It seems that you're using an outdated browser. Some things may not work as they should (or don't work at all).
We suggest you upgrade newer and better browser like: Chrome, Firefox, Internet Explorer or Opera

×
avatar
nightcraw1er.488: ... Never seen the point in tablets/surface ...
avatar
Trilarion: That is of course your right. Just wanted to answer the question if there are products that Microsoft has been working on and improving them. For me they have.
Well, that's nice for you. Unfortunately these mobile devices that they put so much resource into, both moves resource off desktop resource, and also filters backwards - just look at the metro interface from Win8, and its still present in Win10. It wouldn't be too bad if they had a mobile OS, and a desktop OS, but squashing them all in one just doesn't work.
avatar
Trilarion: That is of course your right. Just wanted to answer the question if there are products that Microsoft has been working on and improving them. For me they have.
avatar
nightcraw1er.488: Well, that's nice for you. Unfortunately these mobile devices that they put so much resource into, both moves resource off desktop resource, and also filters backwards - just look at the metro interface from Win8, and its still present in Win10. It wouldn't be too bad if they had a mobile OS, and a desktop OS, but squashing them all in one just doesn't work.
But they want the UWP, where any application made works on anything. Regardless if it's a good idea...

Office for your phone! Phone GUI on your desktop! Phone games on XBone! AAAHHHH

Actually having the system where .NET actually made sense, compiling code as bytecodes that are translated to local binary much like JAVA sounds like a good idea. Except I think that isn't how .NET pushes it's applications at the end.
avatar
Gersen: The master key that is only available from Microsoft IS Microsoft master key; it's like saying that Verisign master key is only available from Verisign.

Ms doesn't have the exclusivity on master keys, technically anybody could have its own master key installed by default given of course that they convince manufacturers to do it.

If they use Ms key it's mostly because it's easier and much cheaper than buying your own master key and then convince every single "bios" manufacturer to include it.

But saying that secure boot in itself is "DRM" is silly, it's like saying that SSL is also a DRM because you have to rely on some external trusted root key before you can sign anything.

Where I do kind of agree however is that all bios should have the option to let users install they own master keys for secure boot in the same way that most OSes let you install you own root key if you want to use self sign certificate or simply don't want to buy a key from Verisign.

At least there should be a list of certificate authorities able to issues key that would then be included by default in all UEFI bios but we are not there yet.
1) De facto only MS has access, so its exclusive access. Machine will refuse to boot your code, unless you have a key issued by them or crack the machine in a very similar way to how DRM is cracked even by legal owners for legal purposes.

2) Its DRM - not SSL, because you can't use your own crafted key. Encryption is an access restriction technology. Its a lock, only those who have key or break the lock - gain access. DRM very often uses encryption. The difference is that you don't get the key. SSL allows you to craft your own certificates, its just browsers would warn anyone because you yourself was not added to the whitelist of "valid" certificate makers. You can add yourself to the list also easily, either globally ($$$ or contacts to browser manufacturers) or locally in very few steps. Many sites crafted own certificates and applied them to global websites to get the "s" in https working.

So its a DRM (digital restriction management), a hardware DRM, a utterly useless no-value hardware DRM. There can only be some use in corporate environiment, provided a corporation purchases a certificate ($$$), but it does not allow you to use the technology right away. So its not a "secure boot", its a DRM boot. If you could craft your own certificate and hardware would accept it - adhering to the owner, then it would be "secure boot". But it does not offer anything like this, only thing it allows is code blocks which were signed by some group a regular hardware owner is not part of. There is nothing "secure" in this boot, only DRM, its only secure what they want to secure. Much "personal computing".

Where is the difference between "secure boot" and old "securom" if applied to earlier boot sequence? There is none. There is a purposely optional deactivated mode and a purposely required activated mode. The optional deactivated mode is on purpose disabled in non-x86. Everything this will indeed make you more secure... to them.

This is not your guard dog, is someone else guard dog, which will bark at you when others want it to. Thats a huge difference. And now its a good time to also remember Paladium, TPM and Vista. So much MS "change" right here.

But please do buy and use windows, because you enjoy them screwing not only the software stack but also hardware anyway. Don't cha?
avatar
Lin545: 2) Its DRM - not SSL, because you can't use your own crafted key. ...
Except you can : http://www.linuxjournal.com/content/take-control-your-pc-uefi-secure-boot

Secure boot allows you to craft and use your own keys, its just some manufacturer that are too lazy to offer the option to install custom keys in their bios.


And if you want to complain about that then I would agree, yes IMO all bios manufacturer should offer the option to enable/disable and/or install your own key for secure boot, (Among with other option like boot external devices in legacy mode)

But it's an issue of manufacturer laziness and neither Microsoft not Secure boot, as a technology, fault.
avatar
Gersen: Except you can : http://www.linuxjournal.com/content/take-control-your-pc-uefi-secure-boot

But it's an issue of manufacturer laziness and neither Microsoft not Secure boot, as a technology, fault.
Nice article, except key exchange is only possible on x86, and even then OEMs are given ability to "decide" - all in instructions given out by MS and are required to be followed in order to get the said MS discount.

Again: its MS who requires secureboot
- installed
- enabled
- with walking away regarding "disable", except x86 where disable is not allowed

The lock is installed and required enabled without exact strict guideline around controling it to loose the ends in water.
Thats not how you control your security and thats not a security at all. Its a DRM.