| ▲ | mschuster91 2 hours ago | |||||||
> The device uses FDE and they key is provided over the network during boot, in the laptop case after the user provides a password. Sounds nice on paper, has issues in practice: 1. no internet (e.g. something like Iran)? Your device is effectively bricked. 2. heavily monitored internet (e.g. China, USA)? It's probably easy enough for the government to snoop your connection metadata and seize the physical server. 3. no security at all against hardware implants / base firmware modification. Secure Boot can cryptographically prove to the OS that your BIOS, your ACPI tables and your bootloader didn't get manipulated. | ||||||||
| ▲ | AnthonyMouse 2 hours ago | parent | next [-] | |||||||
> no internet (e.g. something like Iran)? Your device is effectively bricked. If your threat model is Iran and you want the device to boot with no internet then you memorize the long passphrase. > heavily monitored internet (e.g. China, USA)? It's probably easy enough for the government to snoop your connection metadata and seize the physical server. The server doesn't have to be in their jurisdiction. It can also use FDE itself and then the key for that is stored offline in an undisclosed location. > no security at all against hardware implants / base firmware modification. Secure Boot can cryptographically prove to the OS that your BIOS, your ACPI tables and your bootloader didn't get manipulated. If your BIOS or bootloader is compromised then so is your OS. | ||||||||
| ||||||||
| ▲ | amatecha an hour ago | parent | prev [-] | |||||||
they said network, not internet :) | ||||||||