Computers and the internet gave you freedom. Trusted Computing would take your freedom.
Learn why: https://vimeo.com/5168045

  • 2 Posts
  • 331 Comments
Joined 1 year ago
cake
Cake day: June 7th, 2023

help-circle
  • Others have written about how windows does it, but here’s some more details.

    A window which runs with higher privileges (even just elevated to admin but still with your same account) cannot be read by normal privileges. You can see this when you use a custom screenshot program with some privileged system utility, but it’s key combo does not work when the higher privileged window is active (in the foreground, selected). The screenshot program could not access UI elements in the privileged window, and can’t send messages to it, but it can still see it rendered and capture it.

    There’s also a feature called “secure desktop”. This is a bit like opening a new desktop with it’s separate “window namespace”. It’s distinct so much that it doesn’t have the taskbar and start menu, and by default it would be blackness, but you don’t notice it because the system takes a screenshot before opening it and sets that as background.
    Admin utils rarely use this feature, as I know this is only used for the User Account Control window that appears when a program is asking for elevated permissions. This is where you type your password, or just accept or deny the elevation request.
    The Keepass password manager can also make use of this feature for the unlock prompt, but it can’t use it that effectively, because the new secure desktop can be found in some way by other programs if it was not created with elevated privileges. It writes about this in it’s documentation.
    Even though Linux nowadays has a password prompt dialog, it does not have anything similar to this secure desktop thing as I know.

    Other than that, on windows (maybe linux too?) processes of the same user and privilege level can read each other’s memory. Without elevation. It’s quite complicated but it’s always there.
    And like with gdb and strace on linux, there are ways on windows too to analyze or modify at runtime how a process works.








  • Mounting to a specific location should not affect the permissions of the drive. But in the case of NTFS and some other filesystems, Linux is not compatible with their permission model, so it is simplified by e.g. making all files be only accessible by root.
    You can override this default with mount options, or change the permissions to sensible values with chmod and chown, but I’m not sure if changing them will have negative side effects on the windows side so the latter may not be a good idea.


  • FDE requires third-party software (veracrypt)

    There’s bitlocker, I think it was added in 7 or Vista. What do you mean?
    But other than that, I would rather use VC too.

    standard system utilities (think ssh, git etc.) are not available on a fresh install

    Hmm, depends. It has a built in openssh client and server, but the “feature” (automatically installing package) is off by default. It can be enabled at install time with the use of the standard windows image modification tools (DISM I think?)

    And then you’re supposed to download and install .exe files from the internet? Since microsoft controls what goes in the windows store

    I think it’s better that Microsoft does not have that much control over software distribution.

    But again, most things you want aren’t there, and you can’t even trust the things that are there.

    Of course you can’t, nobody can tell by looking at the store page if it was modified by anyone, including Microsoft.
    The amazon app store for android explicitely tells that they are adding tracking code to every uploaded app, and to make this possible they replace the digital signature of apps uploaded. Google with the play store does not tell anything like this afaik, but for a few years now it also basically compromised the digital signatures of developers, by requiring the private keys to be mandatorily handed in for continued app updates.
    I don’t trust that these companies that already rely on mass surveillance as a revenue stream, they won’t add tracking code to apps unauthorized by the devs. If not right now, it will happen in the future.

    For some reason, a billion dollar company cannot curate a software repository of the same quality as the ones maintained by unpaid volunteers in the Linux world.

    Besides quality, I think open source distro’s repository and it’s packagers are largely more trustable. They are not motivated financially to modify the packages in unwanted (by the user) ways, and they are transparent.

    So yeah, I think it’s just not there yet. Maybe in a few years windows will be a viable alternative for desktop systems.

    I think they are drifting farther and farther away.
    It was an option. But the shitshow of 11… thanks that’s too much. I’m not installing that for anyone. And 10 is soon end of life…