Eternal Spirit of Darknes
kiwifarms.net
- Joined
- Aug 2, 2025
What's even the point of "trusted computing"?
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
What's even the point of "trusted computing"?
It's marketed as something to make your computer unhackable and the data onboard impossible to retrieve by unauthorized third parties. In practice, it's just another way for Silicon Valley and Davos to push you further towards owning nothing.What's even the point of "trusted computing"?
Just don't run random programs LOLmake your computer unhackable and the data onboard impossible to retrieve by unauthorized third parties
Im more worried about big tech and the da bigga gobmint than I am some elite haxxor who is more likely to spear phish me than anything else.It's marketed as something to make your computer unhackable and the data onboard impossible to retrieve by unauthorized third parties. In practice, it's just another way for Silicon Valley and Davos to push you further towards owning nothing.
He does this regularly when he doesn't have anything worthwhile to post.I think you already know (but anyway) that Lunduke made an 120IQ decision and paywalled his new YouTube videos. Well, according to Socialblade, he instantly became irrelevant and started to lose subs.
And I thought that Jews are smart...
Conceptually, your computer acting in some capacity as an "independent" agent not designed to be controlled by any party (of course, in practice this means "not controlled by the end user" - wouldn't surprise me at all if current implementers had backdoor access). The original use for this was doing things like storing disk encryption keys and verifying the integrity of the bootloader before allowing them to be fetched. In this way you could have full-disk encryption and still be able to start up your computer without having to enter a password. In theory this was supposed to protect against "evil maid" attacks where the "end user" at the moment is someone who has gained unauthorized physical access to your computer. In practice it caused problems for people trying to run anything that wasn't Windows IIRC. Notably, to my knowledge, it does nothing to defend against software vulnerabilities - running malware can access any encrypted device that has already been unlocked and that it has the necessary permissions to access.What's even the point of "trusted computing"?
No, you only need a false creation record if deception and tampering are impossible, because then compromise must happen at creation time and nobody can lie about it. Otherwise, you just convince someone to vouch for you in error or compromise your device at a later point. The "impossible" part is vital for your scheme, you can't weaken it to "kinda hard" later and reuse the old results.And again, creating a falsified creation record requires that every device upstream of it is compromised. If a single person with an independent, uncompromised device shows up to record the creation of this device - which should be a public event - it can't be compromised without it being made known.
This renders the device unusable because it can no longer generate trustworthy keys after a tampering alert. False positives will be common too because a false negative spells doom for everything that actually relies on the integrity of this trusted computing scheme. It's expensive, frail and requires moon technologies left as an exercise for the reader - hence nerd wank.You don't need to have perfect accuracy - deleting the key material on false positives is always an option.
Well excuse me for not being too excited about technology whose existing instances are exclusively about enabling glownigger and copyrast garbage, and whose legit applications amount to a few extra days of time in case of physical compromise. Have you considered thermite instead?You proceeded to go on about how akshyually trusted computing is always bad because if you put aproprietary black box"mandatory mystery chip" inconsumer hardwarea "general purpose computer" itcan be used to exert control over the usermakes it so the user "doesn't control it anymore". To cap it all off, you conclude by directly comparing trusted computing to Microsoft.
Should I be exasperated by you immediately proving me correct, or reassured?
If that happens you've got much bigger problems.where the "end user" at the moment is someone who has gained unauthorized physical access to your computer.
Again, what is the purpose?the ability to lock down your system to only run kernels signed by your key that you have hidden behind full disk encryption
just having the option is not a bad thingAgain, what is the purpose?
I see this a lot in the fawss space - insane security measures for a home PC. What's the point? What's the point of having disk encryption on my home PC? It's not like it protects against malware, since the disk is open while using the PC, so it only protects your sensitive data if someone gained unauthorized access to your physical disk. But at that point, I reiterate, you have much bigger problems than your disk.
This is the crux of the matter that shills itt and faggots fail to see. Trusted computing is a venue for castrating your freedom even more. It is not enough that 95% of all laptops in use are infested with the glowie silicone-level spyware that is the Intel Management Engine / AMD Secure Processor, now they want to add hardware attestation that will 1000000% be used to garden wall everyone even more. FUCK your glownigger restrictions and FUCK your "USE CASE? DURRR WHAT IS THE USECASE FOR SECURITY & PRIVACY!?!?!?????? NO ONE CARES BROOOO HURR UR NOT IMPORTANT ENOUGH FOR THE GLOWIES DURRR" literal nigger monkey 40 iq take. Everyone should have absolute sovereignty over their system the moment they purchase it, and they should be able to modify it as they see fit from the silicone up. If I want to FDE everything, I should have the right to do so. If I want to install Linux for Niggers, I should be able. If I want to flash custom firmware, I should absolutely have the freedom to. The ONLY restrictions to such things should be the user's own skill and will. Imagine being such a cucked faggot that you actively shill for increased enslavement. What the fuck ever happened to "zero trust"?just having the option is not a bad thing
>All you need is CAP_SYS_RESOURCE, modern systemd, and [...]
Perhaps you should expound somewhat on how exactly you're defining "impossible" here. Certainly physical impossibility isn't it: a sufficiently fast and accurate sensor could penetrate the material of the device at the speed of light and land at the key storage faster than any signal to delete could propagate, but that doesn't seem like a particularly reasonable scenario. By comparison, all asymmetric cryptography can, by design, be broken with sufficient time (there is only a computational barrier, not a shortage of information), and likewise for any cryptographic hash function collisions necessarily exist. Both of these can in theory be found instantly if the attacker simply "gets lucky". How unlikely or slow does success need to be before it's "impossible"? Given the physical nature of attempts, it seems like the usual "1 in 2^128" rate for information security might be a bit excessive? Would "1 in 2^32" be reasonable, or too common?No, you only need a false creation record if deception and tampering are impossible, because then compromise must happen at creation time and nobody can lie about it. Otherwise, you just convince someone to vouch for you in error or compromise your device at a later point. The "impossible" part is vital for your scheme, you can't weaken it to "kinda hard" later and reuse the old results.
It does indeed render the device unusable. How common false positives are depends on how the user treats it and what conditions need to be treated as failsafe-worthy. I imagine devices used in the field would have an elevated rate of false positives, but fixed deployments should have pretty consistent conditions.This renders the device unusable because it can no longer generate trustworthy keys after a tampering alert. False positives will be common too because a false negative spells doom for everything that actually relies on the integrity of this trusted computing scheme. It's expensive, frail and requires moon technologies left as an exercise for the reader - hence nerd wank.
It's okay, I really can't complain when I started out by saying I should've seen it coming.Well excuse me for not being too excited
I have said this before and will say it again: Secure boot is a scam to make your computer more like a phone so they can control everything.Explains why games like Battlefield 6 are enforcing Secure Boot, so those unsigned cheater drivers can't be loaded.
Battlefield 6 already has a huge cheating problem and it hasn't even launched yet.
I use it all the time, because at least on Linux it is super easy to setup.What's the point of having disk encryption on my home PC?
You're a fucking retard and the "evil maid attack" is retard bait for bike-shedding retards such as yourself. We get it, you can understand "bad person touch computer" (and not a whole lot else). Bully for you.just having the option is not a bad thing
also people sometimes have laptops that they lug around in public and shit
somebody swiping one of these computers for a second and installing a rootkit for a deep and powerful compromise is not a terribly far fetched idea, and people having the tools to defend against it isn't bad
you are correct in that there are absolutely bigger problems when you can't maintain physical security against malicious actors, but at least an evil-maid-proofed pc can help soften the blow of certain shit the malicious actor could do
yes i agree with thisEveryone should have absolute sovereignty over their system the moment they purchase it, and they should be able to modify it as they see fit from the silicone up. If I want to FDE everything, I should have the right to do so. If I want to install Linux for Niggers, I should be able. If I want to flash custom firmware, I should absolutely have the freedom to. The ONLY restrictions to such things should be the user's own skill and will. Imagine being such a cucked faggot that you actively shill for increased enslavement. What the fuck ever happened to "zero trust"?
"bro protecting yourself against evil maid is worthless because <other attack>"Unfortunately there is a much easier attack for someone with physical access that completely defeats secure boot: A malicious usb cable. Not only do they not require installing software at all (that must be customized to your target) so are much faster but have tons of additional useful features like wifi access, key stealing, input injection, etc.
Anonymous retard makes claim with no evidence, here's your evidence for you.Rev. Up your engines
More gas️
️
️ on the accelerationist train
(Complaints happen phones will be locked down same as ios)
View attachment 7833429
If their own numbers say...The scale of this threat is significant: our recent analysis found over 50 times more malware from internet-sideloaded sources than on apps available through Google Play.
Generally valid advice for end users, not so much for organizations that have to worry about direct attacks from corporate- and state-level threat actors trying to conduct espionage or straight sabotage (although for them the biggest threat vector is STILL Karen McRunseveryattachment over in HR getting spearphished)Just don't run random programs LOL