The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.

    Don't let manufactures lock you out of BIOS modding! Let them know!

    Discussion in 'Hardware Components and Aftermarket Upgrades' started by ickibar1234, Jun 4, 2013.

  1. ickibar1234

    ickibar1234 Notebook Consultant

    Reputations:
    4
    Messages:
    165
    Likes Received:
    14
    Trophy Points:
    31
    I heard about some draft or proposal about how BIOSes are vulnerable to local attacks, making the computer compromised.
    I haven't read all of the huge PDF file yet but I know that closing down BIOSes on devices so that you can't flash your own BIOS on your x86 or video card, HDD/SDD/optical/mobile device hinders innovation, freedom of choice, creativity and learning (say if you want to learn about BIOS modding). You might not be able to even read off the BIOS, not sure.
    Imagine having to update the BIOS remotely by linking with a server somehow and with encryption.
    Hopefully if this does pass, we will find a way to emulate the server or something and inject BIOS code somehow to our own computers. According to the PDF you could take out the flash chip and replace it with one that has the modded BIOS in it (yea, sure).

    Here is the PDF.
    NIAP_CCEVS: U.S. Government Approved Protection Profile - Protection Profile for BIOS Update for PC Client Devices Version 1.0

    Email [email protected] and(or?) [email protected] about your concerns and spread this around!
    In my email to them I mentioned how manufactures often don't develop features that people want or bug fixes BIOSes because they don't want the development costs or don't think it's important. I made a few examples.
     
  2. Loney111111

    Loney111111 Notebook Deity

    Reputations:
    396
    Messages:
    828
    Likes Received:
    28
    Trophy Points:
    41
    felix3650, every time someone spouts off conspiracy things, I have this urge to step on a kitten with hiking boots.
     
  3. Mr.Koala

    Mr.Koala Notebook Virtuoso

    Reputations:
    568
    Messages:
    2,307
    Likes Received:
    566
    Trophy Points:
    131
    Poor kittens.

    CPUs get stolen from server rooms all the time so they need to report there positions.
    Standard-following boot procedures open up dangerous doors for untrusted OSs.
    Non-locked-in BIOS flashes make computers vulnerable to local attacks.

    You have to agree that P [​IMG]R and political people are innovative.

    Oh, wait a second. They have data to back up their claims. They are scientists!
     
  4. Loney111111

    Loney111111 Notebook Deity

    Reputations:
    396
    Messages:
    828
    Likes Received:
    28
    Trophy Points:
    41
    What kind of scientists? There are the ones that proved asbestos is dangerous, the ones that are on tobacco companies' payroll, and the ones that were jailed for lying about vaccines' risk of causing autism (hint: They faked the data).

    Also, if someone gets a physical access to your computer and open up the case without being noticed, you got bigger problems. Cold boot attacks.
     
  5. tijo

    tijo Sacred Blame

    Reputations:
    7,588
    Messages:
    10,023
    Likes Received:
    1,077
    Trophy Points:
    581
    My thoughts exactly, when someone already has physical access to your machine, you've got bigger problems.
     
  6. Mr.Koala

    Mr.Koala Notebook Virtuoso

    Reputations:
    568
    Messages:
    2,307
    Likes Received:
    566
    Trophy Points:
    131
    And don't forget about those who never use encryption on the local hard-drive. You don't even need to crack a key, just copy the data (or take out the drive).
     
  7. Loney111111

    Loney111111 Notebook Deity

    Reputations:
    396
    Messages:
    828
    Likes Received:
    28
    Trophy Points:
    41
    Actually, encrypted hard drives can be defeated if you can run the computer it was connected to. Freeze the RAM sticks using compressed air (some encryption systems automatically load the keys into the memory upon boot) and pull them out.
     
  8. ickibar1234

    ickibar1234 Notebook Consultant

    Reputations:
    4
    Messages:
    165
    Likes Received:
    14
    Trophy Points:
    31
    wut?10charrr
     
  9. ickibar1234

    ickibar1234 Notebook Consultant

    Reputations:
    4
    Messages:
    165
    Likes Received:
    14
    Trophy Points:
    31
    bump10char. Don't worry I probably won't bump this anymore
     
  10. Qing Dao

    Qing Dao Notebook Deity

    Reputations:
    1,600
    Messages:
    1,771
    Likes Received:
    304
    Trophy Points:
    101
    You mean scientists that only exist in your imagination?
     
  11. Mr.Koala

    Mr.Koala Notebook Virtuoso

    Reputations:
    568
    Messages:
    2,307
    Likes Received:
    566
    Trophy Points:
    131
    Scientists that only work in the P [​IMG]R department.