Comments by "Edward Cullen" (@edwardcullen1739) on "Louis Rossmann" channel.

  1. 90
  2. 41
  3. 28
  4. 24
  5. 16
  6. 15
  7. 14
  8. 11
  9. 10
  10. 10
  11. 8
  12. 7
  13. 7
  14. 6
  15. 6
  16. 6
  17. 6
  18. 5
  19. 4
  20. 4
  21. 4
  22. 4
  23. 3
  24. 3
  25. 3
  26. 3
  27. 3
  28. 3
  29. 3
  30. 2
  31. 2
  32. 2
  33. 2
  34. 2
  35. 2
  36. 2
  37. 2
  38. 1
  39. 1
  40. 1
  41. 1
  42. 1
  43. 1
  44. 1
  45. 1
  46. 1
  47. 1
  48. 1
  49. 1
  50.  @jerrylove865  Notwithstanding the obvious straw-man argument, you demonstrate a lack of knowledge and understanding of how computer hardware works, the attacks that this technology is intended to defeat and how it is actually implemented. And actually, verifying the keyboard IS important, as there have been recorded instances of people injecting key loggers into the keyboard at a hardware level. But, dafuk do I know? 🤷‍♂️ If you think this doesn't pass the "smell" test, it's because you have zero clue what "good" and "bad" are supposed to smell like. Asking for a circuit diagram is just a loser move. It's a pathetic attempt to "win" an "argument" by demanding something you know cannot be produced. Oh, and this isn't an argument. This is someone who actually knows what they're talking about correcting your misconceptions. Deal with it. I'll repeat: the objective here is to defeat supply chain and firmware-level malware injection attacks by making the operator aware that an attack has taken place and to also make those attacks more difficult. To defeat this implementation, one would need to replace the CPU, which can be detected by manually confirming the CPU serial number (which is hard coded into the CPU). If the the verification hardware is on the board, then it could be defeated by modifying the board, as, ultimately, it would be setting a pin out to high or low. Unless, of course, the CPU does a cryptographic verification of some hardware component... Which would require that the key be included in the CPU... Which is precisely the implementation they have 🤦‍♂️ This implementation, because it verifies the loaded BIOS image cannot be defeated (or would require obscene investment to defeat), because the CPU is doing the verification. Replacing the CPU can be detected by verify the serial number, which is hard-coded into the CPU itself. You would, therefore, need to either modify the CPU or somehow get a new CPU and spoof the serial number. Or, somehow, convince the CPU to load one BIOS image but verify another... Plus, you probably should verify your HDMI cables, because there's no reason it can't contain a transmitter that is mirroring the output... But of course, you knew that already, didn't you? And the reason for memory encryption is to ensure that the contents of memory cannot be modified by anything other than the CPU. A modified board could, theoretically, arbitrarily modify memory contents (say, by overwriting the fixed location at which the BIOS is loaded into memory, AFTER the CPU has done verification...) The bottom line here is that teams of people, who, individually are smarter, better educated and more experienced in defeating hardware-level attacks, than you or I, have put a LOT of time and effort into this design. They neither put in superfluous features, nor left out features that need to be there.
    1
  51. 1
  52. 1
  53.  @jerrylove865  Dude, YOU'RE the one who asked for a circuit diagram! You refuse to engage with what I say and are surprised when I call you disingenuous? I'm only responding at your level. I'll say it again, even though you refuse to let it sink in: WHERE the cryptographic verification takes place IS important. This is basic, basic stuff. You are proposing that the main board handle verification and then send a signal to the CPU that everything is okay. This is literally like someone saying they've cleaned the pans so you can start cooking, then you starting to cook without making sure. The pans could be clean, but they might not and whether you notice may be pure luck. With verification happening on the CPU, this is the equivalent of you checking all the pans are clean and refusing to cook if they're not. Or put another way: would you trust a site that claimed everything was kosher, without verifying the server certificate? I went back over your previous arguments, which I have already addressed, but you ignored: this feature can be "defeated" by replacing the CPU, yes, but the fact that the CPU has been replaced is *detectable*, because the vendor keeps a bill of materials of everything that went into the machine, including serial numbers. The point about memory encryption, which you clearly failed to grasp, is that the verification process either checks then loads into RAM or loads into RAM and then checks. The point here is that this is done by being passed through the memory encryption, so there's "no way" an attacker could use a timing attack to subvert the BIOS image once it's loaded into RAM. Again, I don't know what more to say. There isn't just one feature that provides "vendor locking"; there are a suit of features, all added AT THE SAME TIME and when one looks at what they do, it's trivial for even someone like me (who hasn't worked in hardware security for over 5 years) to see how they are complementary and interconnected. This is why I raised full-memory encryption. As to the final paragraph in my previous: as you had already, disingenuously, asked me to produce a circuit diagram, I knew that you would ask me to provide an answer to how I would defeat your hypothetical board-based verification, which we both know would be literally like asking me to tell you how long the imaginary piece of string you're holding is. Finally, I just wanted to check if you knew who Luke Jennings was. If you knew, then you might have something to say, but you clearly didn't, which proves what I suspected by your words: you don't have anything above a very basic level of understanding of security at either the hardware or software level, let alone how they impact each other. Stick to YouTube. Taking your "argument" to serious security researchers would get you laughed out of the room.
    1
  54. 1
  55. 1
  56. 1
  57. 1
  58. 1
  59. 1
  60. 1
  61. 1
  62. 1
  63. 1
  64. 1
  65. 1
  66. 1
  67. 1
  68. 1
  69. 1
  70. 1
  71. 1
  72. 1
  73. 1
  74. 1
  75. 1
  76. 1