Gentoo Archives: gentoo-user

From: Wols Lists <antlists@××××××××××××.uk>
To: gentoo-user@l.g.o
Subject: Re: [gentoo-user] New Intel vulnerability?
Date: Fri, 06 Mar 2020 19:08:07
Message-Id: 5E629F89.1060200@youngman.org.uk
In Reply to: Re: [gentoo-user] New Intel vulnerability? by Rich Freeman
1 On 06/03/20 13:48, Rich Freeman wrote:
2 > If you fall into this camp you need to still update your firmware to
3 > address the non-TPM-user and to avoid making it trivial for software
4 > to steal your keys/etc. However, you need to be aware that you are no
5 > longer secure against physical theft of your device. Somebody who
6 > steals your laptop with passwordless encryption might be able to break
7 > the encryption on your device.
8
9 It's worse that that, he's dead, Jim!
10
11 The summary on LWN is an easy read. Somebody who steals your Intel
12 laptop WILL be able to break the encryption on your device.
13
14 tl;dr summary - the microcode that *boots* the cpu has been compromised.
15 So even while it is setting up tpm and all that malarkey, malware can be
16 stealing keys etc.
17
18 Which means that Intel's master signing key will soon be cracked and
19 compromised.
20
21 Cheers,
22 Wol

Replies

Subject Author
Re: [gentoo-user] New Intel vulnerability? Rich Freeman <rich0@g.o>