Ok, maybe I've been doing too much hardware development and more tinkering than the average guy, but this part here, to me, sounds way overblown:
> As you can see, it is not a trivial matter to
> manufacture these HKSes. A lot of research and
> hard work went into the effort.
I mean, compared to all the other things one has to get right to design a laptop computer, switching these few signals is indeed very, very trivial.
And while the webcam/microphone switches will prevent the particular devices from working, I'm not so sure about the WiFi card and Bluetooth. The microphone surely is dead by cutting the single signal line and the webcam by cutting its power.
But there's no guarantee that the W_DISABLE# pins are honored with every firmware of every possible wifi module that could be inserted into that slot. What if W_DISABLE#, on the card, is only a gpio that is checked by the WiFi chip's firmware? It would have been safer to also cut the power there, too. Or at least to verify that W_DISABLE# cuts off power to the RF PAs (transmitter power amplifier) of WiFi and Bluetooth in a way that can't be circumvented.
This article does leave me slightly confused. Both these additions seem to be completely done after the fact. Why would you solder wires to 1 side of the pads for the pulldown resistors (suggesting that when the motherboard was designed it was intended to always have enabled WiFi) rather than designing a proper switch (not very many components!) into the board to start with? It all sort of suggests that they didn't actually design their motherboard at all, or that these switches were an afterthought. Neither of those is particularly good given their claims.
It probably costs a lot more than $250,000 to develop a laptop from scratch, so I wouldn't blame them for taking a higher level systems approach and buying in a pre-existing motherboard design. However, doing that inevitably gives up control of the design (which puts into doubt their claims of being completely open). If that's the approach they've taken, they're not particularly open about it.
Agreed, they're way overstating the difficulty here. I think they just wanted to advertise that they do this, which is fair, and it's a feature I wish more laptops had.
It's even a bit worse when looking at it from a fail-safe point of view. To turn the bluetooth and wifi off, 3.3 Volt has to be put on the pins. Giving no power on the pins turns both devices on.
To me it sounds like a practical decision. Go buy a USB wifi adaptor and plug and unplug it 100 times. Then tell me if the adaptor works correctly after that; the kernel driver is probably in some undefined state now.
The reality is that the chip/firmware/driver combination is tested by turning the power on once and then making it pass a few benchmarks that reviewers like. Doing something new and exciting may or may not work.
Certainly, some drivers are way better than others (ath9k is pretty good), but I imagine they tested the power up/power down method, noted that the kernel panics 1 time in 10, and decided nobody would buy their product if they implemented it that way.
Especially since all of these peripherals are COMPLETELY modular for desktop form factors, since you could theoretically buy motherboards without these optional hardware features, and purchase them as completely separate devices, implying that they are assuredly unpluggable, and therefore, without question "switch-off-able" in very real terms.
So, yeah, why all the solder and "chip" modifications?
Great! Small point though, i would be in favour of a separate Bluetooth and Wifi kill switch.
EDIT: They use i5 and i7 processors, which IIRC use black-box Intel microcode... Also, i wonder if they support Libreboot? My apologies if it turns out i cannot read. Otherwise they look quite nice. I'm excited to see more "alternatives" in the "free as in liberty" laptop space.
> i would be in favour of a separate Bluetooth and Wifi kill switch.
that's what I thought as well.
About the microcode, this won't be fixed. But see the weekly updates on their blog[1] that states progress they make with the coreboot developers. Hopefully they can free the number one problem with intel chips[2] which is the Management Engine firmware.
> EDIT: They use i5 and i7 processors, which IIRC use black-box Intel microcode... Also, i wonder if they support Libreboot? My apologies if it turns out i cannot read. Otherwise they look quite nice. I'm excited to see more "alternatives" in the "free as in liberty" laptop space.
They are going to use coreboot, which is free but includes some binary blobs from Intel. I don't think you can boot any modern x86 without a binary blob from the CPU manufacturer, unfortunately.
I also don't think it's possible to get any modern machine up without some device firmware blobs. The best-case is that all the blobs are provided onboard so the OS doesn't need to provide them, but they're still there and we have to trust them.
