these leaks are getting ridiculous...

  Рет қаралды 255,966

Low Level

Low Level

Күн бұрын

Пікірлер: 812
@LowLevelTV
@LowLevelTV 3 ай бұрын
wow haha I really wish I had a yubikey to secure myself online with 2FA: yubi.co/lowlevellearning-2024
@LowLevelTV
@LowLevelTV 3 ай бұрын
frfr
@paddyk45
@paddyk45 3 ай бұрын
!
@circularanemone
@circularanemone 3 ай бұрын
ur looking kinda insecure, no cap, get a yubyub
@circularanemone
@circularanemone 3 ай бұрын
ur looking kinda insecure, no cap. get a yubyub
@erictrinque6513
@erictrinque6513 3 ай бұрын
i c u, i aplod u klapklap
@JamesR624
@JamesR624 3 ай бұрын
- AT&T Data Breach - Crowdstrike Update Crash - CPU Predictive Processing Bypass - Intel CPU 100% Failure Rate Bug - Secure Boot Bypass Man, this month has NOT been a good month for computers and security.
@VivekYadav-ds8oz
@VivekYadav-ds8oz 3 ай бұрын
Try "year"
@stacklysm
@stacklysm 3 ай бұрын
"Year" is more accurate, add SSH vulnerability to the mix
@harriet-x.x
@harriet-x.x 3 ай бұрын
xz backdoor
@dagomara8380
@dagomara8380 3 ай бұрын
gay furries
@sonicbhoc
@sonicbhoc 3 ай бұрын
The GamersNexus Disappointment Tour shirt this year is going to be amazing
@LukasSmith827
@LukasSmith827 3 ай бұрын
Here we go again I guess
@SterileNeutrino
@SterileNeutrino 3 ай бұрын
DVD Jon, where are you today?
@NeoKailthas
@NeoKailthas 3 ай бұрын
See you next week
@alfonzo7822
@alfonzo7822 3 ай бұрын
That probably shouldn't have made me laugh
@chriss3404
@chriss3404 3 ай бұрын
These massive breaches, failures, and outages are going to turn this into a weekly news channel 😔
@metcaelfe
@metcaelfe 3 ай бұрын
You forgot the "ahh shit"
@pwnmeisterage
@pwnmeisterage 3 ай бұрын
It's annoying that all these sites report "the vulnerability affects 200+ motherboards from the big OEMs" but nobody has a compiled list of exactly which motherboards are affected and which are not. You can test your motherboard. You can't test the one in the store.
@vaikjsf34a
@vaikjsf34a 3 ай бұрын
you can buy it first then test the mobo and curse when you find its affected then refund it as long as you didnt bend pins :P
@AswinC2
@AswinC2 3 ай бұрын
The mentioned article has a list of 215 devices at the end.
@ThatOneChannelURL
@ThatOneChannelURL 3 ай бұрын
@@vaikjsf34a Only for a Newegg RMA center employee to drag a flathead screwdriver over the pins and blame you for it.
@SBlazeable
@SBlazeable 3 ай бұрын
@@pwnmeisterage just RMA it :)
@NikorouKitsunerou
@NikorouKitsunerou 3 ай бұрын
200+ models that have been tested. Sounds like a list we need of which aren't vulnerable.
@f.andersen3824
@f.andersen3824 3 ай бұрын
"Don't trust it. Do not ship!" Did it get shipped? Hell ya! ☠️
@arthurmoore9488
@arthurmoore9488 3 ай бұрын
As a dev, am I surprised? Hell no!
@ゾカリクゾ
@ゾカリクゾ 3 ай бұрын
I'm not a software dev but could this be what happens if you write a comment instead of opening a ticket/issue?
@pattyguy
@pattyguy 3 ай бұрын
@@ゾカリクゾ wat
@fullfungo
@fullfungo 3 ай бұрын
@@ゾカリクゾthis is why you are not a software dev
@ゾカリクゾ
@ゾカリクゾ 3 ай бұрын
@@fullfungo can u explain?
@AshnSilvercorp
@AshnSilvercorp 3 ай бұрын
"proprietary" and "security" really shouldn't be in the same sentence anymore...
@arthurmoore9488
@arthurmoore9488 3 ай бұрын
Yet plenty of security people genuinely believe that being able to see the source code makes you more vulnerable. It's one of the reasons companies like GlobalProtect are able to sell their proprietary VPN solution. :(
@kevikiru
@kevikiru 3 ай бұрын
Sometime ago, I would have totally agreed. Open source never guarantees security, it's all up to you to to implement it properly.
@emjizone
@emjizone 3 ай бұрын
Oh, so you prefer when nobody knows who own the keys you use ?
@evilmuke
@evilmuke 3 ай бұрын
having code validated by public is always better, implementing it in a way that even if breached risk and exposure will be reduced thats the other thing, from my experience its best to use both when You deploy something really critical
@XanTheDragon
@XanTheDragon 3 ай бұрын
ascension spotted
@neilbrookins8428
@neilbrookins8428 3 ай бұрын
Don’t worry guys, if someone guesses our 4 character password we will just change it to a new 5 character long password. And just in case this change is needed under short timeframe we will all agree in advance that the fifth character is a “1” and we will reuse the first four characters to make it easy to remember.
@ybvb
@ybvb 2 ай бұрын
The real tragedy here is that many such people exist :')
@lezbriddon
@lezbriddon 3 ай бұрын
Anyone else here old enough to remember flashing bios by physically removing the bios chip, UV erasing it and then re programming it, now THATS security.
