cwathen wrote:Firstly, the security concern itself. The reality is that if you are running at least XP SP2 with the firewall turned on you are unlikely to encounter any malware, even with no anti virus and no further updates applied.
While this is true for drive by downloads and things trying to get in from the outside, it doesn't stop any of the social engineering vectors which is the primary method used by malware these days to get themselves installed on a system. The idea of getting your malware into the pre-boot environment is not as a installation location, but as a way of avoiding detection and removal. If you're the software booted up by the PC, then you can happily patch the Windows kernal as it's loaded and put in your own hooks to make Windows believe that it's running as it expects while you silently remove any evidence of your existence.
cwathen wrote:That's not to say that there aren't 9 years worth of new security exploits out there, just that in practice you aren't likely to encounter them. I'm running Windows 7 SP1 fully patched with a virus scanner. It is beyond unlikely that anything will happen to my system - even though I don't have secureboot.
Unlike the majority of users, you sound like you have a clue. If a box pops up going "Important secutity update! Instal NOW!" are you going to click "Yes"? Lots of people will.
cwathen wrote:Whilst the security risk which secureboot exists I am unconvinced that it is a big enough threat to justify a perceived need to roll it out on as large a scale as is happening. You also have to wonder why no OS vendor apart from Microsoft seems to care about it.
Because no OS is targetted as widely by malware authors (although Android is getting there rapidly). Plus there's the after effects of a virus getting on to a system - with windows it's always Microsoft's fault, with Mac it's always the users fault, regardless of the merits of either claim.
cwathen wrote:And if the primary reason for it is to protect end users, why doesn't Microsoft retro-fit secureboot support to WIndows 7? After all it is still in mainstream support and so is entitled to feature updates and it is the most used version of windows out there.
Secureboot isn't just a feature that can be turned on or off like Notepad. It requires certified hardware, with the secureboot keys loaded into ROM (which weren't available at W7 release). It requires significant changes to the kernal. So to add it to a W7 machine, you'd need a clean install and probably new hardware. And unsurprisingly, Microsoft is quite interested in reasons which get people to upgrade.
cwathen wrote:With regard to secureboot itself, it already seems a bit flawed in that some Linux distributions are now looking at working in a secureboot-enabled configuration by using a Microsoft-certified bootloader which exists solely to load a further (non secureboot) bootloader to load the OS itself. In which case secureboot is useless at protecting these operating systems.
Are those OS's being targetted by malware to the same extent as Windows? Who's installing those OS's?
cwathen wrote:And of course (in theory at least) anyone who is willing to pay $99 to Microsoft can get a secureboot-compliant binary compatible with Microsoft's key and which will run on any system with secureboot enabled. It doesn't seem beyond the realms of possibility that fully signed-off binaries with malicious intent may end up circulating.
This is the danger with the whole system that some malware does get signed (or worse, the signing key gets leaked, as AFAIR the keys in the BIOS can't be altered (to prevent malware from adding themselves as validly signed) so a leak would invalidate the protection on every UEFI machine).
cwathen wrote:It's a condition of the Windows 8 hardware logo requirements that OEMs allow secureboot to be disabled. Windows RT licencing on the other hands already mandates that secureboot cannot be disabled on devices it ships with. And from the opposite end, RT will not boot on a non-secureboot device. Regardless of what secureboot was invented for, it is already being used to lock down a device and prevent (or at least limit) the operating system from being changed, or that operating system from being run on other hardware which it is technically capable of running on. Do you honestly believe this concept won't spread?
A primary reason for Windows RT's licencing requirements is hardware compatibility. Unlike the x86 / x64 world, ARM processors have no standard instruction support, no standard memory bus sizes, no standard peripherals and no standard interfaces. Each implementation, even of the same reference design can vary widely. Certifying a wide range of user-supplied hardware to work with the OS would be basically impossible.
Of course, there is the "why does it need to be certified" argument, but then if someone does manage to get RT running on some random tablet but it keeps crashing, all whoever installed it will do is complain to/at Microsoft that RT is shit.