• AnimalsDream@slrpnk.net
      link
      fedilink
      English
      arrow-up
      3
      ·
      2 months ago

      I could be wrong, but if I remember correctly, the Thinkpad x61 was the last version to ship without Intel ME, and I assumed the meme was a nod to that.

    • neox_@sh.itjust.works
      link
      fedilink
      Français
      arrow-up
      2
      ·
      edit-2
      2 months ago

      Some computers do not require having the ME firmware installed. Usually, these are computers supported by a 100% free BIOS replacement such as GNU Boot (see the compatible models on the website). Libreboot was fully free in the past but it’s not true anymore since it does now support computers needing the ME working (at least for computer initialization) but neutered so that most of it can’t operate. However, you can’t be sure whether a neutered ME is harmful or not since we don’t know what it can really do as the initialization source code is not known.

  • eldain@feddit.nl
    link
    fedilink
    arrow-up
    67
    arrow-down
    2
    ·
    2 months ago

    Ah yes, a Linux teenagers power fantasy. Hardened Gentoo and Selinux beats deblobbing btw, noob.

      • eldain@feddit.nl
        link
        fedilink
        arrow-up
        8
        ·
        2 months ago

        You can’t impress me with a bog standard Gentoo. If you want to show power, build a fortress. At least put some tripwire you mostly trip yourself on (program that keeps an encrypted hash database of your system files to find intrusion changes, needs an update with every update of course or it alerts only your negligence).

        • Petter1@discuss.tchncs.de
          link
          fedilink
          arrow-up
          4
          ·
          2 months ago

          Tripwire should encrypt everything and store key in RAM. Shutdown after 30s, if not emergency overwrite string is entered stored coded on real life paper in a vault with a 9 digits alphanumeric lock. 😏

          • eldain@feddit.nl
            link
            fedilink
            arrow-up
            2
            ·
            2 months ago

            I always wondered, did anyone ever find something with it? Wouldn’t a rootkit that is known enough to be in the detection file be outdated? But yes, you read the docs, points to you!

            • redsand@lemmy.dbzer0.com
              link
              fedilink
              English
              arrow-up
              2
              ·
              2 months ago

              Yeah rkhunter looks for all the common kits BUT ALSO checks for suspicious changes if enabled as a service.

      • eldain@feddit.nl
        link
        fedilink
        arrow-up
        2
        ·
        2 months ago

        Good old days :') I only noticed yesterday the grsec patches are no longer available, such a shame.

        • redsand@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          1
          ·
          2 months ago

          The maintainer had an epic meltdown over hardware vendors using the code and both breaking the license agreement and implementing it wrong so it didn’t work right.

  • Melvin_Ferd@lemmy.world
    link
    fedilink
    arrow-up
    13
    arrow-down
    1
    ·
    2 months ago

    I love this idea when in reality they probably have some Israeli 3rd party that they use that can just pop any system in under an hour regardless of any protection you think you have.

  • mlg@lemmy.world
    link
    fedilink
    English
    arrow-up
    22
    ·
    2 months ago

    Can’t have ring -3 vulnerabilities if your CPU doesn’t have a ring -3

  • redsand@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    21
    ·
    2 months ago

    I got into gentoo because it made patching the kernel to hold luks keys in debug registers instead of RAM easier than Arch 😅

  • Olhonestjim@lemmy.world
    link
    fedilink
    arrow-up
    1
    ·
    2 months ago

    “Hang on, you mean to tell me this fucker barely uses the internet or TV at all anymore and instead just reads books and watches old films on disc? Like real books, not ghost-written memoirs of our favorite elites?”

    • AnimalsDream@slrpnk.net
      link
      fedilink
      English
      arrow-up
      8
      ·
      2 months ago

      Tower’s explanation of blobs is kind of strange and not really correct. In a general sense a binary blob is just a situation where you have open-source software that is combined with proprietary components.

      Most relevant example to the meme is that the Linux kernel is open-source, but can sometimes contain drivers that are proprietary and don’t have source code available. Those proprietary drivers would be the blobs.

      As a counter-example, the linux-libre kernel that devfuuu linked to, is a version of the Linux kernel that has had all the blobs removed.