@ck17350
@ck17350 3 ай бұрын
Yeah, we had one of those UV EEPROM burners at work in the 90's. I loved the sound made when burning all of those gates again.
@freedustin
@freedustin 3 ай бұрын
You got 7 thumbs up in 4 hours so there's your answer. Dinosaurs remember. Nobody else does.
@la.zanmal.
@la.zanmal. 3 ай бұрын
When exactly did it become possible to write to "firm"ware without that kind of physical setup, anyway? And why?
@nickwallette6201
@nickwallette6201 3 ай бұрын
The promise: "We can add new features and fix bugs in hardware you already own." The reality: "We can sell unfinished products with the carrot on a stick of potentially being finished.. some day."
@CyReVolt
@CyReVolt 3 ай бұрын
The flash parts that can be erased and rewritten in-system and from within the system are due to updatability. The physical extra parts make it hard for people to upgrade when there are already bugs in the firmware, which happens often. And yes, it is not as "firm" as the name suggests - especially with UEFI bringing a whole other OS on its own. Bryan Cantrill calls firmware the "software that is hard to get to". Anyway, secondly, part of the flash is used for storage, where user settings, EFI variables and such are stored, like volatile data from other platform components, like the CSME, possibly EC, ethernet adapter, etc..
@thewalrusdragon9579
@thewalrusdragon9579 3 ай бұрын
Think it’s a coincidence that tech layoffs are at a high and at the same time stuff like this is happening every other day now?
@MrAwesomeTheAwesome
@MrAwesomeTheAwesome 3 ай бұрын
Throw in a little increased rate of adoption of AI in software development and I'm not opposed to accepting that explanation.
@MyVlogTubes
@MyVlogTubes 3 ай бұрын
@@thewalrusdragon9579 A.I and lay offs + stupid CeOs. They always get the wrong man innthe place with no expertises wtf, this way he will fuck the company and the industry
@CyReVolt
@CyReVolt 3 ай бұрын
No, firmware has been a dumpster fire for decades. This is largely due to the ecosystem behind it. See the UEFI Forum whitepaper from August 2023 on embargo / disclosure periods for security issues. They demand a *year* because they are so slow and complex.
@quezabitheone4457
@quezabitheone4457 3 ай бұрын
100000% what I’ve been saying. You just confirmed I’m not crazy for thinking this!
@hashbrown777
@hashbrown777 3 ай бұрын
​@@CyReVoltyou meant to write "yes". Yes it is a coincidence.
@jorgelotr3752
@jorgelotr3752 3 ай бұрын
The powershell command doesn't work as given. Where it has '.:' between the right bracket and 'ASCII', it should say '::'. Also, 'True' is the response you should get if you are compromised ('False' means you are not, while an error message saying GetSecureBootUEFI is undefined means you don't have SecureBoot activated).
@Fedor_Dokuchaev_Color
@Fedor_Dokuchaev_Color 3 ай бұрын
Disabled secure boot because my Linux Distro wasn't working with it. You don't fear secure boot issues if you disable it 😊
@tablettablete186
@tablettablete186 3 ай бұрын
Tbh, I think you can add the signature or hash of your custom kernel.
@Pipe0481
@Pipe0481 3 ай бұрын
Same lol
@Octahedran
@Octahedran 3 ай бұрын
@@tablettablete186 You can, but i don't think its worth 15 minutes out of my day because that 15 minutes will always become 5 hours
@eps-nx8zg
@eps-nx8zg 3 ай бұрын
@@tablettablete186 Yeah its super easy, at least on arch to enroll your own keys and automatically sign your kernels and stuff.
@Mordecrox
@Mordecrox 3 ай бұрын
​@@tablettablete186signature: "1234"
@somerandomchannel2669
@somerandomchannel2669 3 ай бұрын
Good, secure boot is only good when you use your own keys, not ones made by people you don't even know
@catcatcatcatcatcatcatcatcatca
@catcatcatcatcatcatcatcatcatca 3 ай бұрын
Well, it is there to authenticate the bootloader binary. And they wrote it. Arguably you want to check their private key at least before you would self-sign it, and had they not leaked their keys in a git-repo it would have been perfectly good way to verify the binary is written by the author it was supposed to be written by. How I see it is that when you use your own key, you have no way of actually knowing what you sign, as it is proprietary code. You can however sign a state you trust, to ensure that state hasn’t changed.
@kellymoses8566
@kellymoses8566 3 ай бұрын
It is perfectly reasonable and actually a good idea for a company to ship products with their trusted root key and use it to verify signed software upgrades. BUT they must protect the private key by using real hardware security modules which make leaking the private root key impossible but they are expensive and painful to use so many companies don't bother.
@somesalmon5694
@somesalmon5694 3 ай бұрын
You know you can resign or add another signature to the binary correct? If you remove the companies PK from secure boot you're not just blindly signing completely unknown code and there are open source bootloaders right?
@test-rj2vl
@test-rj2vl 3 ай бұрын
Expectations: Viruses gonna bypass secure boot. Reality: Game cheaters gonna bypass secure boot that anticheats require these days.
@jamesarthurkimbell
@jamesarthurkimbell 3 ай бұрын
Rogue nation states have obtained +12.5% melee damage buff for more than the allotted thirty seconds
@vaikjsf34a
@vaikjsf34a 3 ай бұрын
Not sure why game cheaters would, because cheats don't run on the firmware and in some cases there are even peripherals they can plug in that cheat for them. I think they can still run an executable even if secure boot is there, they just cant flash the firmware no? not too familiar with secure boot or TPM I think they trash.
