Hacker News new | past | comments | ask | show | jobs | submit login

My Linux remark applied solely to the backdoor that used a ACPI table to make Windows install malware on every boot, which I had linked. It did not claim that installing Linux protected you from anything else.



That ACPI table payload is conditional and obviously OS dependent. Overall not a huge threat.

SMM interrupt code comes from the very same BIOS image and is executed at arbitrary times regardless of operating system. SMM code can do pretty much anything it pleases, it runs at the highest privilege and priority level possible.


Discussion of SMM interrupt code is irrelevant to the observation that installing Linux protects you from a Windows specific backdoor. That was not a claim that Linux provided safety against every possible backdoor. You seem to be trying to debunk a claim that no one made.


I don't try to debunk anything.

I think it's just silly to talk about some ACPI table payload, when there's a greater threat controlled by the same binary blob.

SMM can do anything that ACPI payload could do and more. And we need to trust the same entity for its integrity.

SMM is also operating system independent. It'll run no matter what operating system end user runs.


If you were not trying to debunk anything, then this was a very poor choice of words:

> So, hypothetically speaking, say a laptop firmware has an SMM backdoor, how does using Linux bypass it in any way?

Aside from that, good point.


ACPI?

I think it's UEFI mounting the Windows partition and dropping some files there before booting the OS. ACPI executes on a virtual machine inside the kernel and afaik it's not supposed to be able to write to files.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: