this post was submitted on 06 Jul 2024
472 points (94.4% liked)

Privacy

31876 readers
1 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] uis@lemm.ee 1 points 1 year ago* (last edited 1 year ago) (1 children)

Signal data will be encrypted if your disk is also encrypted.

True.

and you don't have any type of verified boot process

How motherboard refusing to boot from another drive would protect anything?

[–] 9tr6gyp3@lemmy.world 1 points 1 year ago (1 children)

Its more about protecting your boot process from malware.

[–] uis@lemm.ee 1 points 1 year ago* (last edited 1 year ago) (1 children)

Well, yes. By refusing to boot. It can't prevent booting if motherboard is replaced.

EDIT: s/do anything/prevent booting/

[–] 9tr6gyp3@lemmy.world 1 points 1 year ago (1 children)

Thats correct. Thats one of the many perks.

[–] uis@lemm.ee 1 points 1 year ago (1 children)

EDIT: s/do anything/prevent booting/

[–] 9tr6gyp3@lemmy.world 1 points 1 year ago (1 children)

If the hardware signatures don't match, it wont boot without giving a warning. If the TPM/Secure Enclave is replaced/removed/modified, it will not boot without giving a warning.

[–] uis@lemm.ee 1 points 1 year ago* (last edited 1 year ago) (1 children)

If the hardware signatures don't match

Compromised hardware will say it is same hardware

If the TPM/Secure Enclave is replaced/removed/modified, it will not boot without giving a warning.

Compromised hardware controls execution of software. Warning is done in software. Conpromised hardware won't let it happen.

[–] 9tr6gyp3@lemmy.world 1 points 1 year ago (1 children)

Compromised hardware doesn't know the signatures. Math.

[–] uis@lemm.ee 1 points 1 year ago (1 children)

Compromised hardware can't create new signatures, but it doesn't matter because it controls execution of software and can skip any checks.

[–] 9tr6gyp3@lemmy.world 1 points 1 year ago (1 children)

If the hardware is tampered, it will not pass the attestation test, which is an online component. It will fail immediately and you will be alerted. Thats the part of verified boot that makes this so much harder for adversaries. They would have to compromise both systems. The attestation system is going to be heavily guarded.

[–] uis@lemm.ee 1 points 1 year ago* (last edited 1 year ago) (1 children)

which is an online component.

So, storing on Signal's server key to decrypt keys. Welcome back to apple-isms and online-only.

It will fail immediately and you will be alerted.

Provided you have some other non-compromised way of communications.

[–] 9tr6gyp3@lemmy.world 1 points 1 year ago

Yes, verified boot will have out-of-bands alerts for you by design. Without the online component, you will risk not being able to detect tampering.