@SirLightfire
@SirLightfire 3 ай бұрын
​@@vaikjsf34ait would be a very difficult thing to do, but you could inject your own bootloader into the boot process, that then injects a custom kernel patch into the kernel. From there, it'd be trivial to hide anything you want from the anticheat
@terorvlad
@terorvlad 3 ай бұрын
Easy fix - Just ban all devices with said vulnerability the same way RUST banned all a4tech hardware due to the powerful macro software that some people used to make anti recoil macros. Sure, you will piss a lot of people off, but hey, all in the name of security
@JohnDoeWasntTaken
@JohnDoeWasntTaken 3 ай бұрын
@@vaikjsf34a Because kernel-level anti cheats like Vanguard which is required to play Valorant require secure boot to be enabled.
@LetrixAR
@LetrixAR 3 ай бұрын
0:08 - That was your mistake
@NatetheAceOfficial
@NatetheAceOfficial 3 ай бұрын
"I'm not even supposed to be here today!"
@nomore6167
@nomore6167 3 ай бұрын
@@NatetheAceOfficial It's sad how Smith decided to end Clerks III. I guess he finally wanted to put that franchise to bed.
@MZZenyl
@MZZenyl 3 ай бұрын
The PowerShell script isn't even going to work, it incorrectly uses ".:" (which isn't valid PowerShell code), when it should be "::", the static accessor operator.
@RokeJulianLockhart.s13ouq
@RokeJulianLockhart.s13ouq 3 ай бұрын
Broken PowerShell scripts are par for the course. Somehow, scripted OOP breaks peoples' minds.
@MZZenyl
@MZZenyl 3 ай бұрын
@@RokeJulianLockhart.s13ouq Yeah, being primarily designed with less tech-savvy, non-developer sysadmins in mind (hence the verbose verb-noun naming conventions of cmdlets), a lot of PowerShell scripts tend to be written quite poorly. And in this case, the script is essentially just a .NET API call, which could just as well be written in C#. But this is just straight up invalid syntax. The author of the article didn't even bother copy-pasting the script into the shell and executing it before publishing the article.
@ZergRadio
@ZergRadio 3 ай бұрын
Is this correct? [System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI PK).bytes) -match "DO NOT TRUST|DO NOT SHIP"
@MZZenyl
@MZZenyl 3 ай бұрын
@@stefanalecu9532 Indeed, I do that regularly. Although in my experience, the code quality of C# code tends to be greater than that of PowerShell.
@matteofalduto766
@matteofalduto766 3 ай бұрын
password must have been "asdf"
@susugar3338
@susugar3338 3 ай бұрын
How do you know my password?😢
@spookynutsack
@spookynutsack 3 ай бұрын
@@susugar3338 because you said it
@smallSphere69
@smallSphere69 3 ай бұрын
How do you know my area's power station's controller's password? 😢
@jalil2985
@jalil2985 3 ай бұрын
I vote "test"
@JoeJoeTater
@JoeJoeTater 3 ай бұрын
​@@jalil2985Yeah, given the content of the "Issuer" field, that seems pretty likely.
@Deniil2000
@Deniil2000 3 ай бұрын
private keys should be made by people who want to protect their devices against maid attacks, not by companies. this is just absurd
@2khz
@2khz 3 ай бұрын
You can (usually) enroll your own secure boot keys *IF* your board's UEFI supports it... In which case it's up to you to sign the bootloader and/or kernel. I 100% agree that these companies should not hold the keys and determine what it is "secure" to boot from on OUR hardware.
@SterileNeutrino
@SterileNeutrino 3 ай бұрын
Maid and catgirl attacks.
@2khz
@2khz 3 ай бұрын
@@SterileNeutrino need
@Foxite__
@Foxite__ 3 ай бұрын
@@SterileNeutrino I'm gonna start calling it an Evil Catgirl attack now.
@CPSPD
@CPSPD 3 ай бұрын
@@SterileNeutrino when you put it that way
@NinjaRunningWild
@NinjaRunningWild 3 ай бұрын
“Secure” in modern computing just means “safe for now”.
@benhetland576
@benhetland576 3 ай бұрын
No, it means "vendor remains in control of _your_ computer".
@NinjaRunningWild
@NinjaRunningWild 3 ай бұрын
@@benhetland576 Those two things aren’t mutually exclusive. Study formal logic.
@benhetland576
@benhetland576 3 ай бұрын
@@NinjaRunningWild Fair enough, but notice also that safe isn't the same as secure, and neither implies the other.
@asailijhijr
@asailijhijr 3 ай бұрын
Buffalo
@asdfghyter
@asdfghyter 3 ай бұрын
@@benhetland576 until they inevitably slip up, so every hacker in the world can use the vendors' backdoors
@SterileNeutrino
@SterileNeutrino 3 ай бұрын
I never understood the value proposition of "secure boot" except as making Open Source bootloaders hard or impossible to use and disallowing tweaking/analyzing manufacturers firmware aka. "locking the system down like a Playstation", and maybe make money on the side with "signing services". Anyway, I found a writeup of the state of this approach from 2020 in "Communications of the ACM": "Securing the Boot Process: The hardware root of trust."
@probablypablito
@probablypablito 3 ай бұрын
Secure boot is super important, especially on mobile devices. On many Android phones (where it is called Verified Boot) it is often disabled when rooting the device. This means anyone with access to the phone can run any code they want, such as a bruteforcer for a PIN (assuming no hardware limiting) With it on, only updates/code signed by the registered private key can be used. This ensures that if someone steals your phone, your data & phone are fully inaccessible.
@JamesR624
@JamesR624 3 ай бұрын
_except as making Open Source bootloaders hard or impossible to use and disallowing tweaking/analyzing manufacturers firmware aka. "locking the system down like a Playstation", and maybe make money on the side with "signing services"._ That's exactly the only value proposition. It was a way for Microsoft to keep it's technically illegal monopoly and they sold it as a "security feature".
@lainwired3946
@lainwired3946 3 ай бұрын
​@@probablypablitocelebrites various services show this doesnt reslly help though doesnt it. Samsung even have a bunch of knox tech and theyre one of the most vunerable.
@Madinko12
@Madinko12 3 ай бұрын
@@probablypablito This is not perfectly accurate. Though they achieve basically the same goal as you mentioned, AVB and Secure Boot are two completely distinct thing: most Android devices don't support UEFI which is needed for Secure Boot. Also, all SB/AVB "guarantees" is that you don't execute a bootloader that hasn't been signed by whatever keys are enrolled on the device. Once you've executed that bootloader, arbitrary code can be executed by other means. It's not much about bruteforcing: with physical access, one could extract your eMMC and try bruteforcing from there (as I don't think the master key is stored in a "secure device", correct me if I'm wrong though). You *should* be expecting RCE exploits on your phone anyways if someone has physical access to it: the safety of your full disk encryption should not rely on the ability of the attacker to execute arbitrary code on your device. However, SB/AVB prevents installing and executing a rogue bootloader that would, for example, keylog the decryption password when user unlocks the device.
@mx338
@mx338 3 ай бұрын
It really doesn't make open source bootloaders impossible at all, just load your own keys into the BIOS.
@eeka_droid
@eeka_droid 3 ай бұрын
Thanks for bringing awareness on the subject Ed, it led me to double check my secure boot settings. People are questioning the effectiveness of secure boot after this issue but what they're failing to realize is that this is a "~200 devices affected" kind of thing rather than "all devices from 200 manufacturers affected", there's a huge difference. Thankfully my device is not compromised at this time.
@nomore6167
@nomore6167 3 ай бұрын
"rather than 'all devices from 200 manufacturers affected', there's a huge difference." - True, but on the other hand, we don't know how many devices currently have unknown/undisclosed vulnerabilities. The ONLY reason we know about this vulnerability is because someone posted the key on Github.
@grimvian
@grimvian 3 ай бұрын
It's a bit funny to think of the computer, I started up with 40 years ago. The OS was in a ROM or EPROM and you had to replace the chip to change the OS. When rebooting NOTHING had changed, but now everything have to be updated all the time, but why do anything else than the OS need to have kernel access? Companies should not have the keys, it's just a matter of time, before something is exposed.
@TheKeirsunishi
@TheKeirsunishi 3 ай бұрын
Wonder how many mobos will not receive a firmware update as they are considered "deprecated"
@tomschi9485
@tomschi9485 3 ай бұрын
*That's a stupid question: “how does this keep happening???” The answer is triaial: manufacturers can be grossly negligent in threatening customers and never have to take responsibility.* If it were otherwise, Dell, for example, would now be sued, e.g. with 10$ for each affected device. *I bet manufacturers would never define a standard router password 'admin/admin' again and they would take very simple measures to ensure that test keys would never be in productive systems again.* 🙂
@marcusmeaney
@marcusmeaney 3 ай бұрын
wtf is a secure boot. i use arch btw
@buddinglearner7085
@buddinglearner7085 3 ай бұрын
lmao
@darrennew8211
@darrennew8211 3 ай бұрын
A secure boot ensures the part of the bootloader that prompts you for your encryption key to unlock the encrypted boot drive hasn't been replaced with code that steals your password.
@itsTyrion
@itsTyrion 3 ай бұрын
@@darrennew8211 nope
@darrennew8211
@darrennew8211 3 ай бұрын
@@itsTyrion Yep. Secure boot is designed to protect all the parts of the operating system that aren't protected by the OS authentication systems. I.e., it protects everything you can get to without a password. In theory.
@PokeRuto898
@PokeRuto898 3 ай бұрын
​@@darrennew8211Secure Boot doesn't encrypt anything. TPM does. Secure Boot itself only lets verified code run at boot. This prevents evil maid attacks such as modifying the bootloader to put a keylogger on it and steal the encryption key.
@J.erem.y
@J.erem.y 3 ай бұрын
If you dont control it, you dont own it. Its really as simple as that.
@test-rj2vl
@test-rj2vl 3 ай бұрын
NSA really needs to learn not to leaks their secret keys.
@vaikjsf34a
@vaikjsf34a 3 ай бұрын
@@Maxjoker98 now we know why they are the ones who hold the keys and not us :)
@brettlaw4346
@brettlaw4346 3 ай бұрын
@@Maxjoker98 This would be a plausibly deniable leak. Just try to remember, your government made an agreement with at least 14 other governments that they were allowed to spy on you as long as they "promise" to share the information they gather. I think we can *fingers crossed* be sure, that they aren't using that agreement for their own gain or sharing the information with US citizens inside the country with direct lineage to foreign intelligence so they can have an advantage in love, economics and war.
@spicybaguette7706
@spicybaguette7706 3 ай бұрын
​@@Maxjoker98They might have one of Microsofts private keys. Or who knows, maybe they don't even need them...
@moalboris239
@moalboris239 3 ай бұрын
@@Maxjoker98 Honestly yeah the NSA is far more likely to show up and tell them they need their keys and here is their court orders for it. They don't really have a lot of need to be sneaky when they have government backing.
@RadikAlice
@RadikAlice 3 ай бұрын
I'm not even surprised, not because of what's been happening recently. But because I already knew secure boot really just means "Microsoft-approved boot OS" Was never about security, but having more control of the user's machine. Keeping out possible competition
@eugenej.5584
@eugenej.5584 3 ай бұрын
00:33 "slow learning channel" :D
@eadweard.
@eadweard. 3 ай бұрын
I'm old enough to remember when Secure Boot was a Microsoft conspiracy to stop Linux.
@throwaway6478
@throwaway6478 3 ай бұрын
To be fair, literally everything is a Microsoft conspiracy to stop Linux to certain groups. I've started calling it "Windows Derangement Syndrome", since the symptoms are so similar.
@NJ-wb1cz
@NJ-wb1cz 3 ай бұрын
@@eadweard. so, you're older than a few years?...
@eadweard.
@eadweard. 3 ай бұрын
@@NJ-wb1cz I am.
@NJ-wb1cz
@NJ-wb1cz 3 ай бұрын
@@eadweard. wow
@eadweard.
@eadweard. 3 ай бұрын
@@NJ-wb1cz Bar burpates.
@jcdentonunatco
@jcdentonunatco 3 ай бұрын
Why does every motherboard manufacturer use the same private key? That sounds incredibly stupid
@CMarxChako
@CMarxChako 3 ай бұрын
Probably part of the "UEFI Feature" standard...
@markustieger
@markustieger 3 ай бұрын
Or you just take control of your secure boot and put your own platform key in there. (Yes you can do that)
@igorordecha
@igorordecha 3 ай бұрын
Remember: this doesnt affect you if you dont use secure boot in the first place
@faares_
@faares_ 3 ай бұрын
i don't completely understand secure boot and what its associated with (if its just a windows thing or a motherboard thing) but if i get mint linux will i neeed to worry
@firewalldaprotogen
@firewalldaprotogen 3 ай бұрын
i've had secure boot disabled for years, especially since the one hack that had something to do with it. just seems useless at this point
@Madinko12
@Madinko12 3 ай бұрын
Secure boot is useful, you just need to disable vendor keys and enroll your own.
@COALEDasICE
@COALEDasICE 3 ай бұрын
Secure boot protects important data, it's very useful.
@arcaegecengiz
@arcaegecengiz 3 ай бұрын
The fact that a way to bypass secure boot has been found, and one or two viruses are designed to be able to do so does *not* mean that you're better off letting all other malware easily insert code at boot by disabling secure boot. Having it enabled doesn't affect you detrimentally in any way. Unless you use a custom unsigned Linux kernel, keep secure boot on. It's like disabling Windows Defender because some malware found a way to bypass it.
@mx338
@mx338 3 ай бұрын
That's a really bad fallacy in cybersec, just because there's ways to bypass some security measure doesn't mean that you shouldn't use it. Defence in depth is one of the most fundamental security principles.
@Ferrari255GTO
@Ferrari255GTO 3 ай бұрын
@@firewalldaprotogen more like insecure boot, amiright?... Right?... Yeah it wasn't that funny
@eitantal726
@eitantal726 3 ай бұрын
Not your keys, not your hardware
@emjizone
@emjizone 3 ай бұрын
That's why you should never buy any computer with a firmware and design, code and deploy the boot, kernel and OS yourself, deciding by yourself how to interpret and possibly execute every single software you get access to. Same for your car: you don't design the fuel you put in it, you don't decide of the design of the airbag: nothing but ownership issues ! Build you car yourself from raw mineral : THAT is ownership and security ! 🤣
@spicybaguette7706
@spicybaguette7706 3 ай бұрын
​Imagine if your manufacturer had the key to your car (or, more accurately, a key that opens all the same models of that car) and someone just carelessly leaves it somewhere in public. And I have to argue, you only truly own your device when you've manufactured all the chips with your own billion dollar fab of course
@AetherStreamer
@AetherStreamer 3 ай бұрын
@@emjizone There is a big huge jump from _having the only and only keys of your own vehicle,_ to "building it yourself from raw minerals". Your analogy is just plain bad and wrong.
@thesenamesaretaken
@thesenamesaretaken 3 ай бұрын
​@@emjizoneCringe take
@kellymoses8566
@kellymoses8566 3 ай бұрын
It is perfectly reasonable and actually a good idea for a company to ship products with their trusted root key and use it to verify signed software updates. BUT they must protect the private key by using real hardware security modules which make leaking the private root key impossible but they are expensive and painful to use so many companies don't bother.
@brianbrian5842
@brianbrian5842 3 ай бұрын
OEM management: Hey we gotta make sure we offer secure boot just like our competitors. *Proceeds to distribute certificates insecurely*
@redwind3475
@redwind3475 3 ай бұрын
"My video rate is going up because guees the world is on fire." should be the tagline of all of KZbin at this point 😂😂😢
@namenlosNamenlos
@namenlosNamenlos 3 ай бұрын
How many years since defected products to stop preventing secure boot???......... 🤔
@XerrolAvengerII
@XerrolAvengerII 3 ай бұрын
that secure boot isn't actually secure is the least surprising revelation tbh
@user-to7ds6sc3p
@user-to7ds6sc3p 3 ай бұрын
@@XerrolAvengerII Well it is, until it isnt'.
@roguegryphonica3147
@roguegryphonica3147 3 ай бұрын
It just seems like branding right now... pepsi is really just flavored carbonated water... secure boot is really mostly secure until it isn't.
@SanguinariusUmbra
@SanguinariusUmbra 3 ай бұрын
Secure boot is secure as long as you: 1. enroll your own keys, and 2. aren't being threatened by a state actor. This problem is caused by irresponsible manufacturers who don't know how to do proper secret management, not by broken secure boot implementations
@JohnDoe-us5rq
@JohnDoe-us5rq 3 ай бұрын
That took way longer than I expected, when they introduced that feature back in the days.
