Announcement

Collapse
No announcement yet.

Why You Don't See Coreboot Supported By Many Modern Intel Systems

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • #41
    Originally posted by chithanh View Post
    Unfortunately, most vendors now drink the UEFI Kool-Aid...
    Poisenous stuff that.

    UEFI on ARM
    Omg, yes, there was something. Please no.

    Originally posted by agd5f
    (in linked thread)
    The lack of a standard firmware and mechanism for device discovery is one of the reasons there aren't generic kernel images that will load on a variety arm systems.
    That may be true but I guess there are better ways to solve this than hauling UEFI on those poor devices. UEFI is way too large and thus way too prone for bugs, security issues and slowness. I never heard of totally bricked computers cause somebody had changed a variable that was even allowed to be written - before UEFI happened. Nobody but the NSA needs a whole network stack at such a low level.
    Firmware is there just to initialize HW once electricity hits it and maybe to provide some basic means of configuration to the user and then to do nothing else than say "Hello world" and load a bootloader who loads in turn an OS kernel.
    We could do this for years within a few KB, now we're wasting MBs and showing stupid fan animations in a setup program. (If they had extended explanation / help to the options it would have been worth the added memory consumption.)
    Stop TCPA, stupid software patents and corrupt politicians!

    Comment


    • #42
      Personally, I was against Chromebooks using Coreboot, but I agree that Intel Boot Guard should be able to be disabled. I suggest using a hardware jumper or similar to do so.

      Comment


      • #43
        Some of these exploits are ones WE need to root our own devices

        Originally posted by chrisb View Post
        Even then, there may be exploits in the USB controller or the USB driver stack or application stack that the USB device could exploit to root the system. The PS3 was first hacked using a custom USB device that exploited a buffer overflow in the PS3 USB driver (exploit explanation - I'd like to know how that exploit was discovered and developed without having access to the source code, or binary code, or being able to run or debug any code on the PS3...) USB bugs seem quite widespread - one group of researchers reported finding over 50 bugs in USB drivers for systems including Solaris, Chrome OS, PS3, OS X, iOS, Windows, Xbox and Linux.
        I never buy smartphones or other shit you have to use an exploit just to get root on your own device, but I am damned glad these exploits exist, because otherwise the OEMs would have complete control. If nothing had ever been jailbroken, those walled gardens would have completely taken over by now. The Internet would have gone all to apps, and our desktops and laptops would have been locked out, as browsers would not be supported by the new style walled garden "information services." When you are getting root one something you own, anything goes: buffer overflows, firmware exploits, the works. What cannot be rooted by its own user I consider to be bricked.

        Comment


        • #44
          IMO it is better to buy devices where you do not need exploits to gain what should inherently be owner's right. Those who attempting to force owners into doing something and puttings some restrictions are cheaters who trying to pretend it is ownership but its rather something like lease instead. While you have to pay full ownership pice. Needless to say it is treating customers like if they are retards (and unfortunately, many humans are dumbass enough to fail to understand these treacherous schemes).

          IMO really wrong to regain owner's rights through some cybercrime-like actions. This shows vendor does not respects customer's rights and definitely not worth of getting your money at all. Paying to such bastards indicates you're okay with such set of restrictions.
          Last edited by SystemCrasher; 11 February 2015, 08:00 PM.

          Comment


          • #45
            Originally posted by peppercats View Post
            If google made a pixel successor just as open as the original there'd be little doubt in my mind about buying it. All this talk of open laptops and the pixel always gets ignored for some reason - it's not blob free AFAIK but it's a hell of a lot closer than 99% of laptops while having great specs and guaranteed Linux support.
            Well, I'm not sure how good is Google regarding recently built chromebooks. By having a look at the arch wiki hardware specs table (https://wiki.archlinux.org/index.php...re_Comparisons) it seems that latest models are not shipping with the seabios port. I'm just a user so I probably don't fully understand but does it mean that Goggle still eventually let you add a seabios if you eventually want to (and have coding skills/time to write it)?
            Thanks

