Bitcoin Forum
November 01, 2024, 09:47:12 PM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2]  All
  Print  
Author Topic: Windows 8, DRM plus TPM 2.0 can pose a serious threat to Bitcoin.  (Read 9630 times)
pacojones
Full Member
***
Offline Offline

Activity: 126
Merit: 100



View Profile
August 22, 2013, 05:18:38 PM
 #21

I (for one) don't plan to use Windows 8 because, well, I don't like it - but that aside, I'd NEVER store my bitcoin wallet on any Windows system.  It's trivial to setup an old crusty laptop or virtual machine with Ubuntu and Armory, then set that machine in the closet.  Then store a small amount of coin in an online wallet where you can have quick/easy access for day to day transactions.  I hope (and will plan to contribute to) that people write more articles and how tos covering this topic!

Now fast forward 5 or 10 years when we are not using the BETA version of the bitcoin wallets and bitcoins are worth $500 this will be a different discussion.  It's Moores Law in hyperdrive.  The bitcoin network is roughly 4 years old and it's eclipsed (in relative computing power) EVERY other super computer and distributed computing power project on the planet.  Imagine if all of that power were focused on attacking wallets directly!...  ugh...

Lastly - if you think that TPM is the only way to encrypt drives, your crazy!  Today there are plenty of options, not the least of which is truecrypt (a free, open solution that works VERY well on Windows).

OK, this is the last thing - this is going to really open the market for hardware based wallet devices.

tvbcof
Legendary
*
Offline Offline

Activity: 4732
Merit: 1277


View Profile
August 22, 2013, 05:47:39 PM
 #22

There needs to be a clear distinction here between FUD and reality here and yes comments that like having to need a government ID to access the Internet (It is more like a Facebook account on many sites but that is another story) or that the mere presence of a TPM means that the some government agency now has access to your computer are simply FUD.
...

Why would someone FUD this?  They want to stop people from using the Internet?!?  It makes no sense.

If I were a control freak, here's is what I would do:

Noticing that everyone uses a modem of some sort, I would design an extension which provided an enhanced wrapper between the modem and the ISP.  A router if not built into the modem could have the same functionality, and it needs to participate in order to provide universal support for end-user devices since it knows the MAC address.

I would also have a selection of bio-metric devices which could bind to the router.  Fingerprint scanners, iris scanners for double amputees, etc.

I would have a little daemon which can be installed on any device which inter-acts with the router/modem.  From time to time a user of any device might get a pop-up to swipe their finger or whatever.  Especially if doing on-line banking and such.  Such a simple piece of code could easily be open-sourced for inclusion into OS's such as Linux for the relatively few geek types who would pitch a bitch.

In my generosity, I would provide all of this gear and technical support to users free of charge.  Most users would be delighted not to have to remember all those passwords, and help society root out terrorists, pedos, and associated boogeymen at the same time.  Win/win!

Such a solution could be rolled out in phases so as not to interfere with business interests or cause un-due alarm and a backlash.

Now I fully expect to hear about how that is impossible because of the extra overhead of the protocol enhancement.  Further, I expect to hear it from the same dopes who state "Moore's Law" as the two word answer to any concern about Bitcoin scalability.


sig spam anywhere and self-moderated threads on the pol&soc board are for losers.
Luckybit
Hero Member
*****
Offline Offline

Activity: 714
Merit: 510



View Profile
August 22, 2013, 06:21:56 PM
 #23

The following article shows the Big Brother potential of propriety software married with DRM and "Trusted" Computing. German Government Warns Key Entities Not To Use Windows 8 – Links The NSA. http://www.businessinsider.com/leaked-german-government-warns-key-entities-not-to-use-windows-8--links-the-nsa-2013-8 and also
http://www.testosteronepit.com/home/2013/8/21/leaked-german-government-warns-key-entities-not-to-use-windo.html#ixzz2cfIWGUt1

To quote the first article:
Quote
Now there is a new set of specifications out, creatively dubbed TPM 2.0. While TPM allowed users to opt in and out, TPM 2.0 is activated by default when the computer boots up. The user cannot turn it off. Microsoft decides what software can run on the computer, and the user cannot influence it in any way. Windows governs TPM 2.0. And what Microsoft does remotely is not visible to the user. In short, users of Windows 8 with TPM 2.0 surrender control over their machines the moment they turn it on for the first time.

