Hacker Newsnew | past | comments | ask | show | jobs | submit | mendocino's commentslogin

> NO signing keys preventing firmware modification

Not really a "secure" workstation if you can't have a secure bootchain. An open, secure platform would allow you to fuse your own root key.


It's much easier to add such a scheme to any platform than removing it when the vendor decided for you that this is what you want. If you want to lock the box down, put the firmware in flash, clip the ~WP pin, pour epoxy on it.

I guess the Raptor Eng folks aren't opposed to adding something more flexible to a later iteration (I'd propose securely measuring the firmware into some trusted external store in the style of TPM1.x and working from there), but for now the project is about helping undo the damage done to the ecosystem by providing an old-style "all open" platform again.


This seems to be an unfortunate relic from the fight against the clipper chip.

Buying hardware that you don't own and control is a big problem, but that doesn't mean all methods of securing the boot process are evil. The important bit is that it's the owner of the hardware that's in control of the keys, and that (s)he can retain sole control of the signing keys if desired.


Intel controls the keys for the management engine and other bits that are vectors for back doors:

https://libreboot.org/faq/#intel

The Snowden leak claimed that the NSA had special Intel chips, but no one has ever claimed Intel did a special production run. However, if they stole Intel's signing keys and internal documentation, they could just reflash the existing chips and Intel would not need to know a thing about it. Anyone who gets their hands on that information would be able to do the same and there is not a thing you can do about it beside using hardware where that is not possible.


I think we're in agreement then. Intel's system does not meet the criteria I set forth in the post you're replying to (since there is only one key, and it's generated out of the owners control). So that's a bad solution. If there were some way for a physically present user to set a new firmware signing key, that would get the benefit without having to throw out any attempt to secure the boot process.

Of course, intel's microcode is not open for scrutiny, so the point is moot there (what would you sign instead?)

The linked project states that having no way to lock the boot process is a benefit. I disagree that it's a feature to advertise, because it's possible to implement in such a way that the user retains complete control. Pointing out bad implementations is not a good answer to that.


The ME is an embedded device that has its own independent CPU and operating system. Whether Secure Boot is possible is tangential to that. Secure Boot is as relevant to security here as lowering the anchor on the titanic after hitting that iceberg. Whether the measure is in place or not does not actually fix things.


No, it's an ongoing contour. The companies that are interested in creating secure boot chains are uninterested in openly documenting the details. I presume both aspects come from the single-minded business desire of centralized control.


> Buying hardware that you don't own and control is a big problem, but that doesn't mean all methods of securing the boot process are evil.

Hear hear! Why are technology people, who are supposedly intellectual, thoughtful people, so prone to unthinking political knee-jerk?

As much as such technology can suck for individual's interests when turned against them, there is just as much potential for benefit to individual interests if the technology can be aimed 180 degrees the other way.

What if all information corporations possessed about you as an individual were protected through some trusted execution environment, with only publicly vetted code operating on it? What if any individual could meaningfully revoke access to their information when corporations turned out to be evil?


Looks more like an issue with the VM rather than xhyve. Serial console does not seem to get respawned.


Not sure how useful OS X containers would be. Are you deploying on OS X?


The benefit for me would be quick, isolated development environments. I want to boot a contained swarm of services connected to each other in a single command, and shut them down in a single command as well


And installing docker / docker-compose / machine, etc. using one brew command would be a great addition in order to ease introduction of the tool to the whole team.


    brew install docker docker-compose docker-machine
    open https://kitematic.com/download/
Kitematic might even come with docker, docker-machine. It will then set up a docker machine for you and you're ready to go.


Yes, Kitematic does install docker-machine automatically which also sets up docker.

For CLI, in Kitematic menu there is a button where you can install the binaries.


Will it also install and configure VirtualBox and boot2docker?


Thanks, thats great :)


Are you aware that your OS X machine is, itself, a deployment target for developers somewhere? All environments benefit from enforceable loose coupling.


I develop containers on OS X. I just spin up a linux box in vmware running a docker server listening on TCP.

From my development experience, there's no difference from working directly on a linux box.


If your objective is to sell a stolen iPhone then you still have to know the owners Apple ID and password due to activation lock. Being able to bypass Touch ID isn't going to help you.


But what if the objective isn't to steal the phone but to surreptitiously collect or plant information?

I can think of some examples:

* jealous spouses who want to look at call logs, emails, text histories

* unscrupulous managers looking to see if you've been talking to headhunters, competitors, etc.

* stalker coworkers who are looking for "private selfies"

* frenemies who want to post inflammatory messages using one of your social media accounts


Nope. If it's not a hardware lock, it will be bypassed.


Correct me if I'm wrong, but I'm pretty sure Apple's new iOS7 activation lock has not been defeated yet.

Keep in mind that if these criminals can't figure it out by googling it, they will give up and move on. The typical phone thief isn't a security expert with the knowledge to invent a previously unknown exploit.


Well, it's possible that the fence they sell the phones to would be motivated to find an exploit.


"so what's left to steal?"

The CPU? ARMv8 isn't a thing, it's an instruction set specification, just like x86, implemented by various micro-architectures. Samsung doesn't do that (yet).


The GPU is a design from Imagination Technologies, the CPU is an Apple design. What part of the SoC is "mostly designed by ARM"?


The CPU. Apple licenses ARM's reference designs, then creates an SoC around that.


The last SoC where this has been the case is the A5 (using the the ARM Cortex-A9 MP). The Apple A6 and A7 don't use ARM cores and neither does Qualcomm in their Snapdragon SoCs.


ARM just comes up with the instruction set. The cores are still designed by Samsung, Qualcomm, NVidia, etc.


> Learn the engineering skills needed to build a technology startup from the ground up.

"Learn the engineering skills needed to build a web startup from the ground up." FTFY


I guess the web isn't technology...


Technology is not the web


You don't know what technology is, do you?

http://en.wikipedia.org/wiki/Technology


I think the point he was making is along the lines of "all squares are rectangles but not all rectangles are squares"


Strange, seems to work fine on iOS.


> I have no idea how anyone who isn’t working in a high tech role that pays an above average salary can live here.

I wondered that too. Anyone care to share how to get by with a non-tech salary in the bay area?


Rent control. A lot of people are living/stuck in apartments and paying much, much less in rent. The high rent only applies to new people moving in, and I'd suspect that less new non-tech people are moving in these days.


How is rent control like that legal?


You've got it backwards: rent is controlled by the law.


1. You live somewhere defective. Now, "defective" is relative and can simply mean "inconvenient" (looong commutes) or it can be an area that's kinda uncool, ugly, subject to crime, constantly overcast, devoid of the interesting stores, subject to drive-by mariachi music attacks, etc.

2. Roommates. You live with someone else.

3. You were grandfathered in, either by owning property or by having a lease which (as a result of city law) essentially grants you immunity to rising rents. Lucky you.


Work in residential property management. Either your salary is decent enough for SF (the higher ups), or your rent is free (the front line managers.)


The same way they do in every large city - they sacrifice. They get roommates and do more with less. They live in places that are shunned by others because of industry or crime. At least, that's what I see here in NYC. It shocked me how someone could sell fruit and still live here. But they do it.


Living in Oakland is popular.


> You could create a new account for each kid. At a mininum, this means that you have to re-purchase all the paid apps from every account.

Not necessarily, you could have separate iCloud accounts for each family member and one shared iTunes/App Store account. You can use a different account for iTunes and the App Store, so you don't have to change accounts all the time. At least that's what we do.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: