Spivak 5 days ago

https://0pointer.net/blog/authenticated-boot-and-disk-encryp...

You. The money quote about the current state of Linux security:

> In fact, right now, your data is probably more secure if stored on current ChromeOS, Android, Windows or MacOS devices, than it is on typical Linux distributions.

Say what you want about systemd the project but they're the only ones moving foundational Linux security forward, no one else even has the ambition to try. The hardening tools they've brought to Linux are so far ahead of everything else it's not even funny.

  • direwolf20 5 days ago

    This is basically propaganda for the war on general purpose computing. My user data is less safe on a Windows device, because Microsoft has full access to that device and they are extremely untrustworthy. On my Linux device, I choose the software to install.

    • egorfine 4 days ago

      Propaganda begins with reframing. What russia is waging is not a war, it's a special military operation. War is peace. Data on Windows is secure. Linux's security is far behind.

      That sort of things.

    • Spivak 5 days ago

      What are you talking about? This has nothing to do with general purpose computing and everything to do with allowing you to authenticate the parts of the Linux boot process that must by necessity be left unencrypted in order to actually boot your computer. This is putting SecureBoot and the TPM to work for your benefit.

      It's not propaganda in any sense, it's recognizing that Linux is behind the state of the art compared to Windows/macOS when it comes to preventing tampering with your OS install. It's not saying you should use Windows, it's saying we should improve the Linux boot process to be a tight security-wise as the Windows boot process along with a long explanation of how we get there.

      • direwolf20 5 days ago

        Secure boot is initialized by the first person who physically touches the computer and wants to initialize it. Guess who that is? Hint: it's not the final owner.

        It's only secure from evil maker attacks if it can be wiped and reinitialised at any time.

      • egorfine 4 days ago

        > allowing you to authenticate the parts of the Linux boot

        No, not you. Someone else for you. And that's the scary part.

      • egorfine 4 days ago

        > we should improve the Linux boot process to be a tight security-wise as the Windows

        I hope this never happens. I really want my data secure and I do have something to hide. So, no Microsoft keys on my computer and only I will decide what kind of software I get to run.

        Absolutely fuck that.

  • LooseMarmoset 5 days ago

    > Microsoft

    the guys that copy your bitlocker keys in the clear

  • dTal 5 days ago

    Considering that (for example) your data on ChromeOS is automatically copied to a server run by Google, who are legally compelled to provide a copy to the government when subject to a FISA order, it is unclear what Poettering's threat model is here. Handwringing about secure boot is ludicrous when somebody already has a remote backdoor, which all of the cited operating systems do. Frankly, the assertion of such a naked counterfactual says a lot more about Poettering than it does about Linux security.

murphyslaw 5 days ago

Just an assumption here, but the project appears to be about the methodology to verify the install. Who holds the keys is an entirely different matter.

  • dsr_ 5 days ago

    Werner Von Braun only built the rockets; he didn't aim them, nor did he care where they landed.

    (London. On some of my relatives.)

    • daviddever23box 5 days ago

      ...and the moon.

      • dsr_ 5 days ago

        You'll understand if I don't think the tradeoffs were necessary, or worthwhile.