Purism seems to me an incremental improvement and I might buy one, but I really hope for a truly free machine someday.
I don't really feel like the librem laptops offer much value when built using a processor with IME. It's offering a mostly open source laptop, but still has a massive gaping backdoor for someone to log your every keystroke and get every bit of your data - even if the laptop is off or your harddrive is encrypted (source: http://libreboot.org/faq/#intel)
I especially like to see this laptop because it's the first that I know of that can effectively turn off the microphone (for the webcam we already have stickers so this is less of an advantage, of course still laudable).
Though I think these hardware kill switches should not be optional. A product that praises itself for privacy and security should have this as a base feature instead of asking $89,- separately for it.
This is how it should be done. I really hope manufacturers will start going back to physical hardware switches. I hate long-pressing buttons to switch things on or off, not knowing whether devices are really on or off, or being unable to tell the state of a switch/device just by touching it (without looking).
The physical dual-position sliding switch has a lot of advantages, and yet it has almost completely disappeared from the electronics/computing world. I'd like to see it back.
I used to have a laptop that when you pressed the function button to enable/disable the webcam would actually install/uninstall the webcam drivers. I found it more hilarious than anything.
This is the first I've heard of Puri.sm. It seems like a very ambitious company. I'm not sure features like this are important enough to me to persuade my buying decision. However I love the idea of having another choice besides apple when it comes to hardware. I've just been really unhappy with everything else. I'm excited for another choice when looking for a high-end laptop!
I, too, welcome the existence of a company trying to compete based on preserving privacy and users' freedoms rather than invading it and spying on everything.
Personally, I would consider having hardware switches to disable external sensors and wireless communications channels in a laptop to be a significant factor in a purchasing decision. Other things being equal, I would opt for such features, and I would be willing to pay a bit extra to have them.
Unfortunately, it appears that other things are not equal. Unless I'm missing something, these systems seem to be relatively expensive for the rest of their spec.
More significantly, there is only so much you can do with hardware alone. For now, we also have the usual problem with installing an entirely free/open source software base, which is that much of the software that is useful for getting real work done is not from the FOSS world and the closest FOSS equivalents are not competitive if they exist at all. Being on-line is essential for a lot of activities, but as soon as you're on-line there is still a problem if you don't trust at least the OS and networking software as well as the hardware, and in a Windows 10 world that surely won't be true for many who would be interested in this kind of hardware in the first place.
Still, this seems like a step in a healthy direction, and for that alone I wish them success.
My favorite part is that they're going to support Qubes OS [1].
That's why I'm hoping their next Skylake generation will come with an option for a 6820HQ or 6920HQ CPU [2] (4 cores/8 threads/8MB L3 cache), as well as options for 16 and 32GB of DDR4 RAM (but I assume they'll have that covered) and at least a relatively fast NVMe 256GB SSD drive just so I can run Qubes at maximum performance. Fingerprint authentication (along with software support for two-factor auth at login) would be nice as well.
I do think they need to drive their prices down in the future, though ($2,000 for a "private laptop"). Privacy and security shouldn't be just for the rich. Their laptops feel like they are at least 50% more expensive than what they should be. I imagine this will get better with scale. Their laptops also don't have to be "Macbook Pro quality". I think some compromises there in thinness and build quality can be reasonable, if it means dropping the price by $300 or so.
Thanks for sharing, exactly what I am looking for as I am looking for a new laptop. Some quotes from the test of the Librem-13 that seemed important to me:
[..]The Librem 13 has a 13.3" 1920x1080 Matte IPS screen that I thought looked great. It is nice and bright and to my eyes looks better than the 1920x1080 IPS screen on my X240. [..]
[..] I'm used to the relatively weak speakers that tend to come with Thinkpads so I was pleasantly surprised at the volume from the Librem 13 speakers. Speaking of sound, I've gotten some questions about how quiet the laptop is. The laptop does have a fan and features vent holes along the bottom. It's kicked on while I've typed with it on my lap and while you can hear it a bit in a quiet room, to my ears it's pretty quiet. Let's put it this way, you can't hear it over my typing and certainly not if you were using the speakers at all. [..]
