Hacker Newsnew | past | comments | ask | show | jobs | submit | pabs3's commentslogin

A service can never provide digital sovereignty, by definition.

Which x86 devices ship with a free UEFI/ACPI? Or even allow users to replace the preinstalled UEFI/ACPI with a free one?

> Which x86 devices ship with a free UEFI/ACPI?

https://doc.coreboot.org/distributions.html seems to say Purism, Star Labs, and System76

(Edit: actually weirdly enough Librem seems to be using a different coreboot payload instead of edk2, but the other 2 stand)

> Or even allow users to replace the preinstalled UEFI/ACPI with a free one?

So many Chromebooks: https://docs.mrchromebox.tech/docs/supported-devices.html


I've a bunch of devices running coreboot with a Tianocore payload, but they're largely either very weird and now unavailable or I haven't upstreamed them so it's not super helpful, but it's absolutely not impossible and you can certainly buy Librebooted devices

Telemetry should be a choice at startup, not on by default or off by default.

Would be nice if it could clean-room replace proprietary software too. Would require automating the procedure this person did:

https://reorchestrate.com/posts/your-binary-is-no-longer-saf... https://reorchestrate.com/posts/your-binary-is-no-longer-saf...


I do like this idea, more difficult to do without access to the original source code, and I think that this would be more "reverse engineering" rather than cleanrooming, as you don't have the same concerns about copyright violation if you're working from a binary.




Running it on a dumpsterd PC with a 2013 Intel CPU. Works fine.

According to Conservancy; Tivo didn't do "Tivoization", the GPLv3 doesn't prevent what Tivo actually did, and both GPLv2/GPLv3 prevent "Tivoization".

https://sfconservancy.org/blog/2021/mar/25/install-gplv2/ https://sfconservancy.org/blog/2021/jul/23/tivoization-and-t... https://events19.linuxfoundation.org/wp-content/uploads/2017...


... and usually deployed in a user-hostile manner.

Any evidence of this? Computer security was a complete disaster before hardware roots of trust became standard.

Both things can be true.

The knee-jerk hysterical reaction to any talk of hardware roots of trust on Hacker News is getting tiresome and I expect better given the reputation of the site. It actually reminds me of old slashdot.

The software running on such devices is usually proprietary and never installed by the user. That is user-hostile.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: