Originally posted by Hi-Angel
View Post
Announcement
Collapse
No announcement yet.
Apple's New Hardware With The T2 Security Chip Will Currently Block Linux From Booting
Collapse
X
-
- Likes 1
-
RussianNeuroMancer talking about Dell — a company I'm working in bought a number of DELL 5767 with preinstalled Ubuntu. We found a problem, which likely persists on most DELL models: upon upgrading Ubuntu 16.04 → 18.04 graphics driver crashes after trying to log in. The reason is that they installed AMDGPU-pro, which stops building after system upgrade.
It's obviously a DELL problem, so today I tried to report, so they at least could do something with currently produced models, because a usual user wouldn't be able to figure it out. So I tried to contact them — and guess what? It's impossible! The only way to contact them is some chat, and they can only help in fixing something. They can't report anything higher their stack, and they unable to get any information about how to do it.
So, DELL got a major problem, and there's no way to even report it to them. That really sucks.
Leave a comment:
-
BTW. Rossmann has been my personal friend for many years and I think his gripe is more with the “lifestyle” or the Apple culture than the products. He is kinda dishonest about them “screwing over their customers”. Lenovo is the same way. There is no perpetual warranty because your computer costed $2000. Of course, the cheaper the product, the cheaper is to fix it. Try getting an X1 Carbon or a Samsung Galaxy repaired and see how much they quote you.
After all, if TCO was all that mattered, everyone would buy a Toyota Camry. The same way if someone drives a red mustang, he is perceived as vain and douchy. It’s not that Mustangs are bad cars.
i think this what drives most of Apple hate. The naivette that people are idiots and don’t know what TCO is and then they get stuck with expensive repairs. Apple has been making laptops for decades. I think the “sheeple” have gotten the memo that the repairs are cheaper on a PC from bestbuy.
Leave a comment:
-
Originally posted by starshipeleven View PostYes really, as UEFI + TPM + a self-encrypting drive (or a software-based disk encryption) can do the same, the only difference is that in Apple hardware they don't allow custom signing keys to be added.
Yeah right, you fanboys don't know shit. Onboard SSD isn't different from separate SSD, it's using the same hardware and same electrical interfaces, and all controllers in the universe have a "reset" pin.
I'm serious here, you can mess with the SSD controller all you want, but you're not getting any cleartext out or encryption keys out of it as it couldn't provide you with those even if you wanted it to. The encryption key never leaves the enclave inside the security chip.
As I said, this is Secure Boot + TPM + secure self-encrypting drive baked on the same board, normal businness-grade hardware is like that since at least 5 years. I still fail to see how this is more "involved and refined".
This is your own dream, the way they used to hack into the phone was not disclosed, and will not be for a while. But the fact that someone already knew how to hack it called them does not give me a lot of confidence.
Nor shit like the iCloud passwords bruteforced ("The Fappening") because the auth mechanism was completely retarded and could be tricked with fabricated tokens.
I'm not saying businness-grade stuff is airtight, mind me, I'm just saying that they at least have a track record and some evolution.
And my point is that this is not news for any Apple product since like 1999 or something so I'm unsure of what the point was.
Yeah, it's amazing how good you are at fanboying.
Seriously, security needs to be proven and tested, PR statements don't count.
I'm just posting facts to keep dumb fanboy shit at bay.
We are talking of security here, people can get hurt if they trust the wrong party.
Leave a comment:
-
Originally posted by gnuurman View Post
There actually is a way to debug those kind of problems - a DTrace-based app called Instruments, you can get it for free with Xcode.
UPD: nvm, I didn't see the "free" was part of your sentenceLast edited by Hi-Angel; 07 November 2018, 09:30 AM.
- Likes 1
Leave a comment:
-
Originally posted by L_A_G View PostNot really when Apple's security chips are supposed to be part of a full all-in-one security system with tamper-proof boot and full disc encryption.
There shouldn't be any pin pulling as the T2 doesn't work with a separate SSD.
I've seen repair videos of Apple boards, their SMC (system management controller) does have the ability to pull all other separate controller reset pins (wifi, SSD, thunderbolt) even in devices where the SSD is soldered on, as it has to do so on system reset or other occasions.
