Skip to content
  • Hjem
  • Seneste
  • Etiketter
  • Populære
  • Verden
  • Bruger
  • Grupper
Temaer
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Kollaps
FARVEL BIG TECH
  1. Forside
  2. Ikke-kategoriseret
  3. We strongly oppose the Unified Attestation initiative and call for app developers supporting privacy, security and freedom on mobile to avoid it.

We strongly oppose the Unified Attestation initiative and call for app developers supporting privacy, security and freedom on mobile to avoid it.

Planlagt Fastgjort Låst Flyttet Ikke-kategoriseret
163 Indlæg 47 Posters 0 Visninger
  • Ældste til nyeste
  • Nyeste til ældste
  • Most Votes
Svar
  • Svar som emne
Login for at svare
Denne tråd er blevet slettet. Kun brugere med emne behandlings privilegier kan se den.
  • grapheneos@grapheneos.socialG grapheneos@grapheneos.social

    We strongly oppose the Unified Attestation initiative and call for app developers supporting privacy, security and freedom on mobile to avoid it. Companies selling phones should not be deciding which operating systems people are allowed to use for apps.

    https://uattest.net/

    lumi@snug.moeL This user is from outside of this forum
    lumi@snug.moeL This user is from outside of this forum
    lumi@snug.moe
    wrote sidst redigeret af
    #22

    @GrapheneOS what the fuck. that is absolutely horrifying

    remote attestation is a technology that has no good uses. it's just drm

    everyone should have the freedom to run whatever they want on their own devices. this freedom should never be taken away and it should be enshrined in law that it can never be taken away

    someone else should not be able to decide whether my device is "secure" enough for their purposes. this is reverse security. the os needs to boot securely and the attestation chain should go upwards, with each stage verifying the ones on top of it. not this opposite world bullshit

    lumi@snug.moeL grapheneos@grapheneos.socialG lunareclipse@snug.moeL 3 Replies Last reply
    0
    • lumi@snug.moeL lumi@snug.moe

      @GrapheneOS what the fuck. that is absolutely horrifying

      remote attestation is a technology that has no good uses. it's just drm

      everyone should have the freedom to run whatever they want on their own devices. this freedom should never be taken away and it should be enshrined in law that it can never be taken away

      someone else should not be able to decide whether my device is "secure" enough for their purposes. this is reverse security. the os needs to boot securely and the attestation chain should go upwards, with each stage verifying the ones on top of it. not this opposite world bullshit

      lumi@snug.moeL This user is from outside of this forum
      lumi@snug.moeL This user is from outside of this forum
      lumi@snug.moe
      wrote sidst redigeret af
      #23

      @GrapheneOS apps should not even have the privilege to check these things. it's a complete violation of a security boundary

      grapheneos@grapheneos.socialG 1 Reply Last reply
      0
      • grapheneos@grapheneos.socialG grapheneos@grapheneos.social

        Play Integrity API should be regulated out of existence rather than making another system where companies permit their own products while disallowing others. It shouldn't be legal when Google does it and it shouldn't be legal when Volla and Murena do it either. This is wrong.

        E This user is from outside of this forum
        E This user is from outside of this forum
        edux@bildung.social
        wrote sidst redigeret af
        #24

        @GrapheneOS people who are buying these phone execute a form of digital self-imprisoning.

        Why are these walled gardens so attractive?

        1 Reply Last reply
        0
        • lumi@snug.moeL lumi@snug.moe

          @GrapheneOS what the fuck. that is absolutely horrifying

          remote attestation is a technology that has no good uses. it's just drm

          everyone should have the freedom to run whatever they want on their own devices. this freedom should never be taken away and it should be enshrined in law that it can never be taken away

          someone else should not be able to decide whether my device is "secure" enough for their purposes. this is reverse security. the os needs to boot securely and the attestation chain should go upwards, with each stage verifying the ones on top of it. not this opposite world bullshit

          grapheneos@grapheneos.socialG This user is from outside of this forum
          grapheneos@grapheneos.socialG This user is from outside of this forum
          grapheneos@grapheneos.social
          wrote sidst redigeret af
          #25

