/All/
|
index
catalog
recent
update
post
|
/math/
/tech/
/anime/
/misc/
/free/
/meta/
|
Guide
dark
mod
Log
P98325
What computers support flashing BIOS internally?
Fri 2024-06-21 23:29:37
link
reply
6e3604f17cd5eb2d96e2d7b33c535eb4932fd53f76009697f384e7d436c30049.gif
559 KiB 500x272x0.40s (NSFW)
My Questions?
What new or newer computers support flashing of Coreboot without the use of a external programmer?
What Thinkpads do people suggest that support 16GB ram and can be flashed internally with Coreboot or Libreboot?
Does Coreboot and Libreboot disable/remove the CompuTrace DXE module or blobs?
Do you have to use a tool like these?
https://github.com/linuxboot/fiano?tab=readme-ov-file#dxe-cleaner
https://fiedka.app/
Referenced by:
P98354
P123437
P124464
P98337
sage
Sat 2024-06-22 04:08:36
link
reply
>What new or newer computers support flashing of Coreboot without the use of a external programmer?
None
P98354
Sat 2024-06-22 07:38:22
link
reply
f7f737d1d56abf01d7d991d813a6378cdbc71a0750609dcf02eb3572ff9e40f1.jpg
190 KiB 1200x800
>>
P98325
>What Thinkpads do people suggest that support 16GB ram
Thinkpad T430 can do 16GB of RAM and has good battery life.
Also you should be able to flash internally.
P98371
Sat 2024-06-22 12:12:36
link
reply
bf54c87b70556d016698a7b7a1e9fd312fc87c103d2bac6201b82140b7ec0b4e.jpg
31.8 KiB 474x355
Wouldn't it be nice if you could flash the bios at startup every time and have it stored in volatile memory?
Then you wouldn't have to worry about evil maid attacks and other shit, because your bios is just on a key you plug in each time, maybe even bundled with your OS.
Most attacks on a system have the goal of placing persistent rats. If the bios, changeable firmware, OS are all transcient, most vectors of persistent surveillance and compromise are gone.
Boot to ram to a totally blank system, then pull the drive(s) for the bios, firmware, OS, and any unique configuration settings you have. Attackers have a minute or two to compromise those before you put them back in a RF shielded necklace case, but you're not even connected to the internet yet. Then you have encrypted drives for personal files.
Without the necessary drives, the computer is blank of any meaningful data. Each boot up is fresh and free of any compromises from the previous session. Personal data isn't saved on the computer at all, it stays on encrypted drives you can take with you if you're paranoid.
The earliest mechano-digital computers used punch card based programs to process data. When you wanted an operation done, you first loaded the program punch card series to program the computer to do what you wanted.
The big problem with bios is that it's somewhere between actual firmware (which cannot be changed by any convenient means) and software, making it easy enough to tamper with. So why not just make it like software or make it totally firmware? The purpose of being able to change it is to accomodate new hardware and be able to issue updates to deal with bugs, and the reason it's not bundled with the OS is because motherboards aren't standardized.
You can flash some boards every time you boot up, but it's got a risk of bricking your motherboard (which only happens because a bad write can persist on the board and prevent startup) and because there's persistent memory on the boards and multiple components there are bios viruses that can prevent themselves from being wiped, copying themselves from component to component as flashing is occuring.
Referenced by:
P98408
P98613
P123437
P98372
Sat 2024-06-22 12:22:43
link
reply
>most vectors of persistent surveillance and compromise are gone.
most attack vectors of persistent surveillance and compromise are gone.
If the OS/Bios/etc. developers place a rat in the program, then it's there at boot up obviously.
Referenced by:
P98408
P98408
Sat 2024-06-22 20:18:41
link
reply
1b53d222c8ca0a32252e487186d3238c93c7b5d19f87786b3e782e9536d89f68.jpg
95.1 KiB 969x1920
P98371
>You can flash some boards every time you boot up
This is retarded
P98372
DXE bios drivers or modules really are DXE bios drivers or modules
Referenced by:
P98531
P98414
Sat 2024-06-22 20:49:24
link
reply
2554e59ccc7a0810ef41d4370e6558ec47eead2b9499e74dbc0bc8be915527fe.png
404 KiB 915x712
DXE modules are where attack vectors originate in the BIOS.
CompuTrace/LoJack/Absoluteยฉ have been know for attack and (((UEFI))) opens up attacks also
>The hooks are then used to divert function calls to the malicious shellcode that the attackers have appended to the CORE_DXE image.
https://www.eset.com/us/about/newsroom/corporate-blog/what-you-need-to-know-about-lojax-the-new-stealthy-malware-from-fancy-bear/
https://www.tomshardware.com/news/moonbounce-malware-hides-in-your-bios-chip-persists-after-drive-formats
https://arstechnica.com/information-technology/2023/03/unkillable-uefi-malware-bypassing-secure-boot-enabled-by-unpatchable-windows-flaw/
Referenced by:
P98461
P123437
P98461
https://distrowatch.com/table.php?distribution=tails
Sun 2024-06-23 03:25:30
link
reply
P98414
Ok, but how do I remove the bad ones if a person can't coreboot tho
>t. improvised explosives
P98485
sage
Sun 2024-06-23 05:24:25
link
reply
>new or newer computers
P98531
Sun 2024-06-23 15:52:54
link
reply
60bce519608eee1abcb367bc3c77d7cda4acabe865cf47ec1450284abd84a261.jpg
236 KiB 1920x1080
P98408
>This is retarded
That's what I thought when I first saw that aids ***** post but then I thought about it and maybe he's not retard. BIOS/UEFI firmware lives on a SPI flash chip on the motherboard. You probably could desolder the chip and replace it with a socket and then you could pop the chip in and out as needed. And if it turns out you can't remove it while the system is running you could at least add a write blocker so no unexpected changes can be made.
