Permanently Deleted

  • dead [he/him]
    ·
    edit-2
    4 months ago

    The "neutered" state of IME is not a full removal and it is not known whether neutering ME could open you up to new vulnerabilities because the IME still loads up but in a lesser form. Also to neuter IME, you have to attach a eeprom programmer to your motherboard. (I have done this before. I tried the IME neuter.) Normal people don't know how to do an IME neuter. Did you just like link the github and think any person could neuter their IME by running some software? You have to physically rewrite the BIOS chip on your motherboard, potentially damaging your motherboard in the process. Only giganerds have attempted to do this.

    IME was just one example. Modern computers have firmwares within each part of the hardware which act independently from the operating system. An SSD has it's own firmware which thinks independently from your OS and could be potentially doing malicious things without you knowing it. Even "open hardware SBCs" use proprietary firmware blobs in the GPU and networking components. Electronic devices can not be trusted from government surveillance.

    Privacy is a different thing from OPSEC. The OP of this thread changed the thread title after I made my reply. Originally it had said OPSEC. As I wrote in my post, OPSEC requires you to analyze your threat model to determine the level of OPSEC that you need. An org using GPG encryption to secure their communications is great. If an org were trying avoid government surveillance, they should likely meet in person for communications. Using TAILS with Tor to shitpost on hexbear is a waste of time.

    I'm not arguing against privacy or OPSEC or Free Software. I love the EFF and FSF. I've used Debian for over 15 years now. I just don't think that using Debian prevents the government from surveilling me. This post was originally called "Hexbear guide to opsec", which I thought was misleading and the OP changed it to something else. I think OPSEC is important but the most important part of OPSEC is knowing your threat model.

    • Also to neuter IME, you have to attach a eeprom programmer to your motherboard. (I have done this before. I tried the IME neuter.) Normal people don’t know how to do an IME neuter. Did you just like link the github and think any person could neuter their IME by running some software? You have to physically rewrite the BIOS chip on your motherboard, potentially damaging your motherboard in the process.

      no, it's possible to overwrite the BIOS chip without an external programmer on some devices

      Even “open hardware SBCs” use proprietary firmware blobs in the GPU and networking components.

      not all of them, no

      If an org were trying avoid government surveillance, they should likely meet in person for communications.

      meeting in person involves plenty of different risks that don't exist for electronic communication, and vice versa

      • dead [he/him]
        ·
        4 months ago

        no, it's possible to overwrite the BIOS chip without an external programmer on some devices

        Comrade, it has not been possible to overwrite a bios chip without an external programmer since like 2006. When you update your BIOS's firmware, the existing BIOS verifies the new BIOS file using a PGP signature to check if the file has been approved by the manufacturer. This is in some ways a good thing because otherwise getting a computer virus would brick your PC by hijacking your BIOS.

          • dead [he/him]
            ·
            edit-2
            4 months ago

            2006 was a date from my own personal experience. However, here is a document from the National Institute of Standards and Technology (NIST) US government agency. The document is called 800-147 Bios Protection Guidelines, published in April 2011. I am not positive that every manufacturer follows these guidelines but I did see that Dell and ASUS say on their website that all products comply with this document. It is at the very least an industry standard.

            https://www.nist.gov/publications/bios-protection-guidelines

            If you go to page 6 of the document, it says "Unauthorized modification of BIOS firmware by malicious software constitutes a significant threat because of the BIOS’s unique and privileged position within the PC architecture. A malicious BIOS modification could be part of a sophisticated, targeted attack on an organization—either a permanent denial of service (if the BIOS is corrupted) or a persistent malware presence (if the BIOS is implanted with malware)."

            The document then recommends the following guidelines for computer manufacturers to secure the BIOS, which as I mentioned in my previous post, prevents the installation of bios files which do not match the manufacturer's digital signature.

            Security guidelines are specified for four system BIOS features:
            • The authenticated BIOS update mechanism, where digital signatures prevent the installation of BIOS update images that are not authentic.
            • An optional secure local update mechanism, where physical presence authorizes installation of BIOS update images.
            • Integrity protection features, to prevent unintended or malicious modification of the BIOS outside the authenticated BIOS update process.
            • Non-bypassability features, to ensure that there are no mechanisms that allow the system processor or any other system component to bypass the authenticated update mechanism.

            So yes, I am claiming that is impossible to flash a third-party BIOS without an external programmer on most computers. Considering this was the industry standard in 2011, many computers had this protection before 2011, and even more protections have been added since then.

            • your argument wasn't that it was impossible on most computers (I've already agreed that it's only possible on certain devices released after the point where BIOS flashing protection became widespread), it was that

              it has not been possible to overwrite a bios chip without an external programmer since like 2006

              and even if you update that to 2011, it's entirely possible to do on certain systems manufactured after that date using exploits

              • dead [he/him]
                ·
                4 months ago

                your argument wasn't that it was impossible on most computers

                No. This is not at all what I have been speaking about. In my original post I said that most computers have hardware backdoors and that IME is one example. You said that IME can be neutered. I have been describing to you why that is impractical. I also said that we don't know if the ME neuter is even safe. I have been speaking in terms of practicality. My post from the very start describes how difficult it is to use me_cleaner. I mentioned that it was something that I have actually done myself using an external flasher. I spoke from my own personal experience to say how impractical it would be to expect any other person to use me_cleaner. It is extremely difficult to use me_cleaner by an external flasher. It is extremely difficulty or impossible in most circumstances to use me_cleaner by internal flasher. I would be surprised if there was 1 other person on hexbear who has actually used me_cleaner. I hope you try it.

                • No. This is not at all what I have been speaking about.

                  I quoted you directly claiming that it was impossible; I'm not sure how else to interpret "it has not been possible to overwrite a bios chip without an external programmer since like 2006"

                  we don’t know if the ME neuter is even safe

                  no, but it's certainly worth noting that various US three-letter agencies seem to think so, considering they told Intel to include a hidden kill switch

                  I hope you try it

                  I have, without using an external programmer, on a computer released after 2011