago
Please ... just give me back my BIOS.
gruez•1d ago
BIOS isn't magically secure either. It has no secureboot so it just runs whatever.
Lammy•1d ago
I refuse to endorse any mindset where my Personal Computer unquestionably running my code could be considered a bad thing.
gruez•1d ago
You're conflating UEFI with secureboot. Moreover all the secureboot implementations I've seen allow you to either disable it or enroll your own keys.
Lammy•1d ago
> all the secureboot implementations I've seen allow you to either disable it or enroll your own keys

Here you go — now you have. Thank ${DEITY} for exploits!

https://wiki.ubuntu.com/ARM/SurfaceRT#Secure_Boot

https://openrt.gitbook.io/open-surfacert/common/boot-sequenc...

hulitu•1d ago
secureboot also runs "whatever". It is just picky about which "whatever" it runs (hint: it runs the "whatever" for which Microsoft has the keys).
lmm•23h ago
In theory, sure. In practice I'd bet UEFI-based systems are easier to compromise, because the attack surface is just so much larger.
adrian_b•21h ago
Nevertheless, it is trivial to make any BIOS-based computer at least as secure as the most secure UEFI/secureboot-based computers.

For that, any SSDs/HDDs included in the computer should be non-bootable and fully-encrypted.

Then the BIOS will happily run whatever an intruder will attempt to run, but nonetheless the intruder will not have any access, neither for reading nor for writing, to the data hosted by the computer.

The owner can boot from a removable USB memory, used as a computer key, whose content cannot be modified by someone else as long as the owner keeps it.

All Intel/AMD CPUs have backdoors in the form of the System Management Mode and of various hardware management engines, which can be exploited by a malicious BIOS or UEFI firmware to monitor what the operating system that is controlled by the user does, but SecureBoot also offers no protection against such backdoors. ARM CPUs are no better, because many of them have copied Intel, so they have the equivalent of the SMM: EL3.

If you run yourself a hostile application after booting, then SecureBoot also does not offer any protection against that.

JCattheATM•11h ago
> Nevertheless, it is trivial to make any BIOS-based computer at least as secure as the most secure UEFI/secureboot-based computers.

Mmm....no.

I use my own keys and removed vendors keys from my secureboot setup. Hard disk is encrypted and automatically pulls keys from the TPM to boot into a guest OS, which is running something akin to prey. If the hard drive is removed, it can't be read or examined, and you can't replace the HDD with a different OS to get it to boot.

How would you recreate that setup with just a BIOS?

jrm4•1d ago
I still genuinely struggle to understand the advantage of UEFI/Secureboot whatever over BIOS.

I own a piece of hardware, so I can do what I want to it. Out there, there is software, which I have to figure out how I'm going to trust, whether it's e.g Windows and I'm trusting that whole way of doing things, or Linux and that other whole way of doing things.

JCattheATM•1d ago
> I still genuinely struggle to understand the advantage of UEFI/Secureboot whatever over BIOS.

Apart from way nicer boot menus and bootloader setup?

In a security context, it prevents a whole host of attacks, it's clearly an advantage and a much needed progression.

> Out there, there is software, which I have to figure out how I'm going to trust,

Yes, and with secureboot, if you guess wrong, that malicious software can do less damage than it otherwise could.

necovek•1d ago
It's mostly about your UEFI firmware coming with a set of trusted CAs to verify bootloader is built by one of the trusted parties like Microsoft or Canonical or Redhat or...