P98539
12of7
Sun 2024-06-23 16:43:54
link
reply
ya'll can flash any computer using the jtag bus if you can decode the seat coordinates
P98572
braindamage + sage
Sun 2024-06-23 23:58:04
link
reply
>You probably could desolder the chip and replace it with a socket and then you could pop the chip in and out as needed. And if it turns out you can't remove it while the system is running you could at least add a write blocker so no unexpected changes can be made.
P98613
vandalism
Mon 2024-06-24 04:38:02
link
reply
ffccb385f72cce8122ee682fe97b034feb5c6d1eab702ca1550c0b2fd7a1954d.jpg
25.4 KiB 700x400
P98371
All the ARM instructions to x86 instructions then converted back to assembly make for a kosher disaster of firmware. These "DXE" modules you speak of are just blobs but whats worse this TPM now and not that TPM is bad but TPM being a backdoor like Micro$oft
[bold:
BitLocker
]
[spoiler:
WHICh iS RaNSoMwARe aS A SeRVIcE
(RaaS)
]
.
Referenced by:
P123437
P123405
[email protected]
Mon 2024-10-28 01:13:52
link
reply
Matt DeVillier deviling your Coreboot iamges and putting backdoors in for AMD and (((Blackhawk Datacom)))
P123411
Mon 2024-10-28 01:33:19
link
reply
m8 well there's hours imo of time on the telephone line to talk about things to come Stupid
P123413
Mon 2024-10-28 01:36:52
link
reply
Like *****ing all of them, you can read the firmware from /dev/mem in linux if you know how to identify where the code is through the lacking GRUB uefi memory map, you can even microcode update from here, both for the processor and any peripherals supporting it (Intel ME?)
P123416
โฃ๐๐พ๐ (๐) ๐ฅ ๐ฌ
Mon 2024-10-28 01:51:57
link
reply
I flash the BIOS all the time (if you know what I mean).
Referenced by:
P123429
P123429
Mon 2024-10-28 02:29:47
link
reply
P123416
stfu BIOhazard aids infected coon!
P123437
Mon 2024-10-28 02:40:02
link
reply
P98325
To answer OP's question, most x86 computer support updating the bios via the 16bit real mode in DOS or equivelent to have memory access to the adress for the bios. But corecuck and libreboot do not use this option as its board/manufacturer specific and would allow easy replacement of botnet bios garbage. In reality some manufacturers only allow patch files from this specific path and uploading a whole BIOS is forbidden at flash time so you have to use SPI or JTAG.
P98613
Libreboot doesn't have such garbage.
P98414
Good to know libreboot and even coreboot are free from these run of the mill bios attacks.
P98371
What if your adversary got ahold of your hardware and put a flash chip with extra storage on the computer to passively observe things in memory or as they passed certain bussess? As good of an idea of completely changeable software for everything is, the opposite is more secure. Everything is written to read only memory and never changes, ever. From the BIOS to the software present for the user space OS. But as a realistic compromise that hardware manufacturers could easily implement, all the software/firmware being changeable is better, see raptor powerpc9 stuff for proof.
Referenced by:
P123441
P123441
Mon 2024-10-28 03:00:51
link
reply
42c6fdc5e7bbebaac9553fd09141cb2cd0b722280d7ffbdcfc72908c39e551db.png
1.14 MiB 703x853
P123437
>Libreboot doesn't have such garbage.
Lol so panned, I wonder what libreboot is for and will it make netbsd setup boot on restricted orb hardware (like intel X5 slates).
Libre = free
Boot = get orb manager to work.
This could be a BIOS that allows lin/BSD orbs to be loaded in greencornflakes on Windows-only devices.
Referenced by:
P123444
P123500
P123500
Mon 2024-10-28 08:08:34
link
reply
P123441
its funny how you were able to get that right without even understanding with a spi is
Referenced by:
P123501
P123501
Mon 2024-10-28 08:09:16
link
reply
P123500
>with
what
P123512
Mon 2024-10-28 10:35:04
link
reply
https://novacustom.com/
You might want to check this out
Referenced by:
P123612
P123612
sage
Tue 2024-10-29 02:06:21
link
reply
P123512
lol why dafuq would u pay for tailored access when you could just a computer and do it yourself
Referenced by:
P123621
P123621
Tue 2024-10-29 02:17:36
link
reply
P123612
They come with ethical hardware, you can pick the keyboard you'd like and you can order it with tamper evident packaging. It's recommended by the Qubes devs and not all of us want to go through the hassle of looking for FSF-endorsed parts, flashing a custom BIOS, cleaning the IME blah blah blah. Think about it as a macbook for schizos who don't want to get ass*****d by corpos
Referenced by:
P123623
P123623
Tue 2024-10-29 02:21:33
link
reply
P123621
think about it as overpaying for computer that you could do yourself with less money just by buying a spi 5v flasher
if you dont learn yourslef then you will continue to lack confidence in you skills and device
P123896
Wed 2024-10-30 07:40:38
link
reply
BIOS is a corps' attempt to control what users are running on their devices. It has been implemented as they planned in Android phones and perfected in iPhones.
Referenced by:
P123967
P123966
Wed 2024-10-30 15:02:18
link
reply
P23896
Agreed. Though I can't come up with better alternatives.
Referenced by:
P123967
P123967
Wed 2024-10-30 15:02:55
link
reply
P123966
->
P123896
P124212
Thu 2024-10-31 21:45:55
link
reply
Is Dasharo any good and does it come with option to store my Monero keys in the BIOS?
P124464
Sat 2024-11-02 11:07:57
link
reply
P98325
Dell Latitude E6400 and Apple MacBook2,1.
Mod Controls:
x
Reason: