On Sat, Jun 2, 2012 at 10:04 PM, BRM <[email protected]> wrote:
>> From: Michael Mol <[email protected]>
>

[snip]

>
> In theory that's how key signing systems are suppose to work.
> In practice, they rarely implement the blacklists as they are (i) hard to 
> maintain,
> and (ii) hard to distribute in an effective manner.

Indeed. While Firefox, Chromium, et al check certificate revocation
lists, Microsoft doesn't; they distribute them as part of Windows
Update.

>
> Honestly, I don't expect SecureBoot to last very long.
> Either MS and the OEMs will be forced to always allow users to disable it,
> or they'll be simply drop it - kind of like they did with TPM requirements 
> that were
> talked about 10 years back and never came to fruition.

TPM is still around for organizations which can use them. And,
honestly, I've been annoyed that they haven't been widespread, nor
easy to pick up in the aftermarket. (They come with a random number
generator...just about any HRNG is going to be better than none.)

I see something like SecureBoot as being useful in corporate and
military security contexts. I don't see it lasting in SOHO
environments.

[snip]

>> What kind of signature is the bootloader checking, anyway?
>
> Regardless of the check, it'll never be sufficient.

Sure; ultimately, all DRM solutions get cracked.

-- 
:wq

Reply via email to