• After 15+ years, we've made a big change: Android Forums is now Early Bird Club. Learn more here.

Microsoft gearing to stop Linux, going beyond Mac lock-in

Don't discount ARM, they are up and coming and most of the next ARM chips will have enough horsepower to be the brain on most users PC's.

And you're still missing the point. The secure boot should be required to have an unlock on all devices in which its implemented. I have nothing against the tech itself, just Microsofts implementation of it.

I'm not discounting them, and I agree.

I'm not missing the point, I disagree with it. I want the option on my future devices, but why should it be required?

Indeed, UEFI can be used in secure or unsecured mode and what I have read ensures standards when the options are available.

I have read no where that the option MUST be offered and I know from experience how these things can go awry. Couple this with the fact that according to one article, Microsoft is referring to unsecured as custom mode and I become quite a bit more uncomfortable. Custom, in the personal computer commercial lexicon, has a way of always meaning more expensive.

Link me to facts showing my error, and I'll stand down as sincerely, gratefully, corrected.

And speaking of implementation, the HP article I linked seems to explain the architecture in a clear and unbiased fashion.

It raises a simple question.

Why can't this security layer be implemented in software and stored on the hard disk?

In fact, it could. It could be placed on a read only, encrypted partition that bootstraps itself with sufficient encrypted key and encrypted function process returns that it could not be spoofed and would force shutdown if compromised. Said partition could then be re-installed from an optical install disk if compromised, the system booted into a restricted mode to allow sanitation and the rootkit problem would be a thing of the past.

All of this could be accomplished by the same brainpower that thought up the firmware scheme. And this isn't science fiction, it's a known technology. I have personally worked on an industrial software stack with a site license costing between US$1 AND 2 million, and that license system was protected with similar means.

So, this is why I have formed a personal opinion that the sales pitch on this approach being the only way and being primarily for rootkits is Kool Aide.

As for mobile devices, sorry. Were they to implement this on desktops as I suggest and then on mobile platforms as they plan, saying, apologies, no disk, must lock firmware, then I would be OK with that. Plenty of people buy locked Androids knowing that the vendors simply wanted lock-in, and what's good for the goose is good for the gander.

These are just my opinions, though. And as I indicated, I am open to all factual rebuttal. Aren't we all? :)

It says secure boot must be able to be disable by a physically present user on non-ARM systems in the very same paragraph that says it must be not be possible on ARM systems. Also, custom is a feature concerning "custom" mode, it is a feature to allow modification to the contents of the secure boot signature db's and the PK - also required for the cert on non-ARM devices.

Concerning the question "why can't it be implemented in software and stored on the hard disk"- it seems that it probably could. If you meant 'why isn't it implemented that way', I can't answer that, but increased speed, reliability, and security are the first things that come to my mind. Why would you want it to be, and how does the fact that it likely won't be make them liars about doing it for security and guilty of doing it to stop Linux?

As for the last part... I just don't understand what your problem is then. Manufacturers can and will make devices with whatever UEFI secure boot options they please. If they want their devices to be win8 hardware certified, on non-ARM devices it must be an option to disable it. Again, manufacturers can do as they wish. They are even free to make an x86 machine without the option, against the evil Microsoft's wishes.

Also don't forget, Intel is making a serious push for the mobile market, so expect many more Intel powered tablets in the future... which to be win8 hardware cert'ed must offer a means to disable secure boot in firmware setup.

Because if not, then there's evidence of truth to our side of the debate. :) ;)

?

If secure boot is not required to have the option to be disabled on all devices in which its implemented, there's evidence of truth to your side of the debate?
 
Then I'll put it this way, as some of my writing may seem obtuse -

If it can be implemented as I suggest, and speed can't be a factor for processing in ram, then why the added complexity of new chips?

This approach, if rootkits are the only concern on a PC, need never go outside Microsoft's volume.

Accepting that Microsoft has found a solution to a problem plaguing their customers, they need only work within their volume.

There's no need to require new chips, new motherboard layouts, and the added complexity to affect others, or those disinterested.

What is gained by the hardware solution over the one that I have outlined?

1. Higher hardware costs.

2. Lock in.

Certainly not increased reliability, security or speed. Nothing in the art supports those claims.

And you really believe that hardware must play a role, this could all be done on a USB dongle.
 
