Photo of the set-up.pic.twitter.com/Np9GmvWOFt
If it ain't broke, I'll fix it!
I'm porting Linux to Apple Silicon Macs at @AsahiLinux.
http://patreon.com/marcan | http://github.com/sponsors/marcan
You can add location information to your Tweets, such as your city or precise location, from the web and via third-party applications. You always have the option to delete your Tweet location history. Learn more
Add this Tweet to your website by copying the code below. Learn more
Add this video to your website by copying the code below. Learn more
By embedding Twitter content in your website or app, you are agreeing to the Twitter Developer Agreement and Developer Policy.
| Country | Code | For customers of |
|---|---|---|
| United States | 40404 | (any) |
| Canada | 21212 | (any) |
| United Kingdom | 86444 | Vodafone, Orange, 3, O2 |
| Brazil | 40404 | Nextel, TIM |
| Haiti | 40404 | Digicel, Voila |
| Ireland | 51210 | Vodafone, O2 |
| India | 53000 | Bharti Airtel, Videocon, Reliance |
| Indonesia | 89887 | AXIS, 3, Telkomsel, Indosat, XL Axiata |
| Italy | 4880804 | Wind |
| 3424486444 | Vodafone | |
| » See SMS short codes for other countries | ||
This timeline is where you’ll spend most of your time, getting instant updates about what matters to you.
Hover over the profile pic and click the Following button to unfollow any account.
When you see a Tweet you love, tap the heart — it lets the person who wrote it know you shared the love.
The fastest way to share someone else’s Tweet with your followers is with a Retweet. Tap the icon to send it instantly.
Add your thoughts about any Tweet with a Reply. Find a topic you’re passionate about, and jump right in.
Get instant insight into what people are talking about now.
Follow more accounts to get instant updates about topics you care about.
See the latest conversations about any topic instantly.
Catch up instantly on the best stories happening as they unfold.
Why am I doing this? TPM sniffer/MitM PoC. Because people who think that transparent-mode (TPM-only) BitLocker is secure are funny.
I never understood the point of that. If the TPM has the keys and there's no auth from CPU to TPM, can't you just see the keys over the bus? Equally, can you not just lie to the TPM about PCR values when doing remote attestation?
Easiest is the reset attack. Boot Linux or whatever, hit the TPM reset pin, feed it whatever PCR values it wants pretending to be the BIOS, get keys. DRTM makes it more complicated due to HW cycle differences but an FPGA will take care of that.
If the TPM will cough up cleartext keys to anyone who asks with the right PCRs, what's even the point of having antitamper mesh on the chip? Seems like you'd be just as well served with a PIC :P
Yeah. Well, you can generate asymmetric keys inside the TPM and use that to attest a given physical TPM. Doesn't help with BitLocker though. Also then it turns out your TPM is Infineon and generates ROCA RSA keys anyway.
Yes, you can attest the physical TPM. But you can't attest that the CPU is running any particular software. Calculate the PCRs it expects and feed them over the MITM bus then get it to sign your challenge blob.
Of course. It's just an anticloning thing, really. If you steal the TPM then you can always use it as an oracle.
So what you're saying is, the original use case of proving that a Windows PC is running an unmodified OS rather than one with (say) a DVD screengrabber in the GPU driver was completely broken from day one. I knew DRM was flawed but didn't think TPMs were *that* useless...
Basically the entirety of x86 platform security is a joke. Spectre & Meltdown, x86 is borked deep down at the basics. Stuff like AMD SEV? Ha. You wish. Seriously, it's all snake oil to appease the enterprise & media sectors.
The only stuff that that is halfway sensible is what Google is doing, which is basically stick some secure micro in front of the BIOS/fw. And that of course comes with a big fat no-physical-tampering-assumed attack model. Soldering iron = all bets are off (but they admit it).
FlexVer avoids some of the mitm avenues by turning LPC from a shared bus into p2p one, with the key being checked early on to verify the firmware before it really starts, but soldering Iron is still a danger :-/
I *hate* shared buses in general. Not just from a security perspective, as soon as you make them the slightest bit fast the signal integrity becomes a nightmare. P2P all the way.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.