|
Authored by: Anonymous on Sunday, August 26 2012 @ 10:27 PM EDT |
A Bios that cannot be re-written easily is a good thing...otherwise, just load
in VMWare (or whatever is your fave) and lie to whatever comes after! And what
do you need firmware BIOS updates for in the first place? Can't those be
special purpose OS drivers?
But there is a much more fundamental problem I have been writing about here:
All this complicated software -- How do I own it? (Linux has 1 million lines of
kernel, Windoze 30 million or so -- how in the world do I audit it, when neither
of these systems was designed with the idea that I don't want to trust the
software I may be running not to do something *else*, which is malicious?)
A fundamental re-design of the base operating systems is required, one which
gives as much software as possible an absolute minimum of privilege.
(Christenson)
[ Reply to This | Parent | # ]
|
|
Authored by: Anonymous on Monday, August 27 2012 @ 06:21 AM EDT |
"Safer Boots: Feds Urge Malware-Resistant BIOS"
(InformationWeek.com article, 24 Aug. 2012) [ Reply to This | Parent | # ]
|
|
Authored by: tiger99 on Monday, August 27 2012 @ 02:59 PM EDT |
... the problem began when penny-pinching motherboard manufacturers eliminated
the BIOS write protect jumper. With simple hardware write protection, the BIOS
is completely secure from tampering, except by opening up the PC. No virus can
do anything to it. Until that jumper is reinstated (it could optionally be
wired to an external key switch), the problem will persist, and that goes for
anything which has updateable flash memory, not just PCs. The cost of adding
the jumper during manufacture is around $0.02. Got to be worth it on
economic grounds alone. [ Reply to This | Parent | # ]
|
|
|
|
|