@XenXenOfficial
@XenXenOfficial 3 ай бұрын
The year of CyberPunk 😅🤣
@nonotreallythx
@nonotreallythx 3 ай бұрын
"You have a secret key that lives inside your OEM" is perhaps the most confusing way to state this, but what it means is, the manufacturer is the one with the private key, and the key on your motherboard is a _public_ key that verifies the signature against the certificate chain.
@RealTNSEE
@RealTNSEE 3 ай бұрын
If they have access and admin rights to the machine to mess with secure boot... the house is on fire already. This just adds to the pwnage, but isn't the root cause of it.
@Wampa842
@Wampa842 3 ай бұрын
god fucking dammit that is at least 400 computers I'm responsible for that I'll have to check
@marcellkovacs5452
@marcellkovacs5452 3 ай бұрын
4:32 "OEM manufacturer" = original equipment manufacturer manufacturer
@sparcnut
@sparcnut 3 ай бұрын
This message brought to you by the Department of Redundancy Department.
@black56night
@black56night 3 ай бұрын
"if you are a freak and use Powershell". Absolute gold! 😂
@wlockuz4467
@wlockuz4467 3 ай бұрын
PR Changeset "abcd" -> "abcde" _Increased password entropy for encrypting the private key_
@glarynth
@glarynth 3 ай бұрын
Thanks for coming in on your day off 👍
@whtiequillBj
@whtiequillBj 3 ай бұрын
This feels like it's just one thing after another this year.
@vlaydn
@vlaydn 3 ай бұрын
just checked on my laptop to see if I have one of those do not trust pk's ( i don't know anything about coding or IT so i'm just following the steps people show in the video), turns out it is indeed one of these which have this vulnerability, wtf do I do now? pray that no one hacks into my PC? I will probably buy a new one but how do I know that's not compromised as well?
@Peekofwar
@Peekofwar 3 ай бұрын
The problem with 2FA from what I've heard, is that many sites that use it require you to have a less secure 2FA option enabled, and it's a this OR that approach instead of this AND that. Meaning the more-secure option is not making the account more secure when an attacker only needs to attack the less secure 2FA, for example SIM swapping or something.
@666samurai_
@666samurai_ 3 ай бұрын
“if you’re a freak and use power shell” took me out
@rashidisw
@rashidisw 3 ай бұрын
The problem rooted in the wish to do away with READ ONLY chip and TOTALLY replace it FLASHABLE chip. The wish were granted but it has the consequences!
@juanmacias5922
@juanmacias5922 3 ай бұрын
1:16 he said the thing! :D
@Iceman259
@Iceman259 3 ай бұрын
It’s crazy that the channel blew up so big that he had to change his name to Ed
@bjorntorlarsson
@bjorntorlarsson 3 ай бұрын
Wouldn't it be the height of irony, if he makes his next video on the Youbico hack...?
@SpeedUpThatComputer
@SpeedUpThatComputer 3 ай бұрын
This is why we need a non-flashable bios. It would solve the problem. However it does make a new problem. You can't update the microcode to fix issues things like the CPU.
@thedapperfoxtrot
@thedapperfoxtrot 3 ай бұрын
Four character password: 1234 ...that's something an idiot would put on their luggage. "Honey! I'm ordering new luggage!"
@JohnnyLin-z8u
@JohnnyLin-z8u 3 ай бұрын
UEFI never fails to fail
@rekall76
@rekall76 3 ай бұрын
is UEFI now synonymous with RBMK ? 🤔☢️
@icybrain8943
@icybrain8943 3 ай бұрын
UEFI was also the password
@skyrailmaxima
@skyrailmaxima 3 ай бұрын
Ah Secure Boot getting what it deserves.
@arthurmoore9488
@arthurmoore9488 3 ай бұрын
What? Secure Boot is a nice security feature. The only time when that type of feature is not OK is when the manufacturer does not allow 3rd party software and uses signing to prevent it. Like mobile phones do. Secure Boot even lets you enroll your own keys!
@coreC..
@coreC.. 3 ай бұрын
quote: "What secure boot is supposed to be..." That sounds scary already :)
@reymalik1023
@reymalik1023 3 ай бұрын
Disabled secure boot to install arch a while back and forgot to turn it on again, totally forgot about it's existence till now
@易利亚
@易利亚 3 ай бұрын
So does this mean they want us to purchase a newer device and throw out our old device? Imagine have 14th intel and these motherboard... We know its a bomb, but cant defuse it
@teleprint-me
@teleprint-me 3 ай бұрын
A basic rule in cryptography is to always verify and never trust. This is why you should always be allowed to generate your own keys and only you should have a private key. Centralized 3rd parties are alwats going to be a major vulnerability.
@moneyluser5711
@moneyluser5711 3 ай бұрын
Secure boot is NOT a good thing because it is centrally managed by extremely untrustworthy corporations.
@junzhengca
@junzhengca 3 ай бұрын
I mean, same goes for HTTPS, you need a central list of trusted CAs. Better than not having it, plus, you can turn it off.
@ozzieggg
@ozzieggg 3 ай бұрын
you can roll your own keys
@RokeJulianLockhart.s13ouq
@RokeJulianLockhart.s13ouq 3 ай бұрын
​@@junzhengca I agree, but I trust ICANN more than I do Dell.
@lbgstzockt8493
@lbgstzockt8493 3 ай бұрын
Is there any evidence of this actually being bad or is it just more conspiracy and fearmongering by people who would force me to use Linux at gunpoint?