[..] It's a bit tricky to compare keyboards between the X200 and the two island keyboards but I definitely preferred the Librem 13 to the X240. When it came to the X200 and the Librem 13 I think it's more of a tie. I like the extra key travel of the X200 but the Librem 13 keyboard actually felt a bit crisper, especially when typing heavily with more force. [..]
[..] Honestly the biggest issue for me personally is the touchpad mouse. I'm just a trackpoint person, I can't help it. That said, at my day job I have a buckling spring keyboard with a trackpoint in the middle of it, but since my home setup uses a classic Model M I've sort of been trained to not reach for it and reach for the physical mouse instead (and for the most part I just stick to the keyboard and keyboard bindings anyway). If Purism can fix the issue with palm presses generating mouse events while typing (which the multi-touch driver is supposed to solve), I think the mouse will be fine. [..]
[..] The final hardware feature I want to cover is the hardware kill switches. This was a much-requested feature by the backers of the original Librem 15 and the Librem 13 has them as well. Unlike software-based kill switches or keyboard combos, these switches literally cut the power to the wireless and bluetooth in one case, and the webcam and microphone in the other. I honestly don't know of anyone else who offers a webcam/microphone kill switch like this. I tested the webcam kill switch myself and not only did the video output from Cheese go black, dmesg reported that the USB device was completely gone:
[ 626.880277] usb 2-5: USB disconnect, device number 3
and when I flipped the switch back on, the device reappeared: [..]
I would immediately order a Librem-15 if it had (as an option) a keyboard with a trackpoint with physical buttons and without the separate number block on the right, i.e. a centred keyboard.
The problem of malware being remotely added to devices like routers and hard drive firmware can be stopped utterly by having a hard switch (or jumper) that disables the "write to flash" signal.
And the ME (Management Engine [1]) rears its ugly head. Even Google Chromebooks with a "write protect screw" do not actually wire the write protect screw to the hardware "disable writes" signal on the flash.
And it's because the ME is continuously writing stuff to its region of the flash and the ME cannot be disabled. Such a security fail!
Assuming these guys succeed the ME ceases to become a problem and the SPI chip can finally be write protected.
There are rumors of "back doors" that would let an attacker bypass the "disable writes" signal, but that can be countered by using a large number of manufacturers when sourcing your flash chips. Hint: SPI flash chips can be had from many places.
While it is still possible that some of the chips will have a back door, either the back door will be too hard to create a viable attack for, or users can verify the contents of their flash. (SPI flash chips are too simple to run their own cloaking algorithm.)
Users can take defensive measures if a widespread attack is detected. Defensive measures might include finding out which manufacturer produces vulnerable chips. By avoiding a flash chip "monoculture" it would apply the collective power of the internet to preventing a flash back door, thus making the write protect line an effective security measure.
Yes, I miss jumpers and write-protect. Used to use them everywhere. Seems like nobody does these days and I bet most advertising it are software implementations.
The frustrating thing about the situation with the NSA and other state actors is that any security product actually seems like it makes one more of a target.
The laptop that security conscious people buy is a more logical target than the laptop the random consumer buys.
Buying a better rated consumer laptop for cash in person, loading your favorite secure OS and locking it down as well as possible seems like a better path than buying anything label "secure" with your credit card attached to your identifying information.
I really like this design decision to put in hardware switches. Not only are there security risks: SW switches are less reliable. How many times has something played really loud and the volume buttons lagged for rest of you? Or you have to screw with power button to shut a certain laptop down?
I want hard buttons for power, audio, radio, and keys I type with. Not "smart" hard buttons either: simple, stupid, old approach to buttons or switches that just worked.
I'm unsure on how that would perform practically with audible soundwaves or if any other research has been done in that area. It would however be hard to mitigate, if possible at all.
It would be cool if there was a fail safe switch that nuked the hard drive with microwaves or something crazy like that when it was pressed. That would be one laptop I'd buy.
If you're going to go that route, you want an encrypted hard drive whose keys can be destroyed at a moment's notice. I believe that's off-the-shelf tech now, but I'm not sure where to point you at it.
