handmade.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
handmade.social is for all handmade artisans to create accounts for their Etsy and other handmade business shops.

Server stats:

36
active users

#uefi

0 posts0 participants0 posts today

📨 Latest issue of my curated #cybersecurity and #infosec list of resources for week #48/2024 is out!

It includes the following and much more:

➝ Hacker in #Snowflake Extortions May Be a U.S. Soldier

#Zoom Pays More For False #Encryption Claims

➝ Chinese Spy in US Sentenced

➝ The First #UEFI Bootkit Targeting #Linux Systems

Subscribe to the #infosecMASHUP newsletter to have it piping hot in your inbox every week-end ⬇️

infosec-mashup.santolaria.net/

X’s InfoSec Newsletter · [InfoSec MASHUP] 48/2024By X’s InfoSec Newsletter

#ESET has probably known this for years, as others have. It's likely a nation-state or somebody who is basically doing this by using hidden payloads delivered in OS updates (a.k.a. found in the wild).

I've had the worst sort of luck maintaining dual boot on some of my PC systems. When I run an update either on #Linux or Windows, my system has been known to lose its shimx64.efi or have its content internally modified in some surreptitious way which I cannot see on my end, at all. No joke. And no bullshit. #UEFI is a lackluster standard. Microsoft keeps adhering to use of this standard because no one in industry could agree on much else at the time.

arstechnica.com/security/2024/

Ars Technica · Found in the wild: The world’s first unkillable UEFI bootkit for LinuxBy Dan Goodin
Replied in thread

@ravirockks OFC they don't.

At best they show people how to change fan curves in the #UEFI or hiw to run #memtest86+, but mostly they just "teach" people how to consume #Windows and at best #macOS and that's it.

Same with @libreoffice / #LibreOffice & @thunderbird / #Thunderbird.

@marcan nodds in agreement #Apple doesn't need to have backdoors in Hardware when their entire #iCould is backdoored and can be weaponized to brick devices.

Either way, these are not inherent to the used #Silicon, but entirely #Firmware-based.

  • AMT for example requires a "#Intel #vPro" configuration with Intel-made Ethernet NICs (i.e. i2xx & i3xx - Series) with a Q- or C-series Chipset & supporting #UEFI, so most Systems with cheap #Realtek-NICs aren't exploitable straight-away, and even then it requires certain settings to work, so not an easy "#Pwn2Own" style exploitability...
#intel#vpro#uefi
Replied in thread

@xeniac I know that this is the case, but it's not a technical unavoidance despite the #RaspberryPi being a non-#UEFI - #arm device.

  • Even on the old, #32bit boards.

The solution in that regard would be to boot into a #live / #setup mode like with #RaspberryPiOS for #i586-based #PCs and extend it to a setup that allows creating a new custom image with #LUKS - #FDE enabled and properly encrypted.

  • OFC on a #Pi0W that would mean one would've to plug in a 2nd MicroSD with a USB-Adapter but that's not the Point.

I'm not even demanding much, just a simple #TUI / #CLI setup like @ubuntu / #UbuntuServer has with basic customizations.

  • I'm not even expecting it to go so far as to offer including #dropbear - #SSH in the #initramfs so one can boot into the encrypted install and unlock it remotely. Just gimme the blinking cursor at the boot asking me to enter the password for the encrypted partition...