There is a huge fear about BIOS rootkits.

So until recently, the idea was that the device's BIOS had to implement, in software, ways to make sure that only official BIOSes could be reflashed via software.

In practice, some BIOS don't have any "protection" against reflashing, which is good for us.

Some other have various degrees of protection. I think they can all be broken, but some are BIOS specific, so it requires some work.

Because the software protection didn't hold, some vendors now use code signing at the hardware level, so the hardware (The CPU) won't load any code not signed by the device manufacturer.

Here you can see a conflict between freedom, and preventing (additional) rootkits in proprietary software.

A very similar conflict is present for bootloaders of Android phones, where permitting to load your own bootloader would permit to rootkit the phone, and easily access all the data inside it because you load your code before the OS.

I think we should try to find good solutions so the chip and device manufacturer, freedom, and security of users using the default software would go well together.

Denis.

Reply via email to