From: eliot Date: Sat, 25 May 2019 19:02:18 +0000 (+0200) Subject: Added: Konversation om säkerhet X-Git-Url: https://git.g-eek.se/?a=commitdiff_plain;h=6117301a5add7e1c4e09193e821ee12fde6c69b6;p=inbyggd-frihet-wiki.git Added: Konversation om säkerhet --- diff --git a/null.mdwn b/null.mdwn index b5890b4..cd23032 100644 --- a/null.mdwn +++ b/null.mdwn @@ -1,40 +1,30 @@ ##Övrigt -###Matrix **MOVE ME?** +###Konversation om firmware säkerhet +https://media.ccc.de/v/33c3-8314-bootstraping_a_slightly_more_secure_laptop +Backdoors be gone! +lycka till att ha säkert OS när firmwaret frÃ¥n dina olika enheter pÃ¥ moderkortet kan skriva över ditt boot flash, etc. + +Librem? +AssÃ¥ det är givetvis inte perfekt och x86 är shit. Men som jag förstÃ¥r det kör dom coreboot med halvdödad IntelME (eller??), sÃ¥ det är mkt bättre än andra moderna laptops out of the box. Bonus är om dom kommer inkludera Heads som payload. +idèerna frÃ¥n heads talket är dock fortfarande aktuella +tpm och skydda boot flash vore nice +purism verkar dock köra fett moderna laptops sÃ¥ oklart hur kräsna dom är med frihet.. +fördelen med moderna laptops är att dom har IOMMU sÃ¥ du slipper bli hackad av varenda PCIE enhet + +Är AMDs processorer ocksÃ¥ fascistiska eller? +AMD är samma cancer fast vi har inte reverse engineerat dom till samma grad +https://libreboot.org/faq.html#amd +https://www.coreboot.org/Binary_situation +"PSP is AMD's analog of Intel's ME with a few implementation differences, in laymans terms the panic level is the same and it is present on newer AMD processors (see above) including FM2+ and Zen (AM4), it is also present on the die but supposedly not activated on various older models as well. " + +Intel: +"Panic level: 8999 Memory Reference Code: (Sandybridge and newer). This is code that runs on the CPU and initializes RAM. Can be reverse engineered with enough persistence, but not done so far. The "Memory Reference Code", initializes memory and USB power states (other functions are yet unknown). It is provided by Google, and is wrapper for Intel PEI modules. (see Intel_Native_Raminit for sandy/ivybridge native coreboot raminit)" +Google!? + +x86? +"In this talk, we'll demonstrate how page fault analysis and some creative processor fuzzing can be used to exhaustively search the x86 instruction set and uncover the secrets buried in your chipset. " +https://www.youtube.com/watch?v=KrksBdWcZgQ +P R O P R I E T A R Y +I N S T R U C T I O N S E T +>trusting documentation -#####INSTALLATION - -**SERVER:** - -https://www.topbug.net/blog/2016/12/05/set-up-synapse-matrix-homeserver-on-ubuntu-16-04/ - -Enbart steg 5, certifikat https://www.upcloud.com/support/install-matrix-synapse/ - -sudo chown matrix-synapse:nogroup /etc/letsencrypt/archive/ -R - -sudo chown matrix-synapse:nogroup /etc/letsencrypt/live/ -R - -**KLIENT: (Riot)** - -wget https://riot.im/packages/debian/repo-key.asc - -sudo apt-key add repo-key.asc - -rm repo-key.asc - -sudo vim /etc/apt/sources.list.d/matrix-riot.list - -**#ADD THIS !** - -# Riot (Matrix client) - -deb https://riot.im/packages/debian/ stretch main - -deb-src https://riot.im/packages/debian/ stretch main - -sudo apt-get update - -sudo apt-get install riot-web - -**Login:** - -https://kirkegaard.g-eek.se:8448