          @lumi Android's hardware-based attestation API would not cause these issues if it only had the pinning-based attestation we use as the basis for Auditor and omitted root-based attestation. The issue is having attestation roots which determine which hardware and operating systems are valid. Hardware-based attestation can be provided without any centralized authority determining which hardware and software is valid. It would still provide nearly all of what our Auditor app uses without roots.

          grapheneos@grapheneos.socialG 1 Reply Last reply
          0
          • grapheneos@grapheneos.socialG grapheneos@grapheneos.social

            @lumi Android's hardware-based attestation API would not cause these issues if it only had the pinning-based attestation we use as the basis for Auditor and omitted root-based attestation. The issue is having attestation roots which determine which hardware and operating systems are valid. Hardware-based attestation can be provided without any centralized authority determining which hardware and software is valid. It would still provide nearly all of what our Auditor app uses without roots.

            grapheneos@grapheneos.socialG This user is from outside of this forum
            grapheneos@grapheneos.socialG This user is from outside of this forum
            grapheneos@grapheneos.social
            wrote sidst redigeret af
            #26

            @lumi We support hardware-based attestation based on pinning for protecting users against attacks. Root-based attestation has extremely weak security due to depending on the entire ecosystem of devices not having vulnerabilities enabling leaking keys chaining up to the root. Pinning-based attestation can be used as a very strong security feature. Check out our Auditor app. It does use the root-based attestation for first verification but it would provide most of what it does without it.

            lumi@snug.moeL 1 Reply Last reply
            0
            • lumi@snug.moeL lumi@snug.moe

              @GrapheneOS apps should not even have the privilege to check these things. it's a complete violation of a security boundary

              grapheneos@grapheneos.socialG This user is from outside of this forum
              grapheneos@grapheneos.socialG This user is from outside of this forum
              grapheneos@grapheneos.social
              wrote sidst redigeret af
              #27

              @lumi Apps should be able to use pinning-based attestation but root-based attestation as it exists today is inherently anti-competitive and anti-security. It locks people into using less secure hardware and software. The approaches should be differentiated. Any device can provide pinning-based attestation support including software emulation of it if they don't support the security features. Apps can use it with no loss of choice or privacy. Attestation roots are the abusive part.

              grapheneos@grapheneos.socialG 1 Reply Last reply
              0
              • grapheneos@grapheneos.socialG grapheneos@grapheneos.social

                @lumi We support hardware-based attestation based on pinning for protecting users against attacks. Root-based attestation has extremely weak security due to depending on the entire ecosystem of devices not having vulnerabilities enabling leaking keys chaining up to the root. Pinning-based attestation can be used as a very strong security feature. Check out our Auditor app. It does use the root-based attestation for first verification but it would provide most of what it does without it.

                lumi@snug.moeL This user is from outside of this forum
                lumi@snug.moeL This user is from outside of this forum
                lumi@snug.moe
                wrote sidst redigeret af
                #28

                @GrapheneOS does this mean, if i build grapheneos myself and flash it on my device, i could still run all these applications?

                and i mean without contacting any third party or anything like that

                edit: woops. replied to the wrong post. was meaning to reply to the latest one. sorry

                grapheneos@grapheneos.socialG 1 Reply Last reply
                0
                • grapheneos@grapheneos.socialG grapheneos@grapheneos.social

                  @lumi Apps should be able to use pinning-based attestation but root-based attestation as it exists today is inherently anti-competitive and anti-security. It locks people into using less secure hardware and software. The approaches should be differentiated. Any device can provide pinning-based attestation support including software emulation of it if they don't support the security features. Apps can use it with no loss of choice or privacy. Attestation roots are the abusive part.

                  grapheneos@grapheneos.socialG This user is from outside of this forum
                  grapheneos@grapheneos.socialG This user is from outside of this forum
                  grapheneos@grapheneos.social
                  wrote sidst redigeret af
                  #29

                  @lumi Root-based attestation is can be used to bootstrap pinning-based approach to bootstrap initial trust in a weak way that's vulnerable to leaked keys and trusts a bunch of different parties which is what we do in our Auditor app. The real security model it uses is a Trust On First Use model to provide secure attestation going forward. The problem is Google or this new group declaring themselves as arbiters of what's allowed and using a root CA to allow only business partners.

                  1 Reply Last reply
                  0
                  • lumi@snug.moeL lumi@snug.moe

                    @GrapheneOS does this mean, if i build grapheneos myself and flash it on my device, i could still run all these applications?

                    and i mean without contacting any third party or anything like that

                    edit: woops. replied to the wrong post. was meaning to reply to the latest one. sorry

                    grapheneos@grapheneos.socialG This user is from outside of this forum
                    grapheneos@grapheneos.socialG This user is from outside of this forum
                    grapheneos@grapheneos.social
                    wrote sidst redigeret af
                    #30

                    @lumi GrapheneOS supports the Android hardware-based attestation API. The API itself is a neutral approach which can support arbitrary roots of trust, non-stock operating systems verified based on verified boot key fingerprint and also has pinning-based attestation based on a proposal we made to Google before they stopped collaborating with us. Pinning-based attestation can be used with or without chaining up to a root for bootstrapping trust. It could exist without root-based attestation.

                    grapheneos@grapheneos.socialG lumi@snug.moeL 2 Replies Last reply
                    0
                    • grapheneos@grapheneos.socialG grapheneos@grapheneos.social

                      @lumi GrapheneOS supports the Android hardware-based attestation API. The API itself is a neutral approach which can support arbitrary roots of trust, non-stock operating systems verified based on verified boot key fingerprint and also has pinning-based attestation based on a proposal we made to Google before they stopped collaborating with us. Pinning-based attestation can be used with or without chaining up to a root for bootstrapping trust. It could exist without root-based attestation.

                      grapheneos@grapheneos.socialG This user is from outside of this forum
                      grapheneos@grapheneos.socialG This user is from outside of this forum
                      grapheneos@grapheneos.social
                      wrote sidst redigeret af
                      #31

                      @lumi The problem with the Android attestation API is that the documentation and libraries treat Google as the only root of trust and it's also inherently biased towards stock operating systems since it can verify those by simply checking for the green state instead of needing to allowlist keys for the yellow state. Even if apps used hardware-based attestation instead of the Play Integrity API, many wouldn't permit GrapheneOS and they'd still be limiting what people can use if they did allow it.

                      lumi@snug.moeL 1 Reply Last reply
                      0
                      • grapheneos@grapheneos.socialG grapheneos@grapheneos.social

                        @lumi GrapheneOS supports the Android hardware-based attestation API. The API itself is a neutral approach which can support arbitrary roots of trust, non-stock operating systems verified based on verified boot key fingerprint and also has pinning-based attestation based on a proposal we made to Google before they stopped collaborating with us. Pinning-based attestation can be used with or without chaining up to a root for bootstrapping trust. It could exist without root-based attestation.

                        lumi@snug.moeL This user is from outside of this forum
                        lumi@snug.moeL This user is from outside of this forum
                        lumi@snug.moe
                        wrote sidst redigeret af
                        #32

                        @GrapheneOS so, if i built my own aosp rom, or decide to use an emulator run an aosp rom (for compat reasons, not security), could i pin my own certificates, to make (unmodified) apps work on my device without complaining?

                        grapheneos@grapheneos.socialG 1 Reply Last reply
                        0
                        • lumi@snug.moeL lumi@snug.moe

                          @GrapheneOS so, if i built my own aosp rom, or decide to use an emulator run an aosp rom (for compat reasons, not security), could i pin my own certificates, to make (unmodified) apps work on my device without complaining?

                          grapheneos@grapheneos.socialG This user is from outside of this forum
                          grapheneos@grapheneos.socialG This user is from outside of this forum
                          grapheneos@grapheneos.social
                          wrote sidst redigeret af
                          #33

                          @lumi Apps don't use the hardware-based attestation API directly in practice by rather using a service like the Play Integrity API choosing what's allowed. Unified Attestation is a group which wants to use hardware-based attestation to choose what's allowed themselves. We don't think hardware-based attestation should be used to choose which operating systems are allowed and also don't agree with this specific group of companies selling insecure products adding vendor lock-in for themselves.

                          lumi@snug.moeL 1 Reply Last reply
                          0
                          • grapheneos@grapheneos.socialG grapheneos@grapheneos.social

                            @lumi The problem with the Android attestation API is that the documentation and libraries treat Google as the only root of trust and it's also inherently biased towards stock operating systems since it can verify those by simply checking for the green state instead of needing to allowlist keys for the yellow state. Even if apps used hardware-based attestation instead of the Play Integrity API, many wouldn't permit GrapheneOS and they'd still be limiting what people can use if they did allow it.

                            lumi@snug.moeL This user is from outside of this forum
                            lumi@snug.moeL This user is from outside of this forum
                            lumi@snug.moe
                            wrote sidst redigeret af
                            #34

                            @GrapheneOS i think it is fundamentally wrong that the app gets to decide what it runs on. it should not have this authority as it is completely backwards

                            if i wanted to run the most insecure system, i should still be able to run whatever apps i want, as long as all the apis are implemented

                            of course i don't want to run an insecure system. but it's my device so i should be able to do whatever i want

                            grapheneos@grapheneos.socialG 1 Reply Last reply
                            0
                            • lumi@snug.moeL lumi@snug.moe

                              @GrapheneOS i think it is fundamentally wrong that the app gets to decide what it runs on. it should not have this authority as it is completely backwards

                              if i wanted to run the most insecure system, i should still be able to run whatever apps i want, as long as all the apis are implemented

                              of course i don't want to run an insecure system. but it's my device so i should be able to do whatever i want

                              grapheneos@grapheneos.socialG This user is from outside of this forum
                              grapheneos@grapheneos.socialG This user is from outside of this forum
                              grapheneos@grapheneos.social
                              wrote sidst redigeret af
                              #35

                              @lumi Apps wouldn't be able to disallow using operating systems via the hardware attestation API if it only supported pinning-based security and didn't have support for chaining up to a root. It's chaining up to a root which enables trusting only Google's root or specific roots permitted for specific alternate hardware. Similarly, there's the fact that they differentiate green and yellow where green trusts every OS approved by the root CA party vs. yellow requiring allowlisting fingerprints.

                              lumi@snug.moeL grapheneos@grapheneos.socialG 2 Replies Last reply
                              0
                              • grapheneos@grapheneos.socialG grapheneos@grapheneos.social

                                @lumi Apps don't use the hardware-based attestation API directly in practice by rather using a service like the Play Integrity API choosing what's allowed. Unified Attestation is a group which wants to use hardware-based attestation to choose what's allowed themselves. We don't think hardware-based attestation should be used to choose which operating systems are allowed and also don't agree with this specific group of companies selling insecure products adding vendor lock-in for themselves.

                                lumi@snug.moeL This user is from outside of this forum
                                lumi@snug.moeL This user is from outside of this forum
                                lumi@snug.moe
                                wrote sidst redigeret af
                                #36

                                @GrapheneOS yeah, i agree. if it's my device, i should be able to do whatever the heck i please

                                1 Reply Last reply
                                0
                                • grapheneos@grapheneos.socialG grapheneos@grapheneos.social

                                  @lumi Apps wouldn't be able to disallow using operating systems via the hardware attestation API if it only supported pinning-based security and didn't have support for chaining up to a root. It's chaining up to a root which enables trusting only Google's root or specific roots permitted for specific alternate hardware. Similarly, there's the fact that they differentiate green and yellow where green trusts every OS approved by the root CA party vs. yellow requiring allowlisting fingerprints.

                                  lumi@snug.moeL This user is from outside of this forum
                                  lumi@snug.moeL This user is from outside of this forum
                                  lumi@snug.moe
                                  wrote sidst redigeret af
                                  #37

                                  @GrapheneOS i think i might be confused as to what the difference between root-based and pinning-based attestation is

                                  is the one allowlisting the app or the system?

                                  grapheneos@grapheneos.socialG 1 Reply Last reply
                                  0
                                  • grapheneos@grapheneos.socialG grapheneos@grapheneos.social

                                    @lumi Apps wouldn't be able to disallow using operating systems via the hardware attestation API if it only supported pinning-based security and didn't have support for chaining up to a root. It's chaining up to a root which enables trusting only Google's root or specific roots permitted for specific alternate hardware. Similarly, there's the fact that they differentiate green and yellow where green trusts every OS approved by the root CA party vs. yellow requiring allowlisting fingerprints.

                                    grapheneos@grapheneos.socialG This user is from outside of this forum
                                    grapheneos@grapheneos.socialG This user is from outside of this forum
                                    grapheneos@grapheneos.social
                                    wrote sidst redigeret af
                                    #38

                                    @lumi We don't support using attestation to disallow using hardware or operating systems. We do support having hardware attestation for providing protection against device compromise. The issue is that the features provided can be used to disallow using devices instead of only protecting against compromise and notifying users if something is wrong. Apps notifying users their OS is missing security patches or lacks security features would be fine but we don't agree with banning using it..

                                    1 Reply Last reply
                                    0
                                    • lumi@snug.moeL lumi@snug.moe

                                      @GrapheneOS i think i might be confused as to what the difference between root-based and pinning-based attestation is

                                      is the one allowlisting the app or the system?

                                      grapheneos@grapheneos.socialG This user is from outside of this forum
                                      grapheneos@grapheneos.socialG This user is from outside of this forum
                                      grapheneos@grapheneos.social
                                      wrote sidst redigeret af
                                      #39

                                      @lumi Root-based attestation is done by verifying certificates up to a root of trust which is a Google certificate authority for Google Mobile Services devices. The Android hardware attestation API is in fact not inherently biased towards Google itself but rather their documentation and open source sample libraries hard-wire their roots as the only ones which should be checked.

                                      Android supports apps generating attest keys in the hardware keystore to use for signing attestations instead.

                                      grapheneos@grapheneos.socialG 1 Reply Last reply
                                      0
                                      • grapheneos@grapheneos.socialG grapheneos@grapheneos.social

                                        @lumi Root-based attestation is done by verifying certificates up to a root of trust which is a Google certificate authority for Google Mobile Services devices. The Android hardware attestation API is in fact not inherently biased towards Google itself but rather their documentation and open source sample libraries hard-wire their roots as the only ones which should be checked.

                                        Android supports apps generating attest keys in the hardware keystore to use for signing attestations instead.

                                        grapheneos@grapheneos.socialG This user is from outside of this forum
                                        grapheneos@grapheneos.socialG This user is from outside of this forum
                                        grapheneos@grapheneos.social
                                        wrote sidst redigeret af
                                        #40

                                        @lumi These attest keys are meant to be pinned after the initial use and then used to enforce that subsequent attestations have trust chained from the initial verification. As long as the initial key was securely generated in the TEE or secure element and those have not been compromised with exploits then compromised apps or a compromised OS cannot fake the data. It chains trust from an initial starting point and does not limit which hardware or software can be used, the root approach does.

                                        grapheneos@grapheneos.socialG lumi@snug.moeL 2 Replies Last reply
                                        0
                                        • grapheneos@grapheneos.socialG grapheneos@grapheneos.social

                                          @lumi These attest keys are meant to be pinned after the initial use and then used to enforce that subsequent attestations have trust chained from the initial verification. As long as the initial key was securely generated in the TEE or secure element and those have not been compromised with exploits then compromised apps or a compromised OS cannot fake the data. It chains trust from an initial starting point and does not limit which hardware or software can be used, the root approach does.

                                          grapheneos@grapheneos.socialG This user is from outside of this forum
                                          grapheneos@grapheneos.socialG This user is from outside of this forum
                                          grapheneos@grapheneos.social
                                          wrote sidst redigeret af
                                          #41

                                          @lumi The pinning-based approach was implemented so that you can verify the initial chain based on the root by enabling attestation for the attest key itself but it doesn't have to be used that way. It can be used to solely provide pinning-based attestation. Our Auditor app uses both but we don't consider root-based attestation to have much value. Any exploit of any TEE or secure element on any Android device that's certified can be used to get keys chaining to a root. It's not a secure system.

                                          1 Reply Last reply
                                          0
                                          Svar
                                          • Svar som emne
                                          Login for at svare
                                          • Ældste til nyeste
                                          • Nyeste til ældste
                                          • Most Votes


                                          • Log ind

                                          • Har du ikke en konto? Tilmeld

                                          • Login or register to search.
                                          Powered by NodeBB Contributors
                                          Graciously hosted by data.coop
                                          • First post
                                            Last post
                                          0
                                          • Hjem
                                          • Seneste
                                          • Etiketter
                                          • Populære
                                          • Verden
                                          • Bruger
                                          • Grupper