It would be easy for Microsoft or chip manufacturers to pass the backdoor keys to the NSA and allow it to control those computers. NO, Microsoft would never do that, we protest. Alas, Microsoft, as we have learned from the constant flow of revelations, informs the US government of security holes in its products well before it issues fixes so that government agencies take advantage of the holes and get what they’re looking for.

Read more: http://www.testosteronepit.com/home/2013/8/21/leaked-german-government-warns-key-entities-not-to-use-windo.html#ixzz2cfJY6toM

This kind of centralized control by Microsoft and by extension certain governments can pose a very serious threat to the security and integrity of the Bitcoin network. Any thoughts on defensive strategies to counteract this threat?

The trusted platform module is good. Windows 8 maybe not.

Do not confuse the two. Trusted platform module is how private keys can be secured and is necessary for stuff like secure random number, key security, and so on. It's something we want. Windows 8 is not something you have to use and because it's closed source I recommend you use Linux instead.

TPM can be used with open source software and in my opinion should be.
ArticMine (OP)
Legendary
*
Offline Offline

Activity: 2282
Merit: 1050


Monero Core Team


View Profile
August 22, 2013, 06:22:40 PM
 #24

There needs to be a clear distinction here between FUD and reality here and yes comments that like having to need a government ID to access the Internet (It is more like a Facebook account on many sites but that is another story) or that the mere presence of a TPM means that the some government agency now has access to your computer are simply FUD.
...

Why would someone FUD this?  They want to stop people from using the Internet?!?  It makes no sense.

If I were a control freak, here's is what I would do:

Noticing that everyone uses a modem of some sort, I would design an extension which provided an enhanced wrapper between the modem and the ISP.  A router if not built into the modem could have the same functionality, and it needs to participate in order to provide universal support for end-user devices since it knows the MAC address.

I would also have a selection of bio-metric devices which could bind to the router.  Fingerprint scanners, iris scanners for double amputees, etc.

I would have a little daemon which can be installed on any device which inter-acts with the router/modem.  From time to time a user of any device might get a pop-up to swipe their finger or whatever.  Especially if doing on-line banking and such.  Such a simple piece of code could easily be open-sourced for inclusion into OS's such as Linux for the relatively few geek types who would pitch a bitch.

In my generosity, I would provide all of this gear and technical support to users free of charge.  Most users would be delighted not to have to remember all those passwords, and help society root out terrorists, pedos, and associated boogeymen at the same time.  Win/win!

Such a solution could be rolled out in phases so as not to interfere with business interests or cause un-due alarm and a backlash.

Now I fully expect to hear about how that is impossible because of the extra overhead of the protocol enhancement.  Further, I expect to hear it from the same dopes who state "Moore's Law" as the two word answer to any concern about Bitcoin scalability.



This sounds a lot like Windows 8. Get the user to log in using their Microsoft account and then like that account their credit card information. Then monitor everything they do online and also find out if they install certain application such as Bitcoin-QT or Tor. On a related note the following Windows specific attack on Tor is very interesting: http://www.infoworld.com/t/data-security/tor-browser-bundle-windows-users-susceptible-info-stealing-attack-224157

Concerned that blockchain bloat will lead to centralization? Storing less than 4 GB of data once required the budget of a superpower and a warehouse full of punched cards. https://upload.wikimedia.org/wikipedia/commons/8/87/IBM_card_storage.NARA.jpg https://en.wikipedia.org/wiki/Punched_card
Luckybit
Hero Member
*****
Offline Offline

Activity: 714
Merit: 510



View Profile
August 22, 2013, 06:26:43 PM
 #25

I (for one) don't plan to use Windows 8 because, well, I don't like it - but that aside, I'd NEVER store my bitcoin wallet on any Windows system.  It's trivial to setup an old crusty laptop or virtual machine with Ubuntu and Armory, then set that machine in the closet.  Then store a small amount of coin in an online wallet where you can have quick/easy access for day to day transactions.  I hope (and will plan to contribute to) that people write more articles and how tos covering this topic!