    • towerful@programming.dev
      link
      fedilink
      arrow-up
      77
      arrow-down
      1
      ·
      edit-2
      2 months ago

      It’s referring to binary blobs. A windows exe might be a binary blob.
      These are distributed compiled. Even if the project is open sources, the binary blob might have been generated by a compromised compiler.

      This is one of the reasons the XZ Utils compromisation went unnoticed for so long. One of the compressed files used for testing contained malicious code that would be included in the build artefacts (IE, the final compiled binary) under very narrow and specific circumstances.

      So “deblobbed” means absolutely everything in the OS was built & compiled on their computer from original source code

      • KeenFlame@feddit.nu
        link
        fedilink
        arrow-up
        1
        ·
        2 months ago

        Thanks. But I don’t understand why any of that ensures that the compiler isn’t compromised? Do you mean they have presumably vetted the compiler themselves first? This is something that would be incredibly time consuming to do, assuming we are talking about gcc or something equivalent, which, I mean if you’re compiling an OS…

        • towerful@programming.dev
          link
          fedilink
          arrow-up
          2
          ·
          2 months ago

          That’s true.
          But the idea is that there are no precompiled binaries that are implicitly trusted.
          So you CAN vet all of the code and artefacts, and if something doesn’t seem right you can trace it back to the code and understand exactly why, instead of seeing a black-box binary and coming to the conclusion “it’s doing something it shouldn’t, but I don’t know what or why”.
          The idea is that you are in control of the entire build process.

          But yes, it would be extremely time consuming to vet GCC, build it from source and (I guess) compare checksum/hashes against published binaries. Then vet all of the source code of everything you need to compile for Gentoo, then compile that and compare checksum/hashes etc.
          Which is why it’s in a 4chan meme.

          But I imagine governments agency will have some deblobbed Linux installs with the technical capacity to vet all the code and artefacts

          • KeenFlame@feddit.nu
            link
            fedilink
            arrow-up
            2
            ·
            2 months ago

            Ah yes… Government… Yeah they seem extremely,… very competent… For sure, for sure . But yeah , thanks see ya

        • AnimalsDream@slrpnk.net
          link
          fedilink
          English
          arrow-up
          4
          ·
          2 months ago

          The concepts they’re referring to have more to do with Ken Thompson’s Trusting Trust essay. Laurie Wired recently came out with an episode about it. It’s a rather intractable problem in computing, and unfortunately, even with the best practices to overcome it, you can never be 100% sure that your system is completely free of compromise.

    • Dragonstaff@leminal.space
      link
      fedilink
      English
      arrow-up
      7
      ·
      2 months ago

      It will prevent you from doing a lot of the things that will get the NSA interested in you?

      Imagine trying to brute force a password on a Dell.

    • 0x0@lemmy.zip
      link
      fedilink
      arrow-up
      2
      ·
      2 months ago

      Older ThinkPads had socketed CPUs, allowing you to upgrade to pre-IME Intel chips.

    • Zeon@lemmy.world
      link
      fedilink
      arrow-up
      8
      ·
      edit-2
      2 months ago

      If we’re talking about security, the newer CPUs have better microcode. Those older CPUs are vulnerable to attacks such as Spectre. Older boards supported by Libreboot, such as the Haswell boards (e.g., Dell 9020 OptiPlex), which support 100% free BIOS firmware, which is to be used in conjunction with 100% free software. If you do so, you will have more security, freedom, and privacy than any other modern consumer grade computer.

      Then again, these boards are old, so, given the microcode is old, if you’re running a virtual machine with a bunch of malicious software, an attacker can potentially exploit your host’s CPU and break out of that VM. Of course, determine your threat model. Are you running no JavaScript ever and only using libre software?

      A deblobbed kernel isn’t great either in some cases, you may need some patches. For example, someone was able to exploit Intel’s iGPU on these older boards and gain complete access to your machine. The only way to fix this is by using a blob. Though, if you strictly only use libre software, this wouldn’t be a concern as much so you wouldn’t need this blob.

      If you stick strictly to 100% free software, older hardware and a deblobbed kernel might be appropriate. But if you need to run blobs along with other proprietary software like JavaScript, the security provided by something like the Intel iGPU blob patch could be beneficial.