Saturday, October 29th 2011
Windows 8 Secure Boot: Handy Malware Backdoor for Nosy Governments?
We've written before how Microsoft's new secure boot feature in Windows 8 could likely be used to shut out competition and create the ultimate in walled garden consumer lock-ins - something that is very undesirable from a competition, price and consumer choice viewpoint. However, it now appears that governments could lean on Microsoft in order to install secret snooping malware on user's PCs.
Ross Anderson, professor of Security Engineering at the University of Cambridge Computer Laboratory, has written in the Light Blue Touchpaper blog, about this issue. He starts off by explaining how secure boot could limit the purchase Metro apps to only the official Microsoft app store, saying. "Even if users can opt out, most of them won't. That's a lot of firms suddenly finding Steve Ballmer's boot on their jugular." That sounds very well put and really doesn't paint a pretty picture, does it? It's exactly the same tactic as all these firms that require you to opt out of receiving their junk mail, toolbars etc when installing software, knowing full well that the majority won't.
However, this control can turn from monopolistic to sinister, because governments could potentially lean on Microsoft to give them an official key in order to install malware on user's PC's, which could be next to impossible to remove. The particular example he gives is that of Tubitak, the Scientific and Technological Research Council of Turkey, saying that he has removed their key from his web browser, but how would he identify all foreign governments' keys?
Anderson has also written an 8-page paper (PDF) entitled "Can We Fix the Security Economics of Federated Authentication?" which covers this problem in great detail.
The Free Software Foundation has also also started a petition against secure boot, which people are encouraged to sign.
Ross Anderson, professor of Security Engineering at the University of Cambridge Computer Laboratory, has written in the Light Blue Touchpaper blog, about this issue. He starts off by explaining how secure boot could limit the purchase Metro apps to only the official Microsoft app store, saying. "Even if users can opt out, most of them won't. That's a lot of firms suddenly finding Steve Ballmer's boot on their jugular." That sounds very well put and really doesn't paint a pretty picture, does it? It's exactly the same tactic as all these firms that require you to opt out of receiving their junk mail, toolbars etc when installing software, knowing full well that the majority won't.
However, this control can turn from monopolistic to sinister, because governments could potentially lean on Microsoft to give them an official key in order to install malware on user's PC's, which could be next to impossible to remove. The particular example he gives is that of Tubitak, the Scientific and Technological Research Council of Turkey, saying that he has removed their key from his web browser, but how would he identify all foreign governments' keys?
We've also been starting to think about the issues of law enforcement access that arose during the crypto wars and that came to light again with CAs. These issues are even more wicked with trusted boot. If the Turkish government compelled Microsoft to include the Tubitak key in Windows so their intelligence services could do man-in-the-middle attacks on Kurdish MPs' gmail, then I expect they'll also tell Microsoft to issue them a UEFI key to authenticate their keylogger malware. Hey, I removed the Tubitak key from my browser, but how do I identify and block all foreign governments' UEFI keys?Sounds nasty, doesn't it? This isn't something that anyone should want on their computer.
Anderson has also written an 8-page paper (PDF) entitled "Can We Fix the Security Economics of Federated Authentication?" which covers this problem in great detail.
The Free Software Foundation has also also started a petition against secure boot, which people are encouraged to sign.
84 Comments on Windows 8 Secure Boot: Handy Malware Backdoor for Nosy Governments?
However I don't accept that end users will be at the whim of governments spying on everything that they do, that doesn't seem like a realistic prospect.
And this is borderline editorial.
+1 ... the twin tower incident was a Mossad/Russian joint op !
>_> And end up using faildozer instead ? No thanq. I'll pick the spybot chip !
/jk
I agree, this is a bit on the paranoid side. Good point on possible security hole, but credibility goes down with the mention of the govt using it against us.
No seriously, what's with all this paranoia going around ? Everyone thinks there's someone spying on them.
We all know bad governments will use any means necessary to control the populace. Does that mean we should get rid of all digital technology now? Or, as the professor lays out, should we CREATE MORE government regulations to prevent the possibility of this happening. The irony is not lost on me.
free pornsocial networks.Government does not NEED a backdoor into your PC, but vPro is pretty powerful.
you can remotely powerup a machine and even install OS! I have not looked into it in detail for some reason it does not get a lot of marketting, but I think it is one of the coolest features Intel has going (as well as the most troubling, as there is no BIOS option to disable it...)
Also, even if it is implemented, it isn't up to Microsoft to decide what OS gets allowed on the machine. The option to disable the feature entirely is supposed to be included. However, the OEM manufacturer of the computer has the option to omit this option if they choose, but Microsoft has no real say in the matter. I can see where this might happen, because OEMs hate supporting hardware that isn't running the original OS.