Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

So it boils down to "we shouldn't attempt to build new security stuff because what it's built on could have vulnerabilities"?

Time to go back to kernel mode everything I guess. Just run everything as root, get rid of sudo.



The exact argument was made in the article

> There are a plethora of attacks on TPM in the past but we need to be clear that a system that is widely attacked does not necessarily mean it is fundamentally insecure but only that there are many implementation issues. Most of these implementation issues do not touch upon the points raised in this article (it doesn't matter if the gate to your garden is strong or weak if there is no fence around the garden). Nevertheless, many of the attacks demonstrate the lack of care and consideration in the TPM ecosystem.

The issue is that TPM is being heavily pushed while it provides no security value. When you have Secure Boot (no additional hardware required), you get everything that Microsoft promises. The entire idea of TPM is that it gives you an extra level of security and I argue that it doesn't.


Ring-0 only, and 640x480 as God intended.


That's why I use TempleOS exclusively.


There's an argument to be made that security vulnerabilities the user can't fix are worse than ones they can, but this article doesn't make it.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: