Forgot your password?
typodupeerror

Comment Re:Other privacy-related projects are also affecte (Score 1) 84

Just because it's FOSS doesn't mean the key isn't generated at run-time, stored locally, and would have to be sent as part of the first packet or burst of data... if the key that decrypts it on your end isn't sent, how does the exit node have usable data to send to the Internet-at-large?

Congrats, you don't understand the basics of secure key exchange, but that's easy to fix: I suggest starting with the colour model for a basic understanding: https://www.arsouyes.org/artic... afterwards you can look into the details of how this works mathematically. No your key is *NEVER* sent anywhere. EVER. It's not required for key exchange.

And, especially because it's FOSS, the governments have already reverse-engineered it, figured out the decryption so they can peek at what you send, re-encrypt it, and send it on it's way.

There's nothing to reverse engineer. Encryption and security is based on well known public algorithms. These are designed to enable secret communication, that you can verify on a mathematical level. There's no reverse engineering anything, there's only breaking the key, and the key generation process relies on a the concept of mathematics that easily calculate but difficult to reverse. E.g. Discrete logarithm problems. Take M^b mod p = x. I could tell you M and p and x and you would still have no hope in hell of figuring out b.

You don't like what I post, then don't read it.

Why post if you don't want to engage in a discussion?

Maybe you'd rather terrorists and cartel members converse over these encrypted channels, and nobody knows a thing...

If this is the kind of thing you normally post I don't have any idea why no one has called you deranged before.

Comment Re:My guess (Score 1) 84

Hardly. If the user has access to files then Microsoft does as well. That's the fundamental problem with this debate by multiple people here. If you can open a file then Microsoft has access to it. If you use VeraCrypt to secure your windows partition then Microsoft has access to all the files since you literally need to decrypt the partition to load the OS.

Tinfoil hats are not a nice fashion accessory.

Comment Re:Microsoft issues the Linux keys too (Score 1) 84

You can disable secure boot. But Microsoft clearly has too much power and too little oversight and consequences for when they screw up.

You have clearly not enough knowledge and too much ignorance on the topic. No you don't need to disable secure boot. Microsoft has no control over secure boot. You can even load your own custom keys for the Windows boot process, to say nothing of Linux's secure boot process having zero to do with Microsoft control either.

But you don't care, you've been told this before. At this point you're willfully ignorant.

Comment Re:Microsoft issues the Linux keys too (Score 1) 84

Its uses are a) DRM

There is no way of querying secure boot or using it for DRM. All you can do I report if secure boot was on or off.

b) corporate lockdown of hardware in the hands of employees where they don't want to give root

That could be as well, but we already had non-secure boot options for that.

c) DRM

See a) Saying something wrong twice doesn't make it right, it makes you twice as wrong.

d) letting manufacturers or OS vendors control the machine you paid money for

Manufacturers have no control over secure boot. The implementation requires the keys be able to be managed by the user. You just jump into UEFI and delete Microsoft's key if you want and load your own. It's no more giving someone else control than a website that suggests a strong password.

e) yeah that's it

No that's not, you missed what Secure boot does.

You actually said a few right things there. Yeah it has nothing to do with hardware attacks, it has to do with persistent attacks.

But "persistent" means "past wiping the drive and doing a full reinstall"

No. The assumption for any computer is that it boots into a known configuration. Persistent in this case means it is impossible to remove from the OS. At no point has the definition included your "nuke from orbit" approach.

If a virus compromises a user's account, that's the actual harm done already, not reinfecting the machine.

Viruses can be removed and cleaned from machines. At least the ones which aren't following the correct definition of persistent. Damage in the modern definition is continuous and ongoing. Just because you've been infected at one point in time doesn't mean it's game over.

Comment Re:Microsoft issues the Linux keys too (Score 1) 84

but in linux it doesn't do anything useful...

Except for sign the boot process to ensure no resident malware can persist through reboots. There's example of it by the way, this isn't theoretical, Bootkitty is bootlevel malware that is exactly the kind of thing Secure boot protects against.

Comment Re: Microsoft issues the Linux keys too (Score 1) 84

If you think UEFI enhances anything except MSs stranglehold on the PC market then theres a bridge with your name on it.

You are technically correct. UEFI doesn't enhance anything, it doesn't force secure boot. Secureboot however objectively does enhance security, it's literally an open standard which puts encryption keys to validate the boot process in the hands of the user. MS has no stranglehold what so ever beyond making sure that unpermitted processes don't precede it in the boot chain, which is explicitly the boot time security hole being plugged.

You do the same thing in Linux, generate a keypair, sign the bootloader, and load the key into the UEFI to ensure no boot time attack creates resident malware.

There are examples of resident malware out there. This isn't theoretical (unlike Spectre type attacks).

Comment Re:Microsoft issues the Linux keys too (Score 1) 84

Why doesn't Microsoft want an independent encryption program running?

You answered your own question. Here: "since having someone else hold the keys completely mitigates the value of secure boot". Microsoft can't certify the secure boot process isn't maintaining the integrity of the kernel if 3rd party software bootstraps Microsoft's own booting procedure.

They need to be able to steal all your data, and feed in to their AI training, and hand it over to police.

This shows a fundamental failure of understanding of security principles. VeraCrypt encrypting the boot volume (the only thing that it would need a secure boot key for) in no way prevents Microsoft from doing what you're tinfoilhatting about as once VeraCrypt decrypts the boot volume Windows has full access to that volume anyway, and if you're concerned about non-boot volumes they blocking their secure boot key wouldn't have any impact on its use (I also use VeraCrypt).

Your conspiracy makes no sense and your mitigation (encrypt away from the OS) isn't even implicated by this secure boot discussion.

Comment Re:Microsoft issues the Linux keys too (Score 1) 84

That's why I leave my password fields blank. It's so much easier to ignore security. (Also no Microsoft has no capability of preventing you booting Linux or using Linux with secure boot disabled, the only thing they have the ability to block is you booting Linux using Window's boot loader).

Comment Re:Microsoft issues the Linux keys too (Score 1) 84

Microsoft issues the secure boot keys that are used by all Linux distributions.

No, Microsoft issues secure boot keys that allow Linux to be booted by bootstrapping Microsoft's bootloader's shim. You don't need Microsoft to run secure boot in Linux, you just need to load your own key into the BIOS. SecureBoot is 100% under your control.

The problem here that sets VeraCrypt apart is that VeraCrypt after doing its thing needs to load Microsoft's Bootloader. This entire system is interlinked. The whole point of secureboot was that software doesn't fuck with the boot process without authorisation.

Microsoft has no control over what you do with Linux (unless you let it)
Microsoft has ALL control over what you do with attempts to boot Windows.

Comment Re:Here we go again (Score 1) 70

Genius mastermind who has done significant damage to the world in terms of CO2 emissions, pointless hardware creation, fucked over consumers who have been screwed at every turn with blockchains, and created a network to facilitate money laundering and illegal deals the world over?

Yeah I wouldn't want anyone to accuse me of developing Bitcoin.

Comment Re:Good! (Score 4, Informative) 29

In some cases devices, even repairable ones, defend themselves against the economics of being repaired. I ran into this with a wet/dry vacuum recently. Kärcher is a company known for having every single part available to purchase individually. You can repair literally any Kärcher product. So when the switch (internal mechanism on the power control circuit board) broke I had the option of ...

Buying a replacement WD5 power board for 93EUR + 20EUR shipping (113EUR total).
Buying a whole replacement WD5 for 145EUR which includes 2 new filter bags (13EUR) and 1 new HEPA filter (18EUR), which brings the cost of the vacuum + all accessories minus the consumable ones to (145-13-18 = 114EUR).

So ... on a related note does anyone want a broken vacuum cleaner? Free to a good home. All it will cost you is nearly the price of an entire new one to get it working again...

Slashdot Top Deals

Feel disillusioned? I've got some great new illusions, right here!

Working...