I'm not missing the point, I disagree with it. I want the option on my future devices, but why should it be required?
I think this stems from what seems like anti-competitive practices on Microsoft's side. Regardless of if it is the intention, this seems like it could disrupt other operating systems from being installed. It might not have been their intention to try and put Netscape and other browser developers out of business by including and integrating internet explorer, but the courts still deemed it as so.

And I think EM has a good point, this could all be settled by Microsoft on the software level, or it could be a USB device like with the newer OSes how you could backup your password to a USB so that if you forgot it it would allow you to recover it.

I think the same kind of thing (software and usb) could easily be used here on their part.
 
Higher hardware cost? In the volume they are being produced, negligible. As a fraction of the overall cost of the machine, invisible. Having it on the hard drive will almost certainly be slower. Having it on the hard drive does make it more vulnerable/insecure. A hard drive is generally less reliable, especially with the way consumers treat them. Keys living on the hard drive also makes them more vulnerable being fat fingered. But like I already said, I can't speak for them or their reasons, I don't work for them. Regardless of any of this, I hardly think a possible alternative implementation of secure boot makes them guilty of pushing secure boot to block Linux and not for security, anyway.

And reliance on a dongle to boot consumer devices is impractical.
 
Clearly, you're engaging in conjecture when I am engaging from experience and as a systems programmer.

No costs are ever invisible, nor non-existent.

As for a dongle being impractical, the computer chips you used in the machine to make your post relied on exactly that device and mechanism to test during manufacture for reliability and yield testing.

And my company provided that solution, worldwide, without ever needing a modified PC.

As for who would buy such a solution as I might propose, I think that I am hearing that some system administrator types who have to deal with CEOs who would rather surf porn and some front-line users who think Facebook is ok would find such an add-on solution economical as well as effective.

Solving the defended problem and never requiring UEFI.
 
Higher hardware cost? In the volume they are being produced, negligible. As a fraction of the overall cost of the machine, invisible. Having it on the hard drive will almost certainly be slower. Having it on the hard drive does make it more vulnerable/insecure. A hard drive is generally less reliable, especially with the way consumers treat them. Keys living on the hard drive also makes them more vulnerable being fat fingered. But like I already said, I can't speak for them or their reasons, I don't work for them. Regardless of any of this, I hardly think a possible alternative implementation of secure boot makes them guilty of pushing secure boot to block Linux and not for security, anyway.

And reliance on a dongle to boot consumer devices is impractical.
It wouldn't matter if the consumer treats the HD poorly, because if the security measure was on the HD, then it would be gone along with the OS. So, the user would have to replace the drive and either reinstall the OS or restore from a previous backup, which we can assume would be just as easy as now, because this security measure would be also backed up.

I guess I don't see how having it on the HD makes it less secure, and I don't think it would make it slower. The way I see it, it would be something like a hash of Windows files, stored in an encrypted partition (small). It would check this partition and make sure the files matched it, it wouldn't have to do this at every boot, the way I see it is it would be something like a check disk that pops up ever now and then.

It might be impractical to use a USB device at boot, but that's how the recover password feature works - so it isn't any more impractical than that.
 
Clearly, you're engaging in conjecture when I am engaging from experience and as a systems programmer.

No costs are ever invisible, nor non-existent.

As for a dongle being impractical, the computer chips you used in the machine to make your post relied on exactly that device and mechanism to test during manufacture for reliability and yield testing.

And my company provided that solution, worldwide, without ever needing a modified PC.

As for who would buy such a solution as I might propose, I think that I am hearing that some system administrator types who have to deal with CEOs who would rather surf porn and some front-line users who think Facebook is ok would find such an add-on solution economical as well as effective.

Solving the defended problem and never requiring UEFI.
Conjecture concerning what part? And where does your alleged experience as a system programer validate anything in dispute?

I have no idea how your dongle comment addresses the impracticality of requiring a usb dongle for the average consumer to boot their PC.

The desire for the technology you brought up was never questioned.

Finally, I don't believe Microsoft ever asserted the move to UEFI was to fight root kits. UEFI brings much more to the table than just secure boot.

It wouldn't matter if the consumer treats the HD poorly, because if the security measure was on the HD, then it would be gone along with the OS. So, the user would have to replace the drive and either reinstall the OS or restore from a previous backup, which we can assume would be just as easy as now, because this security measure would be also backed up.

I guess I don't see how having it on the HD makes it less secure, and I don't think it would make it slower. The way I see it, it would be something like a hash of Windows files, stored in an encrypted partition (small). It would check this partition and make sure the files matched it, it wouldn't have to do this at every boot, the way I see it is it would be something like a check disk that pops up ever now and then.

It might be impractical to use a USB device at boot, but that's how the recover password feature works - so it isn't any more impractical than that.

A bad sector containing keys would almost certainly be worse (especially for the average consumer) than a bad sector anywhere the OS lives. It also is more open to accidental erasure, be it when booted to a live cd/usb, installing another OS, or what have you. Its would likely be easier for malware to access and/or tamper with. Having it on a HDD would be slower.

Your example never requires it to boot, only has it as an option should you need to recover the password.
 
Just a side note but, I believe from everything I have ever read from Anonymous, says that they stand for everything that is contrary to this type of control.;)

screw that group. I'm a supporter of internet freedom and always have been. I am not a supporter of a collection of jerks who disrupted the service of a fellow blue collar working guy for a month. Way to show 'the man' by victimizing the customers. Jerks.
 
screw that group. I'm a supporter of internet freedom and always have been. I am not a supporter of a collection of jerks who disrupted the service of a fellow blue collar working guy for a month. Way to show 'the man' by victimizing the customers. Jerks.

Victimizing? Or educating?

If it wasn't them, someone with more malicous intentions may have, and the situation could have been a lot worse.
 
Victimizing? Or educating?

If it wasn't them, someone with more malicous intentions may have, and the situation could have been a lot worse.

Rather than reply I'll let you analyze that train of thought more thoroughly for yourself.
 
Let's keep on track this is not about anonymous.

I agree with not storing on hard drives mainly because I have pulled brand new ones out that are damaged. USB dongle seems more practical
 
Sulfur -

My example did indeed require that it boot and execute.

And it's quite interesting that you believe that some bad sectors can be worse than others when occurring where the operating system is located. Or that USB hardware can't be used in a boot sequence.

And 9to5cynic was simply showing that a dongle might not be as impractical as you feel.

As a great deal of this debate has been about UEFI and rootkits, I was interested to hear that you believe it is there to provide other benefits.

Indeed -

UEFI - About UEFI

But then again -

Microsoft takes aim at rootkits, misses - Hardware - Technology - News - iTnews.com.au

On the other hand -

Windows Secure Boot to abolish rootkits ...duh

And while it was entertaining to read that the reason the Linux community hates this is because they want people to get rootkits, the Linux community, practical as ever, is concerned that -

UEFI and "secure boot" [LWN.net]

in addition to it being buggy. I think I'll leave others to worry that Apple is also on board UEFI.

But I digress. You were about to explain that aside from the mighty rootkit-slaying feature of secure mode, UEFI offers so much more than secure boot. What would that be? Anything from this?

UEFI - UEFI Learning Center
 
Rather than reply I'll let you analyze that train of thought more thoroughly for yourself.

< archiving for later use > ;)

Anyway, not to wax philosophical, but I don't see much difference between what Microsoft is doing now, wrt this debated issue, and what they were doing early on: tie in their software to user's needs in such a way as to influence the needs themselves and not only drive off competition but also fight off alternatives to their product.

They re-created the computer industry, without ever manufacturing a computer, in a similar fashion as the oil companies have created an industry/need over time, and done everything in their monetary power to negate other forms of fuel for automobiles.
 
I think this stems from what seems like anti-competitive practices on Microsoft's side. Regardless of if it is the intention, this seems like it could disrupt other operating systems from being installed. It might not have been their intention to try and put Netscape and other browser developers out of business by including and integrating internet explorer, but the courts still deemed it as so.

And I think EM has a good point, this could all be settled by Microsoft on the software level, or it could be a USB device like with the newer OSes how you could backup your password to a USB so that if you forgot it it would allow you to recover it.

I think the same kind of thing (software and usb) could easily be used here on their part.

The software/usb thing doesn't work because it introduces the possibility of user error. HP already has similar functionality built in to some of their laptops where you can encrypt the entire hard drive and back the encryption key up to a thumb drive. We've had at least one user forget the password and lose the thumb drive simultaneously. You get users involved in the process and they WILL screw it up and they WILL blame you for their screw up.
 
Microsoft is working in their enlightened self interests to ensure adoption of Windows 8, without regression, and protecting people from those nasty rootkits named Windows XP and Ubuntu.

That is exactly the outlook from MS that is driving me to Ubuntu.

I'm also keeping my OFFLINE xp drive and machine. Specialty software.