            Comment


            • #46
              Originally posted by peppercats View Post
              If google made a pixel successor just as open as the original there'd be little doubt in my mind about buying it. All this talk of open laptops and the pixel always gets ignored for some reason - it's not blob free AFAIK but it's a hell of a lot closer than 99% of laptops while having great specs and guaranteed Linux support.
              Not being a developer nor a power user I can't really fully understand the whole issue of BadUSB (but it sounds scary anyway).. so I'm surprised nobody developed a friendly interface (read GUI) for the scared masses out there able to filter new USB devices, so preventing them from being "accepted" on your computer, except of course the one indicated by the user in a sort of white list (including mouse/keyboard at start). I know it doesn't sound like a solution, I know it sounds like BS because of my ignorance on the subjectbut woudn't be a viable and necessary patch to this ugly scenario? Or usb devices don't have a unique IDs?
              I know an attacker may create a malicious device pretending to be one of our trustworthy keyboard, but I'm assuming here that the OS security tools will prevent him/her from acquiring that piece of information and also the other USB bugs would be slowly discovered.
              Thanks and sorry for my superficial understanding (and going OT, hopefully we'll creat a thread about it).
              Thanks Luke for your explanations.
              Last edited by horizonbrave; 12 February 2015, 02:04 AM.

              Comment


              • #47
                Oh yes. "Security".

                If there's one thing I've learned, it's that whenever some corporation promotes "security" as a model where the users have to be protected from themselves, it's unquestionably a load of bullshit.

                Oh but hey, let's not be too hard on poor Intel, after all they probably just don't want us disabling their NSA-approved backdoors...

                Comment


                • #48
                  Originally posted by dee. View Post
                  Oh yes. "Security".
                  [..] Oh but hey, let's not be too hard on poor Intel, after all they probably just don't want us disabling their NSA-approved backdoors...
                  Just curious, is AMD any better?
                  unfortunately their penetration in the market doesn't make them seem a good competitor.. just have a look at the best equipped chromebooks/barebone systems, all Intel based.

                  Comment


                  • #49
                    AMD is better than Intel only in that they are a bit behind in the remote control (AMT/ME) and uploading signed firmware blobs into the chipset department. But their products will approach Intel's over time in this regard.

                    Originally posted by Adarion View Post
                    That may be true but I guess there are better ways to solve this than hauling UEFI on those poor devices. UEFI is way too large and thus way too prone for bugs, security issues and slowness. I never heard of totally bricked computers cause somebody had changed a variable that was even allowed to be written - before UEFI happened.
                    I mentioned in that thread that the device tree was taken from OpenFirmware. The OFW specification is an order of magnitude smaller than the UEFI specification. OLPC uses it in both x86 and ARM systems.
                    Last edited by chithanh; 12 February 2015, 08:40 AM.

                    Comment


                    • #50
                      Originally posted by horizonbrave View Post
                      Just curious, is AMD any better?
                      unfortunately their penetration in the market doesn't make them seem a good competitor.. just have a look at the best equipped chromebooks/barebone systems, all Intel based.
                      Is not 100% clear, it looks like the PSP (Plattform security Processor), a second TPM like arm processor that comes with newer amd systems generaly is able to be used by coreboot.

                      Phoronix, Linux Hardware Reviews, Linux hardware benchmarks, Linux server benchmarks, Linux benchmarking, Desktop Linux, Linux performance, Open Source graphics, Linux How To, Ubuntu benchmarks, Ubuntu hardware, Phoronix Test Suite


                      But that could be only a first model or only server systems or something like that.At least what I found on discussion about it, it should only boot signed stuff... but this coreboot is not signed, I find no conclusive general YES or NO on this matter yet.

                      For notebooks you have not much alterantives anyway, you have your few models a few chromebooks and thinkpads and thats it... stay with it very long and lets see in 2 or more years what happend

                      Comment

                      Working...
                      X