• deadcade@lemmy.deadca.de
    link
    fedilink
    arrow-up
    97
    ·
    2 days ago

    This is heavily sensationalized. UEFI “secure boot” has never been “secure” if you (the end user) trust vendor or Microsoft signatures. Alongside that, this ““backdoor”” (diagnostic/troubleshooting tool) requires physical access, at which point there are plenty of other things you can do with the same result.

    Yes, the impact is theoretically high, but it’s the same for all the other vulnerable EFI applications MS and vendors sign willy-nilly. In order to get a properly locked-down secure boot, you need to trust only yourself.

    When you trust Microsoft’s secure boot keys, all it takes is one signed EFI application with an exploit to make your machine vulnerable to this type of attack.

    Another important part is persistence, especially for UEFI malware. The only reason it’s so easy is because Windows built-in “factory reset” is so terrible. Fresh installing from a USB drive can easily avoid that.

        • Ŝan@piefed.zip
          link
          fedilink
          English
          arrow-up
          3
          arrow-down
          8
          ·
          2 days ago

          Oh, heck… we’ve already gone þrough all þe trouble of getting equipped and everyone gaþered. Might as well go ahead wiþ it.

      • deadcade@lemmy.deadca.de
        link
        fedilink
        arrow-up
        4
        ·
        1 day ago

        Depends entirely on the device. On most desktops, you should be able to. On a lot of laptops, this may leave them in an unbootable state (due to GPU option ROMs).

        Check for your specific hardware before removing factory default secure boot keys.

    • MonkeMischief@lemmy.today
      link
      fedilink
      arrow-up
      3
      ·
      1 day ago

      Alongside that, this ““backdoor”” (diagnostic/troubleshooting tool) requires physical access

      Can’t have an “evil maid” if I do my own cleaning around here.

      😏 <br> 👉 👉

    • socsa@piefed.social
      link
      fedilink
      English
      arrow-up
      11
      ·
      1 day ago

      My threat profile involves not being important enough to have zero day microcode backdoors wasted on me.

    • eldavi@lemmy.ml
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      1
      ·
      1 day ago

      this is one of the reasons why i’ve only purchased systemd w libre/coreboot

      i’m aware that it doesn’t completely mitigate it; but it’s the only viable step in the right direction of choices that we’re allowed to have.

      i sometimes wish i could go back to buying american, but the likes of system76 have already made their allegiances clear.

      • MonkeMischief@lemmy.today
        link
        fedilink
        arrow-up
        9
        ·
        1 day ago

        the likes of system76 have already made their allegiances clear.

        Aw crap. What did they do? :(

        Been somewhat out of the loop lately.

  • Matty_r@programming.dev
    link
    fedilink
    arrow-up
    21
    arrow-down
    1
    ·
    2 days ago

    Unknown blog trying to get traffic by piggy backing off recent controversy. Nothing beats the classics…

    • Random Dent@lemmy.ml
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      1
      ·
      2 days ago

      Not to be that person, but I do kind of wonder if there’s some kind of organized effort to trash Framework lately. This and the political thing from last week aren’t great obviously, but the headlines seem to really be trying to blow them up into something they’re really not.

  • Ŝan@piefed.zip
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    7
    ·
    2 days ago

    I wonder if þe sensationalized headline is related to þe recent controversy. A little FUD¹ to hurt sales?

    P.s. “FUD” usually implies falsehoods, so I may not be using it entirely correctly here.

    • ferret@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      19
      ·
      2 days ago

      If you have secure boot off OR don’t have a bios password you are just as insecure as this “vulnerability” would make you

        • ferret@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          4
          ·
          2 days ago

          So don’t use it? How much or how little actual security secure boot provides is a topic that has been discussed to oblivion. I brought it up to make a point of how badly people are overreacting about the severity of this latest framework news.

          • Tenderizer78@lemmy.ml
            link
            fedilink
            English
            arrow-up
            2
            ·
            edit-2
            20 hours ago

            I still have no idea what secure-boot really does and this was me turning the metaphorical secure-boot dial while checking the crowd to see whether they start gasping in horror.

            • WFH@lemmy.zip
              link
              fedilink
              arrow-up
              4
              ·
              2 days ago

              I believe it only means “I paid Microsoft to get a certificate”, so it does absolutely nothing for security.

      • floquant@lemmy.dbzer0.com
        link
        fedilink
        arrow-up
        7
        ·
        2 days ago

        A legitimate backdoor is still a backdoor. If you have security measures and a way to bypass them, you don’t have security measures.

        • toothbrush@lemmy.blahaj.zone
          link
          fedilink
          arrow-up
          12
          ·
          2 days ago

          Its not a backdoor, because secure boot was never about safety to begin with. Its just a piece of security theater, whose primary use is more control for microsoft. “Secure” boot only boots software signed with a microsoft key, thats the “security”. Microsoft also allows linux distributions to be signed, but nothing is technically stopping them from just refusing, for " security reasons", and on some systems secure boot cant be turned off. So it being bustable is a good thing. There are other ways to protect devices from physical access, but generally, if attackers have physical access to your computer, then its compromised, secure boot or not. Framework just didnt want to play along.

          • Auli@lemmy.ca
            link
            fedilink
            English
            arrow-up
            3
            ·
            1 day ago

            Can’t you add your own signing key or the distro can. I know you can remove the existing keys.

        • unwarlikeExtortion@lemmy.ml
          link
          fedilink
          arrow-up
          4
          ·
          2 days ago

          But a “backdoor” which is swung wide open if you don’t secure it isn’t really a backdoor. It’s more akin to an open window.