• 0 Posts
  • 10 Comments
Joined 1Y ago
cake
Cake day: Jun 23, 2023

help-circle
rss

While online I have most of my items under lock and key, my personal computer at home is set to boot automatically with my password (since the attack vector of “having the feds raid my home” is fortunately not an issue for me). So in the rare case that I’m no longer available, my family can just get my user names and passwords from my computer


Because by doing so, law enforcement can manipulate the image from the source by:

  • Intercepting the payload and modifying the operative system to send data to law enforcement
  • Pose as the origin of the original payload, and send the tainted operative system to other devices when they reboot

Unless, of course, the BIOS stores the checksum of the untainted image. (Which adds its own can of worms, because that would make legitimate image upgrades require writing the new proper checksum on each server)


Because by knowing which IP is the boot image stored from, law enforcement can locate the source of the unencrypted image, thus making the scheme lose its privacy. The only way to bypass the issue is by manually configuring the IP after every reboot and keeping it a secret.


So there is still one single damning piece of information stored in the servers after all - the IP address to fetch the PXE boot image from. But hey, if Mullvad finds a way to strip even that out of the servers, that’d be great


I’m aware of PXE, but in order to do so you need either of:

  • the boot image supplying server being in the same intranet as the rest of the other servers, or
  • some sort of method to point the diskless server to the correct external IP address to listen to

Since the first mode is probably too unsafe, that leaves us with the second mode. Either the operator memorizes a specific IP address and types it into the BIOS each time the server is rebooted, or the IP address (and possibly the checksum of the image) are stored in a single-use pendrive that the operator carries. I wonder which of these two methods is used in this case.


Something tells me that they have a stack of single-use drives so that each time a server needs to reboot for some reason, they write a boot loader in one from their central headquarters, walk back to the server room, use the device to boot the server, and finally hammer the everliving bejeezus out of the thumb drive juuuuust in case. Hopefully they don’t have to reboot that often!


Short of getting their own servers of course. This update seems to be a step forward in that direction


From what I read in the article, there is still one part of the boot sequence that does require some sort of storage: the part where the bootloader fetches the network boot image and verifies it against the checksum signature. But I think that can be performed by booting from a pendrive and then removing it. The problem will come if law enforcement gets a hold of said pendrive…


And that’s why I have no friends, because when I propose “walking to my house to tell me” as an alternate method of communication, they throw their hands to the air and say “that’s it, you’re too much of a hassle”


Not even joking, the fact that Magic Earth is still proprietary and comes bundled with /e/ is the main reason why I’m still not confident enough to use it as my ROM