|
|
Log in / Subscribe / Register

Chromium OS source released

Chromium OS source released

Posted Nov 20, 2009 0:03 UTC (Fri) by drag (guest, #31333)
In reply to: Chromium OS source released by kunitz
Parent article: Chromium OS source released

'Verified Boot' can be a valuable tool. It's a way for the user to know instantly if the kernel has been tampered with or modified.

It's the same thing with 'trusted computing module'. This is a valuable tool that can be used to verify the security of your system simply by rebooting. If properly setup then the module verifies your bootloader... your bootloader verifies your kernel.. your kernel verifies the initrd... the initrd environment verifies drivers and important system files... and then as your system boots it verifies binaries and scripts as it goes.

This way you can detect and fight kernel-level rootkits. If somebody installs a kernel module for your system they can use the kernel against you. This is a effective combat technique. Otherwise the only other reliable way is to use something like tripwire and boot up from read-only media and use a read-only database for verifying the contents of your filesystem. (or removable drive to off-network computer or something like that). Trusted Computing can dramatically lower the costs of keeping very secure OS and verifiable file system contents.

Whether this functionality is good or bad depends entirely on who holds the keys. If you, the owner of the computer and the OS, are in control of it then it's a fantastic thing. If the keys are held by somebody else then it can be used as a weapon or system of control against you and it is a bad thing.


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds