Monday, June 28th 2021
Certain "Special Purpose Systems" Variants of Windows 11 Ship Without the TPM 2.0 Requirement
Perhaps the most controversial system requirement of the upcoming Windows 11 operating system is the need for a hardware trusted platform module that meets TPM 2.0 specs. Most modern computers fulfill this requirement using fTPM (firmware TPM) solutions built into their processors; and those that don't, have TPM headers for add-on TPMs, which scalpers have their eye on. It turns out, that Microsoft is designing special variants of Windows 11 for special contracts Microsoft will execute.
Computers sold under the scheme will be marked "special purpose systems," and the Windows 11 version running them will do away with the TPM 2.0 requirement. These systems are very likely to be Government or Military; or perhaps even variants Microsoft exports to countries like China and Russia, which have their own specialized cybersecurity policies and dictate software to be written a certain way to be sold in the country.
Source:
Tom's Hardware
Computers sold under the scheme will be marked "special purpose systems," and the Windows 11 version running them will do away with the TPM 2.0 requirement. These systems are very likely to be Government or Military; or perhaps even variants Microsoft exports to countries like China and Russia, which have their own specialized cybersecurity policies and dictate software to be written a certain way to be sold in the country.
30 Comments on Certain "Special Purpose Systems" Variants of Windows 11 Ship Without the TPM 2.0 Requirement
www.pcgamer.com/a-driver-containing-rootkit-malware-was-certified-by-microsoft/
Meanwhile the 7900X from Q2 2017 is not supported while Xeon 8180 from Q3 is. Both of these being Skylake.
Microsoft literally drew a line in the sand at around mid 2017.
I know mine does and it is disabled.
It's also not a "second processor." It's your same processor, running code with above admin level priviledges.
enticetrick users into using a Microsoft account and giving Microsoft even more hardware authority over a system than they already have. The TPM 'requirement' is just stronger identification and control of your OS license and despite TPM having beneficial security uses for a user, its only real high-profile press coverage so far been (ab)use by OEMs taking advantage of the "trust" in TPM to push their own software/firmware without requiring user consent.So many people are still using older systems that don't have TPM built in and Microsoft doesn't want to lose those users so W11 variants without the draconian requirements weren't just expected, they are practically guaranteed.
You may have to jump through some hoops to legally obtain these versions, just like you had to for the old LTSB licenses. However, the ole' Mary Celeste will still no doubt be a backup for people with ethics as shady as Microsoft's.
Seamless upgrade from existing W/10 install . Way to go MS.
From Wikipedia:
Also how come AMT is functional with the CPU not in the socket? :)
I know what Intel says but I've been through the minix binaries and it's quite clear where the core ME binaries (as well as the watchdog) run.
Intel also claimed for years the HAP bit was non-existant. They aren't beyond telling what is in generous terms, a simplified version of the truth.
Fun fact while we are at it: their RAID solution is run on your primary cpu, too.
You claim to be a researcher, why haven't you edited the wikipedia article citing your published papers yet? What you wrote directly contradicts it, and Intel's documentation. This is a genuine question, not mockery.
Feel free to look up my modified images. And if you still don't buy it, tough but not much I can do. I was a researcher who made images, not papers, so nothing to find. But my username is known amognst just about every ME researcher out there, FWIW.
As for why I haven't corrected wikipedia, probably because they'd have to start paying me. I'm a very busy man now.
I don't mean this rude. You are correct to be skeptical. I am just unsure what more I can provide, sorry. Good on you not taking things at face value though. I mean that honestly.
(But you're not too busy to reply to my posts on this forum tho ;) )
Wikipedia isn't honestly a haven for firmware researchers. You may try win-raid.com forums. I think plutomaniac could help you. You could also look into if the author of me_cleaner is still about, he may remember my work. May not, too. Hard to say we didn't talk much (probably why his user handle is escaping now) Nope. I think only one of us finished college. Firmware stuff is reverse engineering galore and colleges don't like to touch it. Too many grey areas.
EDIT: It appears I forgot about this hackaday article on my work on the Taichi boards... something maybe?
hackaday.com/2020/06/16/disable-intels-backdoor-on-modern-hardware/
Why would Intel lie about this on the biggest security-focused conference?
Also, spectre style exploits work on protected enclaves, suggesting what is running them indeed is an out of order cpu, at least. Are atoms out of order? I thought they weren't.
I guess I'll back off a little and admit this: anything is possible but I don't find it likely. My only guess is if they are lying, they don't see it as lying. The firmware itself lives in the bios chip which connects directly to the PCH. Maybe they consider that when they say the ME "lives" there. But it's just speculation.
The x64 parts of the Minix firmware could be explained by slide 9 which shows that during bring-up, more specifically DRAM init, there is a part of ME running on the host CPU called ACM. But even after the host OS is started, ME services keep living on the embedded i486.
Security enclaves, as in SGX? That indeed does live in the CPU, as in the code runs there (the SDK and public info confirms this), but is managed by ME from the chipset. I am not aware of any speculative execution exploit that managed to break into the ME part. If you are I'd appreciate some links or even keywords.
Edit: the entire presentation is very technical, I'll have to watch the recording of it later on, but I'm surprised Intel shared this much publicly.