The much maligned “Trusted Computing” idea requires that the party you are supposed to trust deserves to be trusted, and Google is DEFINITELY NOT worthy of being trusted, this is a naked power grab to destroy the open web for Google’s ad profits no matter the consequences, this would put heavy surveillance in Google’s hands, this would eliminate ad-blocking, this would break any and all accessibility features, this would obliterate any competing platform, this is very much opposed to what the web is.

  • jarfil@beehaw.org
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    THIS IS NOT (just) ABOUT GOOGLE

    Currently, attestation and “trusted computing” are already a thing, the main “sources of trust” are:

    • Microsoft
    • Apple
    • Smartphone manufacturers
    • Google
    • Third party attestators

    This is already going on, you need a Microsoft signed stub to boot anything other than Windows on a PC, you need Apple’s blessing to boot anything on a Mac, your smartphone manufacturer decides whether you can unlock it and lose attestation, all of Microsoft, Apple and Google run app attestation through their app stores, several governments and companies run attestation software on their company hardware, and so on.

    This is the next logical step, to add “web app” attestation, since the previous ones had barely any pushback, and even fanboys of walled gardens cheering them up.

    PS: Somewhat ironically, Google’s Play Store attestation is one of the weaker ones, just look at Apple’s and the list of stuff they collect from the user’s device to “attest” it for any app.

    • beefcat@beehaw.org
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      1 year ago

      you need a Microsoft signed stub to boot anything other than Windows on a PC

      Not necessarily, most motherboards and laptops (at least every single one I’ve ever owned) allow users to enroll their own Secure Boot keys and maintain an entirely non-Microsoft chain of trust. You can also disable secure boot entirely.

      Major distros like Ubuntu and Fedora started shipping with Microsoft-signed boot shims as a matter of convenience, not necessity.

      Secure Boot itself is not some nefarious mechanism, it is a component of the open UEFI standard. Where Microsoft comes in to play is the fact that most PC vendors are going to pre-enroll Microsoft keys because they are all shipping computers with Windows, and Microsoft wants Secure Boot enabled by default on machines shipping with with their operating system.

      • Saturnlks@lemm.ee
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 year ago

        Windows 11 is saying you’re required to have tpm 2.0 enabled in your bios in order to upgrade. Didn’t know what it was on my self built computer until recently when windows said my system wasn’t compatible to upgrade.

        • beefcat@beehaw.org
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 year ago

          TPM and SecureBoot are separate UEFI features. Windows 11 requires TPM 2.0. If your system meets the CPU requirements, then it should support this without needing to install a hardware TPM dongle. However, until recently, many vendors turned had this feature turned off for some reason.

          Where some confusion comes in is another Windows 11 requirement, that machines be SecureBoot capable. What this actually means in practice is that your system needs to be configured to boot in UEFI mode rather than CSM (“Legacy BIOS”) mode.

        • beefcat@beehaw.org
          link
          fedilink
          English
          arrow-up
          1
          ·
          edit-2
          1 year ago

          Microsoft doesn’t control the standard, and the entire rest of the industry has no reason to ban non-Windows operating systems.

          Widnows doesn’t have the stranglehold over the market that it once did.

      • Gsus4@lemmy.one
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        1 year ago

        You can’t disable secure boot if you want to use your Nvidia GPU :( though. [edit2: turns out this is a linux mint thing, not the case in Debian or Fedora]

        Edit: fine, there may be workarounds and for other distros everything is awesome, but in mint and possibly Ubuntu and Debian for a laptop 2022 RTX3060 you need to set up your MOK keys in secure mode to be able to install the Nvidia drivers, outside secure mode the GPU is simply locked. I wasn’t even complaining, there is a way to get it working, so that’s fine by me. No need to tell me that I was imagining things.

        • beefcat@beehaw.org
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          1 year ago

          My experience is that Nvidia plays nicer without secure boot. Getting Fedora up and running with the proprietary Nvidia drivers and fully working SecureBoot was quite a headache, whereas everything just worked out of the box when I disabled it.

          But this is very much an Nvidia problem and not a SecureBoot problem. There is a reason basically no-one else provides their drivers as one-size-fits-all binary kernel modules.

    • zzz@feddit.de
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 year ago

      While I agree in general, and the overall sentiment/direction here to steer towards (morally) is clear… let’s stick to facts only.

      you need Apple’s blessing to boot anything on a Mac

      Bootloader is unlocked and alternative OS exist. Or what else did you mean by that?

      • jarfil@beehaw.org
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 year ago

        Macs with the T2 could be configured to unlock the bootloader, but from my understanding, the new Apple Silicon Macs (M1, M2) come with the bootloader locked.

        • zzz@feddit.de
          link
          fedilink
          English
          arrow-up
          0
          ·
          edit-2
          1 year ago

          Your understanding is incorrect, I think.

          Apple specifically chose to leave it (or some part of the chain, I don’t actually know, not an expert lol) open, otherwise, a project like Asahi Linux would not have had a chance from the getgo.

          I might try to read up on it when I find the time whether they still have to rely on something signed by Apple before being able to take over in the boot process.

          • jarfil@beehaw.org
            link
            fedilink
            English
            arrow-up
            1
            ·
            edit-2
            1 year ago

            I see.

            I was going on the fact that the T2 has a “No Security” option for its Secure Boot config, while according to Apple Support the Apple Silicon ones (I don’t have one) only offer “Full” or “Reduced” security, which would still require signing: Change security settings on the startup disk of a Mac with Apple silicon

            Dunno how the Asahi folks are planning on doing it, but they do indeed say there is no bootlock 🤔

            Update: according to the Asahi docs, I seem to understand that Apple Silicon devices allow creating some sort of “OS containers” that can be chosen to boot from separately from the Mac OS one, and in such a custom container the security can be set to “permissive” limited to that container: https://github.com/AsahiLinux/docs/wiki/Open-OS-Ecosystem-on-Apple-Silicon-Macs Interesting.