You can turn it off, or make it into trust-once and sign your own bootloader, and avoid the risk of bootkit getting installed ever, except with exploits like these.

c0l0•22h ago
It would be fine it were only that. The actual problem is that software vendors can and do use Secure Boot to also check if you, the machine's owner, "decided" to "trust" this set of special CAs - and if you did not (and limited your freedom to execute any code you want in any way you want it on your machine in doing so), make the software you bought/licensed from them - or any other software you would like to run on top of these vendors' platforms - refuse to work on your machine.
mjg59•22h ago
Which vendors?
tom1337•22h ago
As example, FaceIT Anti Cheat only works if Secure Boot is enabled. I guess their argument is that they can ensure you only boot genuine Windows and thus they can better check if you've tampered with anything.
mjg59•21h ago
I've found no evidence that it checks the set of trusted certs, only that secure boot is enabled (which is trivial to fake).
tom1337•18h ago
well then thats on me and i misunderstood. I thought that with secure boot enabled a tampered operating would not boot and therefore the anti cheat can expect that if secure boot is enabled the os is legit. but yea if secure boot enrollment can be faked then my point doesn't stand anymore.
Y_Y•19h ago
https://www.theguardian.com/technology/blog/2006/jul/14/wind...

I see Microsoft's malicious erosion of the meaning of "genuine" is going well.

c0l0•21h ago
Microsoft, with Windows 11. No, the "LabConfig" bs does not count.
mjg59•21h ago
Where does Windows 11 check the set of trusted certificates?
josefx•20h ago
Unless the software vendor requires it to be locked down hard. Microsofts certification requirements for ARM devices back in 2012 explicitly required secure boot and prohibited custom certificates.
FirmwareBurner•23h ago
>I own a piece of hardware, so I can do what I want to it.

It's not a feature for you, it's for enterprise/corporations. You might be the user of the PC, but your employer owns it, and they want it as locked down as possible both from you and from other potential bad actors.

autoexec•19h ago
Then why force it into consumer hardware? If it were only available on enterprise servers nobody would care.
FirmwareBurner•18h ago
>Then why force it into consumer hardware?

It's not forced. You can disable secure boot and all that in BIOS.

autoexec•13h ago
TPM has to be there. If you have a machine that doesn't support a high enough version your OS vendor will refuse to give you any support and if you have secure boot disabled the software you try to run might refuse to work. Today, you can disable secure boot and have a degraded experience, tomorrow, who knows?

If this really were all only for enterprise users things like https://old.reddit.com/r/ValorantTechSupport/comments/1g4rkh... wouldn't be an issue but that isn't reality.

FirmwareBurner•12h ago
Then buy a machine without TPM. Or buy games that don't require TPM.

Of course online multiplayer games are gonna have more stringent device security requirements to try to deter cheaters on the PC platforms. Companies aren't gonna mass produce new HW and SW customized to your own individual desires just because you want something else than the masses of consumers don't care about.

Vote with your wallet if TPM bothers you. Otherwise I don't see what your argument stands on.

lmm•23h ago
Theoretically you hook up your whole disk encryption to your secureboot and it protects you against "evil maid" attacks. But yeah I'm pretty sure in practice it's about making it harder to install Linux or watch imported Blurays.
HPsquared•21h ago
With laptops, unauthorized physical access happens a lot more often. People lose them, they get stolen, etc.
Y_Y•20h ago
Presumably drive encryption is necessary anyway to protect lost/stolen devices, and at that point modifying the bootloader won't be useful.

I see the value when the attacker manages to modify the device without the user knowing, and causes them to unknowingly use an attacker-controlled OS, but that's a vastly different threat model.

HPsquared•19h ago
Some kind of secure enclave is necessary to prevent brute force attacks. Allows simple PIN unlock for users.
lmm•18h ago
> Some kind of secure enclave is necessary to prevent brute force attacks.

Eh maybe, what's the realistic threat model here? 99.9% of the time someone stealing a laptop isn't going to know or care what's on it, they'll just wipe it and sell the hardware. And in the rare case where you're seriously concerned about a competitor or spy making a targeted attack, you'll have a password policy where you're not using something bruteforceable.

Y_Y•17h ago
I'd argue that it's neither necessary nor sufficient for securing your data. (Convenience is another worthwhile consideration, of course.)

Cryptography should be enough to protect you from brute force, if you care about such things. I don't think it would be controversial to say that it's much more likely your particular secure enclave is broken than your encryption scheme (assuming you choose something appropriate and you're not on the NSA's radar).

HPsquared•15h ago
It's just really convenient to key in a 6-digit PIN.
miki123211•20h ago
I suspect the actual reason is a lot more banal, it's enterprises asking for it.