Now fast forward 5 or 10 years when we are not using the BETA version of the bitcoin wallets and bitcoins are worth $500 this will be a different discussion.  It's Moores Law in hyperdrive.  The bitcoin network is roughly 4 years old and it's eclipsed (in relative computing power) EVERY other super computer and distributed computing power project on the planet.  Imagine if all of that power were focused on attacking wallets directly!...  ugh...

Lastly - if you think that TPM is the only way to encrypt drives, your crazy!  Today there are plenty of options, not the least of which is truecrypt (a free, open solution that works VERY well on Windows).

OK, this is the last thing - this is going to really open the market for hardware based wallet devices.

You don't understand information security. The TPM provides hard ware mechanisms precisely because you don't want to trust a software implementation of a random number generator or private key storage or encryption if it can be done in hardware.

TPM is about having a hardware specification for handling private keys, cryptography and information security. It's not a government plot and anyone with any knowledge of information security can tell you what TPM is.

If you would prefer to put your faith in truecrypt then go ahead. I understand TPM well enough to know it's better than truecrypt and I have nothing against truecrypt I'm just saying using truecrypt combined with TPM is better than using just truecrypt because there are all kinds of side channel attacks which beat any kind of software programming.
willphase
Hero Member
*****
Offline Offline

Activity: 767
Merit: 500


View Profile
August 22, 2013, 06:31:50 PM
 #26

Wow this article really is very bad and downright false in so many ways

Quote
It allows Microsoft to control the computer remotely through a built-in backdoor.

Read more: http://www.testosteronepit.com/home/2013/8/21/leaked-german-government-warns-key-entities-not-to-use-windo.html#ixzz2ciwhy76c

this is so very wrong - the TPM is used to secure keys e.g. for BitLocker, and also to seal configuration/boot data to prevent against tampering and secure the boot sequence.  There is an ongoing debate about Win8 secure boot meaning it's hard for non-Win OS to bootstrap securely, but MS have issued keys to open source distributions in order that people can still run e.g. Linux on their systems with secure boot.

In theory - MS can also put 'backdoor' in your OS by just making a Windows Update and pushing it out to all users, but this would be totally contrary to their business practices and would just mean everyone stop using MS products... so there's no reason they would ever do that - it's just FUD.

What's critical here, is they don't need the TPM to do any of this - it sounds like some over-enthusiastic newspaper reporter read about TPMs and wrote a dumb story.

Will

ArticMine (OP)
Legendary
*
Offline Offline

Activity: 2282
Merit: 1050


Monero Core Team


View Profile
August 22, 2013, 06:32:23 PM
 #27

The following article shows the Big Brother potential of propriety software married with DRM and "Trusted" Computing. German Government Warns Key Entities Not To Use Windows 8 – Links The NSA. http://www.businessinsider.com/leaked-german-government-warns-key-entities-not-to-use-windows-8--links-the-nsa-2013-8 and also
http://www.testosteronepit.com/home/2013/8/21/leaked-german-government-warns-key-entities-not-to-use-windo.html#ixzz2cfIWGUt1

To quote the first article:
Quote
Now there is a new set of specifications out, creatively dubbed TPM 2.0. While TPM allowed users to opt in and out, TPM 2.0 is activated by default when the computer boots up. The user cannot turn it off. Microsoft decides what software can run on the computer, and the user cannot influence it in any way. Windows governs TPM 2.0. And what Microsoft does remotely is not visible to the user. In short, users of Windows 8 with TPM 2.0 surrender control over their machines the moment they turn it on for the first time.

It would be easy for Microsoft or chip manufacturers to pass the backdoor keys to the NSA and allow it to control those computers. NO, Microsoft would never do that, we protest. Alas, Microsoft, as we have learned from the constant flow of revelations, informs the US government of security holes in its products well before it issues fixes so that government agencies take advantage of the holes and get what they’re looking for.

Read more: http://www.testosteronepit.com/home/2013/8/21/leaked-german-government-warns-key-entities-not-to-use-windo.html#ixzz2cfJY6toM

This kind of centralized control by Microsoft and by extension certain governments can pose a very serious threat to the security and integrity of the Bitcoin network. Any thoughts on defensive strategies to counteract this threat?

The trusted platform module is good. Windows 8 maybe not.

Do not confuse the two. Trusted platform module is how private keys can be secured and is necessary for stuff like secure random number, key security, and so on. It's something we want. Windows 8 is not something you have to use and because it's closed source I recommend you use Linux instead.

TPM can be used with open source software and in my opinion should be.

This is a very valid point. I do deal with some of the issues in https://bitcointalk.org/index.php?topic=279262.msg2987427#msg2987427.TPMs and trusted computing used in conjunction with GNU / Linux and Free Software can be a very useful and valuable tool, and I do not wish to create any confusion between trusted and treacherous computing here.

Concerned that blockchain bloat will lead to centralization? Storing less than 4 GB of data once required the budget of a superpower and a warehouse full of punched cards. https://upload.wikimedia.org/wikipedia/commons/8/87/IBM_card_storage.NARA.jpg https://en.wikipedia.org/wiki/Punched_card
tvbcof
Legendary
*
Offline Offline

Activity: 4732
Merit: 1277


View Profile
August 22, 2013, 06:58:17 PM
 #28

...
In theory - MS can also put 'backdoor' in your OS by just making a Windows Update and pushing it out to all users, but this would be totally contrary to their business practices and would just mean everyone stop using MS products... so there's no reason they would ever do that - it's just FUD.
...

You sound so sure about this.  I'm not.  I'm on the outer margins of paranoia about such things and I would not stop using MS in the same way I use it today.  Certain CAD applications which are not ported, for instance.  And porn surfing for which it works well.  For many years I've used Microsoft wares only for things which I don't mind corp/gov knowing about in addition to the garden variety hackers.  I only stopped using it for fairly sensitive stuff recently after a kind of a bizarre hack of my system.  Actually it was Android which seemed to have gotten hacked, but I switched over to using more secure methods and Windows came along for the ride.  Over the years I've never done anything Bitcoin related on Windows or Android except blab on this forum and access one of my spending money on-line wallets which I can afford to lose.  Even there I keep another more secure rendition.

Anyway, I think that very few private citizens have anything the actually need to hide (in contrast to those in government who have sensitive interactions with their lobbyists and so forth.)  So I would expect that a very high percentage of people would perhaps grumble a bit but carry on using MS products (and Apple and Google for that matter) and forking out money to MS just as they do today no matter what sort of malfeasance is uncovered.  And any negative revenue impact can be easily offset with taxpayer funding even if that is a problem.


sig spam anywhere and self-moderated threads on the pol&soc board are for losers.
Fiyasko
Legendary
*
Offline Offline

Activity: 1428
Merit: 1001


Okey Dokey Lokey


View Profile
August 22, 2013, 07:12:11 PM
 #29

Oh my gosh!, how did i not know about this TPM crap? Does anyone have somekind of list of motherboards that have TPM installed on them? It spooks me because the tpm chip shown on the wiki is on an Asus mobo, and all my computers run asus mobo's ...

http://bitcoin-otc.com/viewratingdetail.php?nick=DingoRabiit&sign=ANY&type=RECV <-My Ratings
https://bitcointalk.org/index.php?topic=857670.0 GAWminers and associated things are not to be trusted, Especially the "mineral" exchange
ArticMine (OP)
Legendary
*
Offline Offline

Activity: 2282
Merit: 1050


Monero Core Team


View Profile
August 22, 2013, 07:30:26 PM
 #30

Oh my gosh!, how did i not know about this TPM crap? Does anyone have somekind of list of motherboards that have TPM installed on them? It spooks me because the tpm chip shown on the wiki is on an Asus mobo, and all my computers run asus mobo's ...

