93500+ entries in 0.054s

swiftgeek: asciilifeform: yep it needs
to be open otherwise lol
swiftgeek: hl`: and nobody dumped yet
trackpoint code either :>
hl`: Sure. Honestly, I'm surprised nobody has managed
to dump decrypted Intel microcode yet. Seems
to me you could probably accomplish something with glitching.
hl`: (especially since
they have a bloody _firmware update_ capacity. !)
hl`: pretty much - agreed
that
TPMs with nonfree firmware (i.e. all of
them which currently exist) are pretty dubious for
that reason.
hl`: asciilifeform: not exactly.
the fundamental premise is just
to measure
the computing environment -
this can be used
to pro-owner ends if you control
the
tpm.
hl`: to be clear, any company which ships chips fused
to only run
their code gets a 'fuck you' from me
swiftgeek: hl`: softbrick in
thinkpad provides resistance against evil maids :)
hl`: there's not really
that much point
to
tpms if physical attacks aren't in your
threat model. if
they are,
they can provide resistance against evil maids, etc.
swiftgeek: if
there is no root of
trust on device
then it's just another layer of obfuscation
swiftgeek: asciilifeform: it depends on having root-of-trust (tpm isn't it),
then it's a fun store of secrets
swiftgeek: hl`: especially when you
think about reselling
the device
hl`: yes, exactly. i'm
talking about
the use of owner-controlled
TPMs
to secure against other parties.
swiftgeek: hl`: but OTP root of
trust is not a solution either
swiftgeek: hl`: if you have more devices on same bus you can figure out something
to sniff it, and later replay
swiftgeek: hl`: you don't need physical attack
there really
swiftgeek: hl`: it depends on root of
trust being somewhere else
hl`: not really
trustworthy if
they have non-free firmware on
them, but
theoretically
they have a use case
☟︎ hl`: no,
TPMs _can_ be used
to secure your own stuff if _you_ control
them
swiftgeek: then everything would need
to be implemented properly in SoC
swiftgeek: yeah i was just saying about having
TPM module implemented in open manner
swiftgeek: sure but
they will chip into contributing
to
toolchain
swiftgeek: would be nice
to have nicer implementation with riscv :D
swiftgeek: so if somebody has separate module
they are left vulnerable
swiftgeek: what i'm annoyed about is
that infeon is not distributing updates directly
to consumers
swiftgeek: asciilifeform: ditto for any other
TPM
a111: Logged on 2018-06-11 20:09 asciilifeform: swiftgeek: my specific interest is
to get arbitrary code exec on
the device.
swiftgeek: yeah another one of
those modular certification
swiftgeek: asciilifeform: i can
tell at
the very least it doesn't look like anything ROHM would make (the chip)
swiftgeek: hmm let's
take last ditch detour, FCC ID
swiftgeek: while it's illegal dump, you have
to deal with it nevertheless
swiftgeek: it's kinda like neighbouring country dumping some
trash in forest of other country
swiftgeek: but don't actually
treat
them like
that
swiftgeek: asciilifeform: well if you want
to blame google/asus sure
swiftgeek: asciilifeform: anyway if you can
tell i care a lot about e-waste and such chipie is creating serious problems
swiftgeek: and included in commercial device at
that
a111: Logged on 2018-06-11 19:57 asciilifeform: swiftgeek: given your introduction (
http://btcbase.org/log/2018-06-11#1822589 ) i assume you may be interested in verifying fact
that cr50 is not a subfunctionality of
the ordinary (i.e. kept in winbond spi ) bootrom or
the EC controller ('nuvoton' arm , visible in right hand of photo ).
this is very simple
to do:
swiftgeek: i didn't know
they have actually made it finally
swiftgeek: libreboot
thinkpad doesn't have it easy, neither BSDLs nor XOR
test chains are described for our montevina
targets
swiftgeek: with
that amount of
tools you could fix
those devices during a coffee break xD
swiftgeek: whether
they use it or not it's up
to
them xD
swiftgeek: asciilifeform: anyway authorized repair shop has ridiculous amount of
tools
to diagnose board
swiftgeek: either chipie does far less or
the
thing is secret
swiftgeek: together with your explanation of purpose of
the chip
swiftgeek: that m.2 module
thing
took seriously way
too much
time for us xD
swiftgeek: otherwise you are literally reversing open source code
to figure out something
that is presented clearly and for sure in boardview/schematics
swiftgeek: we need it
to have something proper