@threepe0
@threepe0 3 ай бұрын
@@junzhengca no you absolutely do not.
@mixit247
@mixit247 3 ай бұрын
Honestly nobody in those corporations gives a shit as long as the money keeps on rolling in.
@wargreymon2024
@wargreymon2024 3 ай бұрын
Looks like you have more juicy content to come in this year 😁
@dono42
@dono42 3 ай бұрын
The PowerShell command has a typo in it. It should be double colon (::) rather than dot colon (.:) before the ASCII.GetString.
@brianbrian5842
@brianbrian5842 3 ай бұрын
Sure the OEM(s) used secure boot certificate technology during manufacturing but they did so in a way that effectively undermines the whole reason to be implementing secure boot in the first place. OEM managers were probably non technical and saw secure boot as no different as any item on a checklist. "We have it? Okay good". Secure boot needs to be managed directly by sometime who has a technical understanding of securely distributing security certificates and the importance of doing so SECURELY.
@MandenTV
@MandenTV 3 ай бұрын
Anti-tech movement making moves.
@attilao
@attilao 3 ай бұрын
I thought most folks would use their own certificate authority for secure boot. Why would I trust a public CA if I don't have to? The main use case for public CAs is certificate distribution, e.g. for TLS over the public internet. Moreover, anyone who is self-signing their UKI would have to replace the CAs on the board - which I thought was basically everyone except maybe Windows users.
@blonkasnootch7850
@blonkasnootch7850 3 ай бұрын
It happen when ever sales go down and new hardware have to be sold 😂
@Fakyp
@Fakyp 3 ай бұрын
Thks god, my gigabyte laptop seems to be safe, this fucking year has been wild so far
@shoego
@shoego 3 ай бұрын
Security by obscurity AGAIN?
@jan_en_ik
@jan_en_ik 3 ай бұрын
That is most cyber security. as long as someone doesn't have the key/password your safe enough but, if the secret gets leaked Pandoras box is opened.
@throwaway6478
@throwaway6478 3 ай бұрын
Most encryption works by the keys not being known by everyone - that is, obscurity.
@drdca8263
@drdca8263 3 ай бұрын
@@throwaway6478No, “the adversary doesn’t know the keys” is *not* “security by obscurity” . “Security by obscurity” is when the security is based on adversaries not knowing how the system works, and is *specifically in contrast to* security based on adversaries not knowing the secret keys.
@SBlazeable
@SBlazeable 3 ай бұрын
this isn't security by obscurity this is security by password authentication with a stupidly low amount of bits of entropy so it was easy to crack security by obscurity is when you use a reversible, simple cypher such as the alphabet +2 where A=C B=D and so on, or you hide passwords by checking the "show hidden files" box to unchecked or you take the first half and append it to the second half so ABCD becomes CDAB, THAT'S obscurity
@Sylvan_dB
@Sylvan_dB 3 ай бұрын
Once you conflate "obscurity" with "secret" you realize that all security rests on a foundation of secrets, or obscurity.
@sloppydoggy9257
@sloppydoggy9257 3 ай бұрын
Automation prevents human mistakes, but automation eventually breaks and when it does it reproduces the same mistake on every unit. This is an expected kind of issue. It will come back again some day..
@hyamamoto2000
@hyamamoto2000 3 ай бұрын
I designed offline signing procedures for financial institutions. Damn if the devices are on the list, we might need to renew many of them (I'll physically destroy and blend them all) and get them re-audited by third parties >.> I'm also curious that Chromebooks' keys are safe. Those are securebooted linux.
@monad_tcp
@monad_tcp 3 ай бұрын
0:27 good, very good, the architecture is open and free still !
@model.citizen.ps3
@model.citizen.ps3 3 ай бұрын
Hey Low Level Learning! I thought I recognized u from my Discord 🙂 Great video - I've always found "Secure" boot a bit sus, lol. Lore ur channel!
@memejeff
@memejeff 3 ай бұрын
"Leaked on github" KEKW
@smallSphere69
@smallSphere69 3 ай бұрын
Windows XP src code also available there
@luketurner314
@luketurner314 3 ай бұрын
Four character password on the platform key be like, "You're the head of security and your password is 'password'?!" - Spider-Man: Far From Home
@notafbihoneypot8487
@notafbihoneypot8487 3 ай бұрын
A day in the life: Wakes up 😊 Gets lower level learning notification: 😊 Sees title 😮 Watches vid :/😢
@yoshi314
@yoshi314 3 ай бұрын
from one article "For reasons that aren’t clear, the test keys made their way into devices from a nearly inexhaustive roster of makers" LAZINESS.
@BitwiseMobile
@BitwiseMobile 3 ай бұрын
DAMNIT! I ALWAYS do this. I come up with an idea as a prototype/proof of concept. Once I prove my hypothesis I pretty much shelve it. The last thing I worked on two years ago was an SSO dongle very similar to this YubiKey thing. I went super paranoid and used biometric - fingerprint - in order to access it. That way it had 2FA built in - something you are, and something you have. Your fingerprint is something you are - it's unique to you and nobody else can take it from you. The device is something you have, and it can physically be taken from you. Edit: Forgot to mention it was built around a Pico Pi for the prototype. Those are like $4 boards with a custom M0 Cortex chip called an RP2040 which is the microcontroller in the Raspberry Pi ecosystem. It can run MicroPython which makes writing the application code dirt simple and pretty safe as well. Writing native C can introduce memory bugs that could be exploited.