Many security conscious companies routinely collect cellphones and other devices during meetings etc. NSA aside things get compromised by regular malware all the time.
I've had a small thought in the past to setup a 'luxury' service to retrofit something similar on smartphones. You would still be screwed during an actual call, since the mic would have to be on.. but a kill switch would still provide a fair amount of damage control in the event of a compromise.
If you go the extra mile and implement a 'read-only' connection to software you could remove most of the hassle for users.
Imagine moving the switch to the on position also answering an incoming call if the phone is ringing. Then when you hang up the software can send a signal to move the physical switch to the off position (but make it physically impossible to move it to the on-position from software).
Complete with a tiny LED to alert the user the switch is on.
This company states that privacy is very important to them. It's also to me.
But now I'm wondering, what's the purpose of the killswitch besides having no wifi-connection for a certain period of time?
I mean, when you switch back to enable wifi again, everything you did on your computer during 'airgap-time' is still there, waiting to be compromised by corps/govs? Isn't it?
Please correct me if I'm wrong. I'm really curious to this concept.
* Heightened risk of compromise in particular physical locations?
* Use in conjunction with something like TAILS so it's harder for someone who breaks into your computer to achieve persistence?
* Decreased risk of compromises that involve multiple machines attacking each other?
* Attackers may be wary of storing huge amounts of data persistently because the associated changes in storage media could be detected by forensic spot-checks?
(The third one probably requires that the forensic examination can get access to everywhere that the data could be stashed ... like nonvolatile memory inside onboard devices, not just the hard drive and main RAM contents.)
Wi-Fi can, and will, send data behind your back even if you're not connected to any network. Some of it is a part of normal protocol operation (and can be used to track you). Malware on your system could initiate connection without you knowing. And then a malicious actor targeting you personally may spoof a network you often connect to (e.g. local coffee shop) and exploit the default autoconnect to known networks behaviour. Hardware switches protect you from all the above.
You could be booting off a USB running something like Privatix during the time you have wifi killed - so that system would be air gapped whenever it is running. But if you trust Privatix you don't really need a HW switch.
That's great! I would definitely buy a Purism laptop - however I need additionally a trackpoint a great keyboard and an excellent matte screen.
The trackpoint should be with three physical buttons and would be great if it comes without a trackpad - but at least an option to disable the trackpad should be there.
The keyboard should NOT have any separate number block like most of 15" laptops have today.
Would be great if there would be as well an option to order the keyboard without any labels on the keys.
The trackpoint and keyboard requirements could be options upon purchase. I understand that I am part of a minority. The thing is, I feel helpless without a trackpoint. Mouse and trackpads are no options. And Lenovo makes me desperate.
Just to add (instead of editing above): I think a lot of IBM employees would as well buy Purism laptops if they had a trackpoints. There are thousands of people that are used to ThinkPads and now IBM announced to purchase from Apple [1].
[+] [-] cnvogel|10 years ago|reply
And while the webcam/microphone switches will prevent the particular devices from working, I'm not so sure about the WiFi card and Bluetooth. The microphone surely is dead by cutting the single signal line and the webcam by cutting its power.
But there's no guarantee that the W_DISABLE# pins are honored with every firmware of every possible wifi module that could be inserted into that slot. What if W_DISABLE#, on the card, is only a gpio that is checked by the WiFi chip's firmware? It would have been safer to also cut the power there, too. Or at least to verify that W_DISABLE# cuts off power to the RF PAs (transmitter power amplifier) of WiFi and Bluetooth in a way that can't be circumvented.
[+] [-] leoedin|10 years ago|reply
It probably costs a lot more than $250,000 to develop a laptop from scratch, so I wouldn't blame them for taking a higher level systems approach and buying in a pre-existing motherboard design. However, doing that inevitably gives up control of the design (which puts into doubt their claims of being completely open). If that's the approach they've taken, they're not particularly open about it.
[+] [-] throwaway7767|10 years ago|reply
[+] [-] slasaus|10 years ago|reply
[+] [-] jrockway|10 years ago|reply
The reality is that the chip/firmware/driver combination is tested by turning the power on once and then making it pass a few benchmarks that reviewers like. Doing something new and exciting may or may not work.
Certainly, some drivers are way better than others (ath9k is pretty good), but I imagine they tested the power up/power down method, noted that the kernel panics 1 time in 10, and decided nobody would buy their product if they implemented it that way.
[+] [-] terminado|10 years ago|reply
So, yeah, why all the solder and "chip" modifications?
[+] [-] huhtenberg|10 years ago|reply
[+] [-] toothbrush|10 years ago|reply
EDIT: They use i5 and i7 processors, which IIRC use black-box Intel microcode... Also, i wonder if they support Libreboot? My apologies if it turns out i cannot read. Otherwise they look quite nice. I'm excited to see more "alternatives" in the "free as in liberty" laptop space.
EDIT 2: Some more information here: https://www.crowdsupply.com/purism/librem-13
EDIT 3: At least they're up-front about what's Free and what's not: https://puri.sm/posts/purism-software-freedom-deconstructed/
[+] [-] slasaus|10 years ago|reply
that's what I thought as well.
About the microcode, this won't be fixed. But see the weekly updates on their blog[1] that states progress they make with the coreboot developers. Hopefully they can free the number one problem with intel chips[2] which is the Management Engine firmware.
[1] https://puri.sm/posts/weekly-update-on-librem-production-201...
[2] http://www.coreboot.org/Binary_situation
[+] [-] throwaway7767|10 years ago|reply
They are going to use coreboot, which is free but includes some binary blobs from Intel. I don't think you can boot any modern x86 without a binary blob from the CPU manufacturer, unfortunately.
I also don't think it's possible to get any modern machine up without some device firmware blobs. The best-case is that all the blobs are provided onboard so the OS doesn't need to provide them, but they're still there and we have to trust them.
Purism seems to me an incremental improvement and I might buy one, but I really hope for a truly free machine someday.
[+] [-] beeboop|10 years ago|reply
I am more excited in the continued development of the Novena laptop (https://www.crowdsupply.com/sutajio-kosagi/novena) but it's a shame there aren't any suitable modern processors to use in it.
[+] [-] slasaus|10 years ago|reply
Though I think these hardware kill switches should not be optional. A product that praises itself for privacy and security should have this as a base feature instead of asking $89,- separately for it.
[+] [-] Karunamon|10 years ago|reply
I really wonder who the target market for this is.
[+] [-] jwr|10 years ago|reply
The physical dual-position sliding switch has a lot of advantages, and yet it has almost completely disappeared from the electronics/computing world. I'd like to see it back.
[+] [-] WormyMcSquirmy|10 years ago|reply
[+] [-] swalsh|10 years ago|reply
[+] [-] Silhouette|10 years ago|reply
Personally, I would consider having hardware switches to disable external sensors and wireless communications channels in a laptop to be a significant factor in a purchasing decision. Other things being equal, I would opt for such features, and I would be willing to pay a bit extra to have them.
Unfortunately, it appears that other things are not equal. Unless I'm missing something, these systems seem to be relatively expensive for the rest of their spec.
More significantly, there is only so much you can do with hardware alone. For now, we also have the usual problem with installing an entirely free/open source software base, which is that much of the software that is useful for getting real work done is not from the FOSS world and the closest FOSS equivalents are not competitive if they exist at all. Being on-line is essential for a lot of activities, but as soon as you're on-line there is still a problem if you don't trust at least the OS and networking software as well as the hardware, and in a Windows 10 world that surely won't be true for many who would be interested in this kind of hardware in the first place.
Still, this seems like a step in a healthy direction, and for that alone I wish them success.
[+] [-] mtgx|10 years ago|reply
That's why I'm hoping their next Skylake generation will come with an option for a 6820HQ or 6920HQ CPU [2] (4 cores/8 threads/8MB L3 cache), as well as options for 16 and 32GB of DDR4 RAM (but I assume they'll have that covered) and at least a relatively fast NVMe 256GB SSD drive just so I can run Qubes at maximum performance. Fingerprint authentication (along with software support for two-factor auth at login) would be nice as well.
I do think they need to drive their prices down in the future, though ($2,000 for a "private laptop"). Privacy and security shouldn't be just for the rich. Their laptops feel like they are at least 50% more expensive than what they should be. I imagine this will get better with scale. Their laptops also don't have to be "Macbook Pro quality". I think some compromises there in thinness and build quality can be reasonable, if it means dropping the price by $300 or so.
[1] https://www.qubes-os.org/
[2] https://en.wikipedia.org/wiki/Skylake_(microarchitecture)
[+] [-] pbhjpbhj|10 years ago|reply
To me these are better called "hard power switches".
[+] [-] AdmiralAsshat|10 years ago|reply
http://www.linuxjournal.com/content/purism-librem-13-review
http://www.linuxjournal.com/content/purism-librem-15-review
[+] [-] reirob|10 years ago|reply
[..]The Librem 13 has a 13.3" 1920x1080 Matte IPS screen that I thought looked great. It is nice and bright and to my eyes looks better than the 1920x1080 IPS screen on my X240. [..]
[..] I'm used to the relatively weak speakers that tend to come with Thinkpads so I was pleasantly surprised at the volume from the Librem 13 speakers. Speaking of sound, I've gotten some questions about how quiet the laptop is. The laptop does have a fan and features vent holes along the bottom. It's kicked on while I've typed with it on my lap and while you can hear it a bit in a quiet room, to my ears it's pretty quiet. Let's put it this way, you can't hear it over my typing and certainly not if you were using the speakers at all. [..]
[..] It's a bit tricky to compare keyboards between the X200 and the two island keyboards but I definitely preferred the Librem 13 to the X240. When it came to the X200 and the Librem 13 I think it's more of a tie. I like the extra key travel of the X200 but the Librem 13 keyboard actually felt a bit crisper, especially when typing heavily with more force. [..]
[..] Honestly the biggest issue for me personally is the touchpad mouse. I'm just a trackpoint person, I can't help it. That said, at my day job I have a buckling spring keyboard with a trackpoint in the middle of it, but since my home setup uses a classic Model M I've sort of been trained to not reach for it and reach for the physical mouse instead (and for the most part I just stick to the keyboard and keyboard bindings anyway). If Purism can fix the issue with palm presses generating mouse events while typing (which the multi-touch driver is supposed to solve), I think the mouse will be fine. [..]
[..] The final hardware feature I want to cover is the hardware kill switches. This was a much-requested feature by the backers of the original Librem 15 and the Librem 13 has them as well. Unlike software-based kill switches or keyboard combos, these switches literally cut the power to the wireless and bluetooth in one case, and the webcam and microphone in the other. I honestly don't know of anyone else who offers a webcam/microphone kill switch like this. I tested the webcam kill switch myself and not only did the video output from Cheese go black, dmesg reported that the USB device was completely gone:
[ 626.880277] usb 2-5: USB disconnect, device number 3
and when I flipped the switch back on, the device reappeared: [..]
I would immediately order a Librem-15 if it had (as an option) a keyboard with a trackpoint with physical buttons and without the separate number block on the right, i.e. a centred keyboard.
[+] [-] eloy|10 years ago|reply
That was shocking to read, actually. I assumed that Purism wasn't the only company doing this.
[+] [-] CuttlefishXXX|10 years ago|reply
I actually had one on my last laptop, namely a piece of black insulation tape which I had placed over the lens.
[+] [-] WalterBright|10 years ago|reply
[+] [-] sounds|10 years ago|reply
And the ME (Management Engine [1]) rears its ugly head. Even Google Chromebooks with a "write protect screw" do not actually wire the write protect screw to the hardware "disable writes" signal on the flash.
And it's because the ME is continuously writing stuff to its region of the flash and the ME cannot be disabled. Such a security fail!
Assuming these guys succeed the ME ceases to become a problem and the SPI chip can finally be write protected.
There are rumors of "back doors" that would let an attacker bypass the "disable writes" signal, but that can be countered by using a large number of manufacturers when sourcing your flash chips. Hint: SPI flash chips can be had from many places.
While it is still possible that some of the chips will have a back door, either the back door will be too hard to create a viable attack for, or users can verify the contents of their flash. (SPI flash chips are too simple to run their own cloaking algorithm.)