As I said, this is really just Apple implementing the same iPhone tech that has caused so many headaches to law enforcement trying to access devices. If that's anything to go by then this is a clear step up from what's been done before. You can go on about how this is nothing new, but as usual whenever Apple tries something that has already been done their solution is usually more involved and refined.
When the government sued Apple they refused to create the protection nullifying "cancer" update and the case was dropped primarily because the FBI was contacted by the developer of the really involved hardware attack.
But the fact that someone already knew how to hack it called them does not give me a lot of confidence.
Nor shit like the iCloud passwords bruteforced ("The Fappening") because the auth mechanism was completely retarded and could be tricked with fabricated tokens.
With normal business grade hardware the attack would probably have to have been less involved than the one the FBI had to resort to in their effort to gain access to the San Bernadino terrorist's phone.
I'm not saying businness-grade stuff is airtight, mind me, I'm just saying that they at least have a track record and some evolution.
It seems like you completely misunderstood my sarcasm there... Because the point was that the Mac Mini is expensive to the point of simply not being worth it.
T2 isn't making them more expensive, people isn't buying them because they are more secure, they buy because Apple cult.
Except maybe if you're a pedophile, drug dealer, terrorist, spy or some other kind of person the government would want to see what you've got on your HDD.
I'm totally going to trust some random company's self-written PR material with my crucial stuff, and not buy actual certified hardware from vendors that made self-encrypting drives fir for businness and agency use for the last decades, nor use some decent opensource software disk encryption with a password I store in my brain.
Seriously, security needs to be proven and tested, PR statements don't count.
Well your "REEE!!!! STOP LIKING WHAT I DON'T LIKE!!!1"-nonsense isn't exactly making the Linux user community look any better...
We are talking of security here, people can get hurt if they trust the wrong party.
Leave a comment:
-
Originally posted by starshipeleven View PostWhich is 100% irrelevant to the case here, as I said.
More like the encryption key itself is stored in hardware and operated by hardware so it is harder to steal (but not impossible, especially if you don't secure the T2-SSD communication against replay attacks)
...
Or any other device with a working TPM and self-encrypting drive anyway. This technology isn't really new or revolutionary. The big question is if they made it actually safe or if it is there just to lock down stuff for purely commercial reasons, Apple-style.
What makes me wonder this is that FBI still managed to extract data from iPhones when they sued Apple, they just had to pay some security company for the service.
With normal businness-grade hardware it would not have happened.
I wanted to say that all this "doing us a favor" thing you said is kind of strange since T2 is used also in their laptops, and they are just as overpriced as the mac mini.
People won't stop buying Apple, it's a cult.
Leave a comment:
-
Originally posted by L_A_G View PostThe T2 chip does implement, along with the boot image verification causing problems here, a type of disc encryption
that can't be broken by pilfering the encryption key.
I really hope they aren't doing completely retarded shit like having the T2 pull the SSD controller reset pin down instead of actually sending it a key, because that's pretty easy to hack (cut the reset pin trace). And I say this as in most reports the SSD "disappears" so it's not even detected by the system (which is what happens if the SSD controller is locked in "reset" state). Most businness-grade drives refuse to execute commands if you are not authenticated, but don't disappear from the system. I mean it's not like disappearing is better, the attacker knows the SSD is still there.
This is the same tech that has been causing some major headaches for law enforcement trying to access data on iPhones.
What makes me wonder this is that FBI still managed to extract data from iPhones when they sued Apple, they just had to pay some security company for the service.
With normal businness-grade hardware it would not have happened.
At what point did I claim that Apple's laptops are competitively priced?
I wanted to say that all this "doing us a favor" thing you said is kind of strange since T2 is used also in their laptops, and they are just as overpriced as the mac mini.
People won't stop buying Apple, it's a cult.
Leave a comment:
-
Originally posted by starshipeleven View PostDisk encryption has nothing to do with this, the issue is that the bootloader can't trust Linux because you cannot add a key for it, unlike most other decent UEFI Secure Boot implementations.
Nah, it's just another case of Apple being Apple.
Yeah, because the T2 isn't also used in their new laptops, and their laptops are shining beacons of "not overpriced".
Leave a comment:
Leave a comment: