Hacker Newsnew | past | comments | ask | show | jobs | submit | nature556's commentslogin

lol, it's wierd


What does the discovery of the Bootkitty UEFI bootkit for Linux systems suggest about the evolving landscape of cybersecurity threats?


Nothing. This is just a proof of concept that is ridiculously easy to detect. If your attackers can drop files in your /boot or /boot/efi directory, I think you have much worse things to worry about than this.

In fact, this bootkit would be about the least thing I would worry about. Because by the time an attack can write to /boot, they can also write to /etc/init.d . And the later is not protected by "secure boot".


> Because by the time an attack can write to /boot, they can also write to /etc/init.d . And the later is not protected by "secure boot".

Bootkits are to make the infection both more difficult to detect and remove, so whether /etc/init.d is writable is pretty irrelevant.


How is an infection hidden somewhere in the friggin entire rootfs easier to detect and remove that one that literally replaces the one file for your kernel /boot ? What advantage could the latter possibly have ? Not to mention that something from a bootkit bootstrapping an infection in the root filesystem is the realm of useless tech demos like this one; while for something that can already write your rootfs, infecting the kernel is trivial.

The entire boot system has much, much fewer places for malware to hide compared to the entire "rootkit" OS attack surface which is astronomically larger. Secure Boot has always targeted the smaller and most useless of the swiss cheese holes.


It means "just trust us" is not and never was secure.

Trustworthy people don't ask you to trust them.


Indeed. For example, none of those CA in the built-in bundle in my browser ever asked me to trust them, that's how I know they are trustworthy.


You were asked by the browser publisher to trust them.

But those are merely defaults which you do posess ultimate control over, unlike the blobs and secrets in various bits of hardware.


No, I wasn't "asked" by the browser publisher to trust them unless you use the word "ask" in a very broad (almost to the point of meaninglessness) sense: when I installed my browser, it simply started using its pre-packaged bundle of CA certificates. Which it regularly updates, I imagine, although it also never asked me about what the update source I'd like to use either.

You can say that I implicitly trust the browser vendor's judgement in what CAs to trust, by the virtue of using the browser, and I'd agree with that. But saying that I was asked by the browser publisher to trust them? No, I disagree, I wasn't. It was a silent decision.


Ask as in expect.


This is a nice parallel to the real world: it can't function without a reasonably sized middle class that supports and sustains it.


Love this brand. I've been meaning to buy something Polyend for a while, looks amazing.


The FaCT DSL is used to define functions with predictable execution times to prevent timing leaks. In this notebook, functions have been created to simulate varying computational complexity (e.g., sorting, searching).


Abstract Real-world cryptographic code is often written in a subset of C intended to execute in constant-time, thereby avoiding timing side channel vulnerabilities. This C subset eschews structured programming as we know it: if-statements, looping constructs, and procedural abstractions can leak timing information when handling sensitive data. The resulting obfuscation has led to subtle bug


Since it appears you have chosen to incompletely quote the problem statement from the abstract as your submission statement, and since by accident or design the full title was not included in your submission:

This paper describes FaCT, a DSL for timing-sensitive computation. It is described as allowing readable, high-level cryptographic code, with efficient, constant-time behavior.

At a very rough skim, the language seems to have interesting conveniences around implementing mitigations to timing channel attacks, like marking particular values 'secret' for the compiler.


Hello hackers, I made this app of what happens behind SHA-256 algorithm, and some cool graphs.


This will be crazy


:/ Wierd


This is nice usecase for faker and dbm, cool


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: