← Back to context

Comment by Muromec

3 hours ago

This kind of thing is generally used to disallow downgrading the bootloader once there is a bug in chain of trust handling of the bootloader. Otherwise once broken is forever broken. It makes sense from the trusted computing perspective to have this. It's not even new, it was still there on p2k motorollas 25 years ago.

You may not want trusted computing and root/jailbreak everything as a consumer, but building one is not inherently evil.

Trusted computing means trusted by the vendor and content providers, not trusted by the user. In that sense I consider it very evil.

  • If the user doesn't trust an operating system, why would they use it. The operating system can steal sensitive information. Trusted computing is trusted by the user to the extent that they use the device. For example if they don't trust it, they may avoid logging in to their bank on it.

    • > If the user doesn't trust an operating system, why would they use it.

      Because in the case of smartphones, there is realistically no other option.

      > For example if they don't trust it, they may avoid logging in to their bank on it.

      Except when the bank trusts the system that I don't (smartphone with Google Services or equivalent Apple junk installed), and doesn't trust the system that I do (desktop computer or degoogled smartphone), which is a very common scenario.

A discussion you don't see nearly enough of is that there is a fundamental tradeoff with hardware security features — every feature that you can use to secure your device can also be used by an adversary to keep control once they compromise you.

  • Not only can, but inevitably is. Security folks - especially in mobile - are commonly useful idiots for introducing measures which are practically immediately coopted to take away users ability to control their device and modify it to serve them better. Every single time.

    We just had the Google side loading article here.

  • Fair enough, but so does your front door. Either thing is not smart enough to judge the legitimacy of ownership transitions.

    • Yeah, not disagreeing with you. It's just that, every time we have this discussion, we see comments like GP's rebutted by comments like yours, and vice versa.

      All I'm saying is that we have to acknowledge that both are true. And, if both are true, we need to have a serious conversation about who gets to choose the core used in our front door locks.

I’d like to think I’m buying the device, not a seat to use the device, at least if I do not want to use their software.

  • You can't have that with phones. You are always at the mercy of the hardware supplier and their trusted boot chain that starts with the actual phone processor (the one running GSM stuff, not user interface stuff). That one is always locked down and decides to boot you fancy android stuff.

    The fact that it's locked down and remotely killable is a feature that people pay for and regulators enforce from their side too.

    At the very best, the supplier plays nice and allows you to run your own applications, remove whatever crap they preinstalled and change to font face. If you are really lucky, you can choose to run practically useless linux distribution instead of practically useful linux distribution with their blessing. Blessing is a transient thing that can be revoked any time.

    • The GSM processor is often a separate chip. You may have read an article about the super spooky NSA backdoor processor that really controls your phone, but it's just a GSM processor. Connecting via PCIe may allow it to compromise the application processor if compromised itself, but so can a broadcom WiFi chip.

    • > You can't have that with phones.

      Why not?

      Obviously we don't have that. But what stops an open firmware (or even open hardware) GSM modem being built?

      1 reply →

    • Not true on the pinephone, the modem is a peripheral module, so the boot chain does not start with it.

    • Of course you can have that.

      The governments can ban this feature and ban companies from selling devices with that.