Originally posted by Serge
View Post
Announcement
Collapse
No announcement yet.
Linux Group Files Complaint With EU Over SecureBoot
Collapse
X
-
Originally posted by duby229 View PostNo. If it isnt hacked now, it will be. That goes for anything and everything. Most hacks are not brute force. Most of them use exploits from undocumented behavior.
Comment
-
-
Originally posted by mjg59 View PostOther than brute force attacks, sure, why wouldn't it be?
Comment
-
Originally posted by Serge View PostWell, I'm not a security expert, and I realize that you are, so I'm not going to make a fool of myself by contradicting you. I'm just surprised, as this is the first time I've seen an actual expert say that unbreakable security is possible.
Comment
-
Originally posted by mjg59 View PostNo, it doesn't. There's the bit where you said history proved that all of these things would be hacked. History doesn't say that. They haven't all been hacked. You're just wrong.
Anything that hasnt yet been hacked will be.Last edited by duby229; 28 March 2013, 11:18 PM.
Comment
-
Originally posted by mjg59 View PostWell, in practice any given implementation generally turns out to have flaws (I've certainly found flaws in specific Secure Boot implementations, and I have no doubt that there are others), and it's difficult to prove it in advance, so pointing at a specific machine and saying "This is unbreakable" would be a pretty astonishing thing to say. Having said that, the design principles behind Secure Boot itself have been incredibly heavily reviewed - it's effectively the same Authenticode system that Microsoft use for signing drivers and executables, and nobody's demonstrated an exploit against those yet despite it being one of the most attractive targets. It was easier for the Stuxnet developers to use keys that were physically stolen from hardware companies than it was to break the underlying cryptography...
EDIT: You don't have to break the cryptography. In at least one case that I know of from an ARM device that I have it was the devices own bootloader that was used to break the boot lock. The cryptography was never broken, but it still was effectively unlocked.Last edited by duby229; 28 March 2013, 11:13 PM.
Comment
-
Originally posted by duby229 View PostWho's to say that something similar wont happen here? If enough keys become available then then what is stop it?
EDIT: You don't have to break the cryptography. In at least one case that I know of from an ARM device that I have it was the devices own bootloader that was used to break the boot lock. The cryptography was never broken, but it still was effectively unlocked.
Comment
Comment