Users can take defensive measures if a widespread attack is detected. Defensive measures might include finding out which manufacturer produces vulnerable chips. By avoiding a flash chip "monoculture" it would apply the collective power of the internet to preventing a flash back door, thus making the write protect line an effective security measure.
[1] http://libreboot.org/faq/#intelme
[+] [-] mrob|10 years ago|reply
See http://spritesmods.com/?art=hddhack&page=6
[+] [-] nickpsecurity|10 years ago|reply
[+] [-] joe_the_user|10 years ago|reply
The laptop that security conscious people buy is a more logical target than the laptop the random consumer buys.
Buying a better rated consumer laptop for cash in person, loading your favorite secure OS and locking it down as well as possible seems like a better path than buying anything label "secure" with your credit card attached to your identifying information.
[+] [-] nickpsecurity|10 years ago|reply
I want hard buttons for power, audio, radio, and keys I type with. Not "smart" hard buttons either: simple, stupid, old approach to buttons or switches that just worked.
[+] [-] happywolf|10 years ago|reply
[+] [-] mvdwoord|10 years ago|reply
I'm unsure on how that would perform practically with audible soundwaves or if any other research has been done in that area. It would however be hard to mitigate, if possible at all.
[+] [-] Uptrenda|10 years ago|reply
[+] [-] jerf|10 years ago|reply
[+] [-] beeboop|10 years ago|reply
[+] [-] rasz_pl|10 years ago|reply
[+] [-] m4yhem|10 years ago|reply
Many security conscious companies routinely collect cellphones and other devices during meetings etc. NSA aside things get compromised by regular malware all the time.
I've had a small thought in the past to setup a 'luxury' service to retrofit something similar on smartphones. You would still be screwed during an actual call, since the mic would have to be on.. but a kill switch would still provide a fair amount of damage control in the event of a compromise.
If you go the extra mile and implement a 'read-only' connection to software you could remove most of the hassle for users.
Imagine moving the switch to the on position also answering an incoming call if the phone is ringing. Then when you hang up the software can send a signal to move the physical switch to the off position (but make it physically impossible to move it to the on-position from software).
Complete with a tiny LED to alert the user the switch is on.
[+] [-] rambambam|10 years ago|reply
But now I'm wondering, what's the purpose of the killswitch besides having no wifi-connection for a certain period of time?
I mean, when you switch back to enable wifi again, everything you did on your computer during 'airgap-time' is still there, waiting to be compromised by corps/govs? Isn't it?
Please correct me if I'm wrong. I'm really curious to this concept.
P.S. I really dig the design of their laptops.
edit: Changed markup and added P.S.
[+] [-] schoen|10 years ago|reply
* Heightened risk of compromise in particular physical locations?
* Use in conjunction with something like TAILS so it's harder for someone who breaks into your computer to achieve persistence?
* Decreased risk of compromises that involve multiple machines attacking each other?
* Attackers may be wary of storing huge amounts of data persistently because the associated changes in storage media could be detected by forensic spot-checks?
(The third one probably requires that the forensic examination can get access to everywhere that the data could be stashed ... like nonvolatile memory inside onboard devices, not just the hard drive and main RAM contents.)
[+] [-] TeMPOraL|10 years ago|reply
[+] [-] jeremyjh|10 years ago|reply
[+] [-] reirob|10 years ago|reply
The trackpoint should be with three physical buttons and would be great if it comes without a trackpad - but at least an option to disable the trackpad should be there.
The keyboard should NOT have any separate number block like most of 15" laptops have today. Would be great if there would be as well an option to order the keyboard without any labels on the keys.
The trackpoint and keyboard requirements could be options upon purchase. I understand that I am part of a minority. The thing is, I feel helpless without a trackpoint. Mouse and trackpads are no options. And Lenovo makes me desperate.
[+] [-] reirob|10 years ago|reply
[1]: http://9to5mac.com/2015/05/28/apple-ibm-macs-pc/
[+] [-] tlarkworthy|10 years ago|reply
[+] [-] tlarkworthy|10 years ago|reply