Linked by Thom Holwerda on Wed 21st Sep 2011 22:06 UTC, submitted by kragil
Windows After the walled garden coming to the desktop operating system world, we're currently witnessing another potential nail in the coffin of the relatively open world of desktop and laptop computing. Microsoft has revealed [.pptx] that as part of its Windows 8 logo program, OEMs must implement UEFI secure boot. This could potentially complicate the installation of other operating systems, like Windows 7, XP, and Linux.
Thread beginning with comment 490285
To read all comments associated with this story, please click here.
Comment by OSbunny
by OSbunny on Thu 22nd Sep 2011 00:35 UTC
OSbunny
Member since:
2009-05-23

If you want to hide malicious code you can do it in open source as well. There was that news a few months ago about openbsd having malicious code. Don't know whether it was true or not but the possibility remains.

Anyway I don't see MS succeeding in forcing motherboard manufacturers to disallow Linux installation.

Reply Score: 1

RE: Comment by OSbunny
by lemur2 on Thu 22nd Sep 2011 01:33 in reply to "Comment by OSbunny"
lemur2 Member since:
2007-02-17

If you want to hide malicious code you can do it in open source as well. There was that news a few months ago about openbsd having malicious code. Don't know whether it was true or not but the possibility remains.


Quote please. AFAIK the track record is that malware has never been distributed to users via open source repositories. The only way it happens is to distribute modified code binary-only executables to Windows users.

Actually, you can't hide malware in the source code of open source software which is developed in collaboration by a number of independent programmers. The more people involved, the more impossible it becomes. If you want to inject malware, it has to be done AFTER taking the source code from the development project but BEFORE distributing binaries to end users, this is the only remotely possible point of injection. Even then, if the users can get the source and also the bianries and they can compile the source for themselves and check it, then even that possible point of injection is no longer possible.

Anyway I don't see MS succeeding in forcing motherboard manufacturers to disallow Linux installation.


The UEFI specification is not actually from Microsoft. Microsoft are simply saying that UEFI secure boot is required if an OEM wishes to put a "Designed for Windows 8" sticker on their hardware.

Arguably, if something is indeed "Designed for Windows 8", it is reasonable to expect that it can't run anything but Windows 8.

For myself, I put together my own desktop machines. I typically buy an "upgrade" package which includes a motherboard, CPU, RAM and box. I add a blank hard disk drive, optical drive and graphics card, plug it all together, insert a Linux LiveCD into the optical drive, and away I go. Doing this has been quite a bit less expensive for me than buying store-bought machines of equivalent performance anyway. The problem here is that the days of such machines are arguably numbered.

It shouldn't be a problem because the market is about to be flooded with a plethora of reasonable ARM tablets designed to run Android. E.g:

http://www.osnews.com/comments/25176

If you want to have a Linux desktop machine one of those can easily be adapted, just add a USB keyboard and mouse, HDMI monitor and USB external storage (or use a NAS device).

Edited 2011-09-22 01:40 UTC

Reply Parent Score: 0

RE[2]: Comment by OSbunny
by Lennie on Thu 22nd Sep 2011 09:10 in reply to "RE: Comment by OSbunny"
Lennie Member since:
2007-09-22

Actually it is possible to include something in an open source project, but you'll have to also modify the compiler and probably wait a few years to:

Thompson's paper described a modified version of the Unix C compiler that would:

Put an invisible backdoor in the Unix login command when it noticed that the login program was being compiled, and as a twist
Also add this feature undetectably to future compiler versions upon their compilation as well.

http://en.wikipedia.org/wiki/Backdoor_%28computing%29

It is not very likely, but it possible

Reply Parent Score: 4

RE[2]: Comment by OSbunny
by phoudoin on Thu 22nd Sep 2011 13:43 in reply to "RE: Comment by OSbunny"
phoudoin Member since:
2006-06-09

Arguably, if something is indeed "Designed for Windows 8", it is reasonable to expect that it can't run anything but Windows 8.


Nope.
You'll be right if the logo says "Designed exclusively for Windows 8".

But it's not. And, though, one can expect it could run *something else*, too.
The exclusive semantic is what's matter here.
And consumer should be able to know it's not a versatile computer but a Windows 8 only computer he's buying. And it should know it *before* doing it.

Otherwise, there's valid legal ground to sue the seller whose hide you it was not a Personal *Computer* but a *Windows 8 device*.

Considering prior tracks of personal computers sales, consumer is legitimate to think that any device sold under this product family "name" is a versatile computer, not a lock-down computing device.

Edited 2011-09-22 13:48 UTC

Reply Parent Score: 6

RE[2]: Comment by OSbunny
by malxau on Thu 22nd Sep 2011 20:08 in reply to "RE: Comment by OSbunny"
malxau Member since:
2005-12-04

"If you want to hide malicious code you can do it in open source as well. There was that news a few months ago about openbsd having malicious code. Don't know whether it was true or not but the possibility remains.


Quote please. AFAIK the track record is that malware has never been distributed to users via open source repositories. The only way it happens is to distribute modified code binary-only executables to Windows users.
"

Do you remember this? I believe the code was distributed over CVS, but never made it into a release.

http://www.theregister.co.uk/2003/11/07/linux_kernel_backdoor_block...

Or when debian ran valgrind on openssl and shipped a broken version for years before it was detected, resulting in piles of compromised keys? The code was there for all to see.

http://blogs.fsfe.org/tonnerre/archives/24

As a paranoid afterthought, note we only know about these when they're detected. We don't know about the ones that are too good - which may be zero or may be large. We have no way to know.

I think as everyone else is saying, it's difficult, but not impossible. The code just needs to look correct even when it's not. That's a high bar, but it can be met. There's even a competition over who can do it well:

http://underhanded.xcott.com/

Reply Parent Score: 3

RE: Comment by OSbunny
by Soulbender on Thu 22nd Sep 2011 04:29 in reply to "Comment by OSbunny"
Soulbender Member since:
2005-08-18

If you want to hide malicious code you can do it in open source as well.


It's a lot harder though.

There was that news a few months ago about openbsd having malicious code.


Except that was completely bogus. The code's been audited and no such backdoor was found. Just because you can make a rumour about something doesn't mean it's probable.

Reply Parent Score: 8