People who own fleets of devices and need to keep them secure don't care about homegrown Linux distributions, they want to minimize the fallout from that one employee installing the "FlashPlayer update" again. Those are the people driving the concerns of Microsoft and computer vendors.

lmm•18h ago
> People who own fleets of devices and need to keep them secure don't care about homegrown Linux distributions, they want to minimize the fallout from that one employee installing the "FlashPlayer update" again.

How does secure boot help with that? Those kind of users aren't going to be pulling the CMOS battery to reset the BIOS password.

mjg59•21h ago
You should be able to do what you want to it. You should also be able to configure it such that only you can do what you want to it, and nobody else can.

Secure Boot protects against boot kits, malware that replaces the bootloader and backdoors the OS as it boots and before any other security protections kick in. Real world bootkits have been found in the wild, and we've even seen them use vulnerabilities in signed (now revoked) bootloaders, so we know secure boot has forced their developers to work harder. You may not be worried about that as a risk (well, until you are) but there are real people who this has genuinely protected.

Is it worth it by default? Completely reasonable separate discussion to have. But is there a reason it exists? Absolutely.

heavyset_go•20h ago
Stick a BIOS password on your machine and turn on Secure Boot.

Unless there's an exploit in your firmware, you are now secure against petty criminals stealing your data to even somewhat sophisticated attacks from non-state actors via data exfiltration, software keyloggers, etc.

You can go another step further and use Secure Boot in a chain of trust up to the kernel with Linux, ensuring everything up to the kernel from boot isn't tampered.

Secure Boot isn't about protecting yourself from the OS or software, it's about establishing a chain of trust from the boot process up so you are running the system you intend to run.

This comment assumes you're using disk encryption on top of Secure Boot. When doing FDE, unless your firmware supports it, part of the boot process must be unencrypted to spin up encrypted disk access, and to protect that process, you can sign the unencrypted software to ensure its authenticity despite lack of encryption.

fsflover•19h ago
> you are now secure against petty criminals stealing your data

Ordinary disk encryption would protect me too here, wouldn't it?

npteljes•19h ago
I believe not. Even with full disk encryption, you need an unencrypted bootloader after uefi to decrypt the disk.

https://security.stackexchange.com/questions/267222/full-dis...

So, there are two scenarios here.

First, PC with FDE + normal boot gets stolen. The attacker cannot get the data without the password, so it's safe.

Second, unattended FDE + normal boot PC gets tampered with. Attacker manipulates the bootloader. Unsuspecting user later boots the tampered PC, unlocks the FDE, gets owned.

fsflover•18h ago
The second case requires a professional, dedicated attacker. I use TPM with Heads and a hardware key to protect myself against it. It will notify me if the boot partition or BIOS are tampered with.

As an advantage, all relevant code running on my computer is FLOSS and auditable, unlike the Secure Boot and UEFI.

npteljes•17h ago
That's a cool setup! I didn't know about Heads.

And yes, getting back to the original topic, I believe that against petty criminals, even a full disk encryption is plenty defense. They won't go about installing anything to the EFI partition just to get to the data.

This Coreboot + Heads setup I'd trust to protect against even the more involved.

heavyset_go•14h ago
Unless your BIOS/UEFI supports full disk encryption unlocking of hardware-encrypted Opal drives, you will always have an unencrypted bootstrap process at early boot from the disk.

That unencrypted bootstrap process can be modified by anyone with access to the disk, physical or remote. Theoretically, someone can inject a keylogger into the process and exfiltrate your encryption key's password, or a process that waits until you're decrypted and exfiltrates your data. It's also a potential vector for ransomware, root/boot kits, etc.

fsflover•14h ago
https://news.ycombinator.com/item?id=44246281
JCattheATM•11h ago
What you've described in that comment is just kind of reinventing the wheel. You're solving the same problem a different way, in a way that has slightly more complexity than just using UEFI and secureboot.
fsflover•10h ago
The main difference is that the user owns the root of trust and doesn't have to blindly trust a (buggy) proprietary software from a commercial company. Also, the community review.
JCattheATM•10h ago
You could still have that with UEFI though.
fsflover•8h ago
But not with Secure Boot AFAIK.
JCattheATM•7h ago
Well, yeah, you could, that was the point of my comment.