If you are running GNU / Linux there is nothing to fear from a TPM. In fact as others have correctly pointed out it can actually be very useful. The problem is Microsoft using a TPM in order to control what software an owner of a device runs in their device.


... the TPM is used to secure keys e.g. for BitLocker, and also to seal configuration/boot data to prevent against tampering and secure the boot sequence.  There is an ongoing debate about Win8 secure boot meaning it's hard for non-Win OS to bootstrap securely, but MS have issued keys to open source distributions in order that people can still run e.g. Linux on their systems with secure boot. ...


This illustrates the issue best. The fact a GNU / Linux distribution would have to use a Microsoft key in order for people to run GNU / Linux on their systems should be a real wake up call. Keep in mind that Microsoft only allowed this on x86/AMD64. On ARM they simply said no.  Yes in both cases the TPM can be used to secure the system against its owner, but the TPM alone is not the issue here.

How is this any different from saying the Bitcoin software can only be installed on computing devices using a key signed by Visa or Mastercard? And only on those devices that Visa and Mastercard choose to allow?

Concerned that blockchain bloat will lead to centralization? Storing less than 4 GB of data once required the budget of a superpower and a warehouse full of punched cards. https://upload.wikimedia.org/wikipedia/commons/8/87/IBM_card_storage.NARA.jpg https://en.wikipedia.org/wiki/Punched_card
Carlton Banks
Legendary
*
Offline Offline

Activity: 3430
Merit: 3080



View Profile
August 22, 2013, 09:28:02 PM
 #31

Oh my gosh!, how did i not know about this TPM crap? Does anyone have somekind of list of motherboards that have TPM installed on them? It spooks me because the tpm chip shown on the wiki is on an Asus mobo, and all my computers run asus mobo's ...

As far as Intel tech goes, I think everything post EFI needs to be scrutinized. The 1st generation EFI is a case by case arrangement, some mobo manufacturers may have added TPM functionality, but it wasn't part of the chipset specifications. Past the 2nd generation, I believe the Secure Boot feature requires a TPM module, and this is a part of the standard chipset spec. I believe the ARM platforms have no such standardised TPM modules, although I'm specifically referencing the standalone computing devices and not phones using ARM SoCs.

As many are saying: this is very much a double edge sword. If it's set up well, it can actually turn your machine into a real nightmare target for even determined and well resourced hackers. Finding bugs in the TPM implementation becomes about the only exposed attack surface your machine has, well, that and brute force style attacks on the cryptography. There's a good case for starting a whole pre-built secured mahcine business around this, as it will be beyond many people's ability to set up. Just don't open up shop in a country with a US extradition treaty  Cheesy

Vires in numeris
willphase
Hero Member
*****
Offline Offline

Activity: 767
Merit: 500


View Profile
August 22, 2013, 10:16:37 PM
 #32

As many are saying: this is very much a double edge sword. If it's set up well, it can actually turn your machine into a real nightmare target for even determined and well resourced hackers. Finding bugs in the TPM implementation becomes about the only exposed attack surface your machine has, well, that and brute force style attacks on the cryptography. There's a good case for starting a whole pre-built secured mahcine business around this, as it will be beyond many people's ability to set up. Just don't open up shop in a country with a US extradition treaty  Cheesy

this is very true - example would be using a system with a TPM to secure bitlocker keys and seal the boot-time configuration.  Then, just create a normal user on your machine with a long password, and secure your %appdata%\bitcoin with EFS (fight click properties -> advanced -> encryption).

The EFS key is secured by your login passphrase, and physical attacks against the machine are prevented by the TPM - if an attacker opens up your machine to suck your hard drive, then the TPM will refuse to present the key due to configuration change.

All you have to do is remember to lock your screen when you walk away Smiley

Oh, and don't install any malware either, probably best not to download anything at all from the internet or visit any websites.

Will

Ephebus
Newbie
*
Offline Offline

Activity: 57
Merit: 0



View Profile
August 23, 2013, 12:08:32 AM
 #33

Did the Germans Catch the NSA Spying on Windows Users?

http://www.tomsguide.com/us/nsa-spying-on-windows-users,news-17433.html
Pages: « 1 [2]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!