@asificam1
@asificam1 3 ай бұрын
There is now a project developing an open source U2F dongle (part of what the yubikey does)... tricky part is getting a dongle that works U2F and SSH and GPG... and now they want us to use discoverable device resident crednetials called Passkeys which used to be called Password-less FIDO2 discoverable credentials. I dislike device resident creds for so many reasons including these dongles have VERY limited key storage space, and also U2F uses the same math and has same security as Passkeys but lets the host store a wrapped key (only the correct U2F dongle can decrypt the secret portion with its master key) which means they can be used for an unlimited number of logins on unlimited website (literally unlimited), but also an attacker with your key has to first find by trial and error which account that key opens and where... discoverable credentials are less good because the attacker now has the key and a list of what it opens... bypass the PIN (If one was set anyhow) and you're in.
@mjmeans7983
@mjmeans7983 3 ай бұрын
You can bet state actors aren't happy that someone is shining a light on a bypass that has existed for years.
@Elesario
@Elesario 3 ай бұрын
Was mildly amused when it said DB database. Guess I'll put that one next to my PIN number.
@virkony
@virkony 3 ай бұрын
Just create a ring of root authorities owned by different entities. Require all of them to agree so even if one is compromised, you still can't bypass "the ring".
@GyattGPT
@GyattGPT 3 ай бұрын
This kind of stuff is a problem with the culture that doesn't care about security. Probably at least a few dozen people knew that anyone on their team could easily grab a copy of the key, and did nothing about it.
@davidf6592c
@davidf6592c 3 ай бұрын
Hey man, love your work. Important question, I stumbled on this video, the day before I got a gigabyte B450M delivered. I opened the box containing all the components for my PC build to find all the components were factory sealed, except the motherboard. Of course, after watching this video, I'm paranoid. So I enquired with the supplier and the Gigabyte local representatives as well and I'm shocked to learn that the boxes are not necessary "factory sealed". This just seems absolutely bonkers, the supply chain from the manufacturer to consumer have just accepted that it's ok for this low level (again, lover the channel 😉) and vulnerable component to not be sealed. I think you should dive into this with an investigation, and call it out.
@spicybaguette7706
@spicybaguette7706 3 ай бұрын
5:58 Don't flex on me like that💀
@GeorgeNoiseless
@GeorgeNoiseless 3 ай бұрын
Wow, Gigabyte is winning this one with the largest number and variety of compromised devices! Intel/AMD/ARM Server boards, full Rackmount Servers, Mini-PCs... At this point I'm downright impressed by Gigabyte's consistency in upholding their poor reputation.
@not-underscore
@not-underscore 3 ай бұрын
And windows 11 requires secure boot to be enabled 😂 So much for security ,no?
@zzco
@zzco 3 ай бұрын
lol shame on motherboard manufacturers for taking EFI test certs and reusing them blindly, lmao.
@TimBell87
@TimBell87 3 ай бұрын
0:06 "and then I opened up twitter" Why? Do you not like having mental health?
@fatherfoxstrongpaw8968
@fatherfoxstrongpaw8968 3 ай бұрын
the only reason i clicked on your video from the youtube suggestions is to tell you what i've been telling all these suspense and cliffhanger titlers which is this. if i don't know what the vid is about, there's a 96% chance i'm not going to waste my time clicking on it. i really wish artists like you would quit wasting youtube storage space.
@somesalmon5694
@somesalmon5694 3 ай бұрын
People saying secure boot doesnt make anything more secure and that its a proprietary stack that the user has no control over don't know what or how secure boot actually works. The user can reset, remove or distrust whatever keys they want and create their own to replace the Microsoft and oem keys to have full control over which signed binaries are allowed at boot
@xExekut3x
@xExekut3x 3 ай бұрын
it's like everything that movie Brazil predicted is happening... competency failure
@defnlife1683
@defnlife1683 3 ай бұрын
"What if we blame C again?" - Rustaceans, probably.
@danielgrezda3339
@danielgrezda3339 3 ай бұрын
Another day, another massive cyber problem. The internet police are too busy now.
@BrokeTheGamer
@BrokeTheGamer 3 ай бұрын
I’m fairly certain, and this is my opinion, there is a covert governmental campaign to minimize Microsoft/Windows market share into the future.
@TristanSmith
@TristanSmith 3 ай бұрын
Oh i was scared for a second. I turn that shit off.
this vulnerability shouldn’t even exist
14:33
Low Level
Рет қаралды 219 М.
malicious javascript injected into 100,000 websites
12:28
Low Level
Рет қаралды 214 М.
They Chose Kindness Over Abuse in Their Team #shorts
00:20
I migliori trucchetti di Fabiosa
Рет қаралды 12 МЛН
Мама у нас строгая
00:20
VAVAN
Рет қаралды 4,3 МЛН
The Anti-Virus Tier List
9:38
Chris Titus Tech
Рет қаралды 1,3 МЛН
I Designed My Own RP2350 Board and You Can Too!
7:04
Emez Labs
Рет қаралды 2,5 М.
new attack leaks secrets using RAM as a radio
8:01
Low Level
Рет қаралды 300 М.
US Government declares the safest programming language
14:00
Low Level
Рет қаралды 114 М.
DoubleSpeak, How to Lie without Lying
16:15
What I've Learned
Рет қаралды 11 МЛН
if you view this image, YOU GET HACKED.
8:40
Low Level
Рет қаралды 388 М.
7 Cybersecurity Tips NOBODY Tells You (but are EASY to do)
13:49
All Things Secured
Рет қаралды 798 М.
there’s no way they did this..
12:50
Low Level
Рет қаралды 155 М.
researchers find an unfixable bug in EVERY ARM cpu
9:48
Low Level
Рет қаралды 552 М.