• cley_faye@lemmy.world
    link
    fedilink
    arrow-up
    16
    ·
    11 months ago

    Your open source browser can run a spoof of an “official” browser

    Not if the server requires the digital signature of a challenge to be produced by a key whose certificate is signed by a “trusted” third party, said third party only providing that key at runtime, if your browser can also provide the same kind of authorization from the OS, itself being only able to produce it if it can safely determine that it’s running on completely locked-down hardware AND having online-activated DRM tells him he can provide such key; the hardware itself requiring constant online connexion to ensure it’s “authorized”, and including yet another layer of keys in hardware.

    There’s been progress toward this kind of things. At every step, people warning about the risks are seen as lunatics. SecureBoot preventing booting a custom kernel? No problem, microsoft will sign your keys. TPM not delivering keys to non-trusted kernels? No problem, just don’t use it (and don’t get the keys, obviously). UEFI requiring digital signature to be flashed? It’s for your safety, but we won’t give you the keys or it would defeat the purpose. Embedded CPU inside your CPU running opaque code on every operation you do? Trust me bro, there’s no problem here.

    Sure, opensource (or even just open at this point) alternative will most likely remain available as a niche, but once all major services that people want requires such a chain of control, the vast majority of people will gladly flock to locked-down system. Heck, it’s already happening. Nowadays I can’t even log into my bank website without a trusted iOS or Android device. The “free, open” alternative will be rare, expensive, and only work for people that cares. Which is not too much sadly.