Some special software is so far behind the curve, that you won't be able to run it on 8 for at least a year and maybe more after getting W8. I just saw some crafting software that only supports XP and Vista.
On 7 you would have to buy the professional version to run as either XP or Vista. Extra $ for MS
 
Clearly, you're engaging in conjecture when I am engaging from experience and as a systems programmer.

No costs are ever invisible, nor non-existent.

As for a dongle being impractical, the computer chips you used in the machine to make your post relied on exactly that device and mechanism to test during manufacture for reliability and yield testing.

And my company provided that solution, worldwide, without ever needing a modified PC.

As for who would buy such a solution as I might propose, I think that I am hearing that some system administrator types who have to deal with CEOs who would rather surf porn and some front-line users who think Facebook is ok would find such an add-on solution economical as well as effective.

Solving the defended problem and never requiring UEFI.

Just speaking for myself, I'd rather have thin clients and a terminal server than everyone having a bootable thumb drive. Idiot users will lose/misplace their thumb drives. Thin clients are typically so dumb nothing can go wrong with them. On a terminal server I can easily monitor what everyone is doing and if they screw up their session you blow up their profile and they start from scratch. I only have to worry about encrypting/securing one computer. The user doesn't have enough access rights to infect the terminal server with a root kit.
 
The software/usb thing doesn't work because it introduces the possibility of user error. HP already has similar functionality built in to some of their laptops where you can encrypt the entire hard drive and back the encryption key up to a thumb drive. We've had at least one user forget the password and lose the thumb drive simultaneously. You get users involved in the process and they WILL screw it up and they WILL blame you for their screw up.

Make something idiot proof and they'll invent a bigger idiot. I agree.
 
Just speaking for myself, I'd rather have thin clients and a terminal server than everyone having a bootable thumb drive. Idiot users will lose/misplace their thumb drives. Thin clients are typically so dumb nothing can go wrong with them. On a terminal server I can easily monitor what everyone is doing and if they screw up their session you blow up their profile and they start from scratch. I only have to worry about encrypting/securing one computer. The user doesn't have enough access rights to infect the terminal server with a root kit.

The cycle of centralized vs. distributed computing.

We first turned to desktop computers because of the inefficiencies of our minis and mainframes.

Now that desktop computers rival or surpass those old minis and mainframes, the headaches of managing corporate users becomes clear and centralized computing becomes attractive.

Flexibility, reliability, convenience, and security seems to be what users want. Truly the devil's in the details.
 
The software/usb thing doesn't work because it introduces the possibility of user error. HP already has similar functionality built in to some of their laptops where you can encrypt the entire hard drive and back the encryption key up to a thumb drive. We've had at least one user forget the password and lose the thumb drive simultaneously. You get users involved in the process and they WILL screw it up and they WILL blame you for their screw up.


Smith and Wesson has a solution for that.

But seriously why could not the USB be stored in the computer. I do that when I make a disc at times and need to keep it safe Tapping it to the inside of the case.
 
The cycle of centralized vs. distributed computing.

We first turned to desktop computers because of the inefficiencies of our minis and mainframes.

Now that desktop computers rival or surpass those old minis and mainframes, the headaches of managing corporate users becomes clear and centralized computing becomes attractive.

Flexibility, reliability, convenience, and security seems to be what users want. Truly the devil's in the details.

The problem is that users don't want a centralized terminal server in most cases. They want their own computers that they can control fully. No need to rehash what problems that can cause.
 
Smith and Wesson has a solution for that.

But seriously why could not the USB be stored in the computer. I do that when I make a disc at times and need to keep it safe Tapping it to the inside of the case.

Users won't like it. Or they'll change the encryption key and it'll differ. Trust me. Users will break the system. Guaranteed. Or the IT tech will forget the drive is there. Or forget to put it there in the first place. Stupid IT guy.
 
Lma0

Maybe some of your users would be better served by Fisher Price or Vtech!

lol, yep, I can see this type of thing going through without so much of a barely heard cry of nerdrage. Why? Because your average tech consumer is going to come home from wel-mart with brand new "E-Masheen" and a Big Mac, wondering why OH why he can't get on the interweb, whilst holding a road map in one hand and his 'router' instructions in the other, yelling, "why come my internet no work? WHY COOOOME!?! IZZIS THANG BROKED!?
 
Just last week I had a user who couldn't get a cell phone repeater online. She had plugged the thing directly into the console port of the firewall could not figure out why it would not connect to the Internet.
 
Back
Top Bottom