Coreboot supports secure boot, so why isn't that sufficient?

fsflover•7h ago
Secure Boot is closed and not auditable.
JCattheATM•7h ago
Not so, the reference implementation is open source and incorporated into Coreboot, for a long time now.
heavyset_go•2h ago
Ah, I thought you were replying to the full quote
RiverCrochet•15h ago
If an attacker gains root privileges on your system, an attacker can modify the bootloader on your boot device to load a different kernel than the one you have installed, possibly one that the attacker uploaded that may have backdoors, etc.

Secure boot requires that the bootloader match a hash derived from a TPM-stored key.

Of course, you get the same protection (and update hassle) by storing the bootloader in something that can't be written except when you specifically enable it.

A better scheme than the UEFI secure boot/TPM junk is simply a 2GB SD card (enough to hold a bootloader, kernel, and initrd) in an SD card reader with a physical read/write switch. When it's time to update your bootloader or kernel, flip the switch to write mode, then flip it back - heck the system could even refuse to boot if write mode was enabled on boot.

Honestly I don't know why the whole PC firmware shouldn't be on that SD card. Corrupt unbootable BIOSes can be fixed with a new SD card.

For remote updates, the physical switch could be replaced with a GPIO pin and a Raspberry Pi that you connect to and log into separately. It's less secure than the physical switch but oodles more secure than what's there now - maybe not oodles but at least the software on a Pi is much higher quality than UEFI vendors.

xinayder•15h ago
If an attacker has root privileges to my Linux system, what's stopping them from overwriting my Linux kernel image in my boot partition with one that has backdoors?
mjg59•14h ago
Secure boot.
xinayder•14h ago
How is secure boot stopping them from overwriting my kernel image on the first place? Won't it just report that the kernel image was tampered and thus you cannot boot to the system?

It does nothing to prevent overwriting the kernel image.

hollerith•14h ago
If secure boot is operating as designed, the boot loader will refuse to boot the replacement kernel (because its hash is not on a list).

Now if you ask, how is secure boot stopping an attacker from overwriting libc or some other important system library? the answer is nothing is stopping it on Linux, but on ChromeOS, MacOS, Windows and the two mobile OSes, the secure-boot machinery has been guarding against that for years.

mjg59•14h ago
> Secure boot requires that the bootloader match a hash derived from a TPM-stored key.

This isn't even slightly accurate. Secure boot does not rely on TPM keys on any way.

RiverCrochet•5h ago
Huh, I don't know why I thought it did. Looking into the link below briefly I see it uses a PKI scheme with CAs.

https://learn.microsoft.com/en-us/windows-hardware/manufactu...

So I guess if you provide a key for the bootloader, the firmware will sign it when it's in setup mode? I guess that private key is embedded directly in the firmware then? I presume that's made invisible once control is handed to the bootloader somehow ...

mjg59•4h ago
No, the firmware never has any private keys. You sign offline with a private key and provide the public key to the firmware. All further bootloader updates are signed with the same key and require no additional firmware configuration.
jrm4•13h ago
"If an attacker gains root privilieges.."

LOLOL lemme stop ya right there chief. I'm screwed anyway? This is ridiculous.

Nextgrid•12h ago
"BIOS vs UEFI" and Secure Boot are two different things.

UEFI supports the latter if you want and configure it, but it's not a requirement of UEFI, and technically a BIOS could also implement signature verification of the boot sector.

jeffrallen•23h ago
A fish, a gun, and a smoking barrel. Sigh.
pabs3•4h ago
I wish the hardware industry went more in the direction of the State Considered Harmful paper:

https://blog.invisiblethings.org/papers/2015/state_harmful.p... https://www.qubes-os.org/news/2017/07/08/toward-a-reasonably...