Cory Doctorow Profile picture
Jan 30 82 tweets 17 min read
In @Bruces' @Locusmag review of my novel Walkaway, he describes the book as "advancing and demolishing potential political arguments that have never been made by anybody but [me]."

locusmag.com/2017/06/bruce-…

1/ A giant LAN party (Assembly Helsinki 2011) in which every sc
If you'd like an unrolled version of this thread to read or share, here's a link to it on pluralistic.net, my surveillance-free, ad-free, tracker-free blog:

pluralistic.net/2022/01/30/rin…

2/
That is a fair cop. I spend a lot of time worrying about esoteric risks that no one else seems to care about.

3/
For example: for twenty years now, I have been worrying about the shifting political, technical and social frameworks that govern our fundamental relationships to the computers that are now woven into every aspect of our civil, personal, work and family lives.

4/
Specifically, I'm worried that as computers proliferate, so too do the harms in which computers are implicated, from cyberattacks to fraud to abuse to blackmail to harassment to theft.

6/
That's partly because when a computer is in your door-lock, burglaries will increasingly become cybercrimes. But it's also partly because of something fundamental to the nature of computers: their infinite configurability.

7/
At its very foundational level, the modern computer is "general purpose." Every computer we know how to make can run every program we know how to write.

8/
That's why computers are so powerful and so salient: computers can do so many things, and any advance in computing power and efficiency ripples out to all the things computers can do.

9/
Investment in improvements to computers used in cars result in advances to computers used in fitness trackers, thermostats and CCTV cameras.

10/
That general-purposeness is a double-edged sword. On the one hand, it means that we don't have to invent a whole new kind of computers to power an appliance like a printer. On the other hand, it means that our printers can all run malware:



11/
On balance, and without minimizing their harms and risks, I am in favor general-purpose computers. Partly, that's because I think general-purpose computers' contributions to our lives and civilization outweigh the problems of general-purposeness.

12/
But, even more importantly, I think that the collateral damage of trying to remove general-purposeness is infinitely worse than even the worst problems created by general-purposeness.

memex.craphound.com/2012/01/10/loc…

13/
Here's why: we don't actually know how to make a computer that can run some programs, but not all of them.

14/
Rather than invent that impossible computer, people who try to solve the problem of general-purposeness try to approximate it by creating computers that are *capable* of running "bad" programs, but *refuse to do so*.

15/
There is a vast, important difference between a computer that's not capable of running unauthorized programs and a computer that *refuses* to run unauthorized programs.

16/
The former is an appliance, while the latter is a device that treats its owner and users as potential attackers whose orders can be countermanded by the device's manufacturer.

17/
I can't stress how important this distinction is. Designing a computer that treats the person who depends on it as an attacker is a *terrible, nightmarish idea*.

18/
It is literally the principle that animates the first dystopian science fiction tale: Mary Shelley's "Frankenstein; or, The Modern Prometheus," a 200 year old novel whose lessons we have still not learned.

19/
20 years ago, some Microsoft security engineers had a clever idea for how computers might be redesigned to prevent malicious software from attacking users. They called it "Palladium" (or, more formally, the "Next Generation Secure Computing Base").

pluralistic.net/2020/12/05/tru…

20/
They proposed soldering a second, sealed, cryptographic co-processor onto your computer's motherboard. This co-processor would be tamper resistant, designed to self-destruct if you attempted to decap it or remove it from the board.

21/
Literally! - it would contain brittle, acid-filled compartments that would burst and ruin the chip if you tried.

This cryptographic co-processor could perform two important functions.

22/
First, it could serve as a source of ground truth for your computer. The chip could observe all parts of the boot-up process and create cryptographic signatures denoting which code was loaded at each stage.

23/
When your computer was finished booting, the OS could ask the co-processor, "Was I tampered with? Did I boot the original manufacturer's OS, or did someone tamper with me in ways that might blind me to my own processes?"

24/
That is, your computer could determine if it was a head in a jar (or in the Matrix) or whether it could trust its senses. It could know whether it was running on "bare metal" or inside a virtual machine that could feed it false telemetry to compromise its user's security.

25/
Second, the secure co-processor could answer challenges from remote parties that wanted to know whether they could trust your machine before they communicated with it.

26/
Say I want to send you a Signal message: I trust that Signal is encrypted end-to-end and that means that no one between me and you can read the message in transit. But how can I know if your computer is safe?

27/
Maybe it's got malware running on it that will steal the messages after your computer decrypts them and send them to our mutual enemy.

With Palladium, I can send your computer's secure co-processor a random number (called a "nonce," which inevitably confuses UK people).

28/
Then I can ask it to combine the nonce with the manifest of the boot and OS it observed, sign it with its secret, private key, and send it back.

29/
That signed manifest lets me do something I could never do before: discover what kind of computer someone else is running, without actually inspecting that computer. Provided I trust the secure co-processor, I can know which OS my counterparty is using.

30/
Provided I trust that OS, I can know whether my counterparty's computer will leak the secrets I've sent to them over Signal.

Cool, right?

I think it *is* cool.

31/
This process - called "remote attestation" - is a new theoretical capability for computers, one that is especially useful in an environment in which we communicate over great distances with computers we have no control over.

32/
The fact that those computers can run every program - including malicious ones - makes remote attestation even more salient, as it might let us detect and exclude computers that have been compromised from our networked activities.

33/
But it's also incredibly risky. Fundamentally, this security model involves creating computers that override their users and owners, running software that the person using the computer cannot disable or even detect.

34/
This security model addresses the fact that users - or processes masquerading as users - can install bad software on our computers by creating a sealed, low-level controller that can interdict user-level processes.

35/
But how can we trust those sealed, low-level controllers? What if manufacturers - like, say, Microsoft, a convicted criminal monopolist - decides to use its low-level controllers to block free and open OSes that compete with it?

36/
What if a government secretly (or openly) orders a company to block privacy tools so that it can spy on its population?

37/
What if the designers of the secure co-processor make a mistake that allows criminals to hijack our devices and run code on them that, *by design*, we cannot detect, inspect, or terminate?

38/
That is: to make our computers secure, we install a cop-chip that determines what programs we can run and stop. To keep bad guys from bypassing the cop-chip, we design our computer so it can't see what the cop-chip is doing. So what happens if the cop-chip is turned on us?

39/
This literally keeps me up at night. It is such an obviously terrible idea to built a world of computers we put our bodies inside of, that we put inside our bodies, that we trust our whole civilization to, that are all designed to run programs we can't see or halt.

40/
Fast forward from Palladium to today. All the risks of secure computing have come to pass. I could give examples from lots of companies' products, but I'm going to stick with Apple.

41/
Why Apple? Because they have a huge, talented security engineering division and they have effectively infinite capital. If *any* company could do secure computing right, it would be Apple.

42/
But:

* *Eight years'* worth of Apple's secure enclaves are unpatchably compromised:

checkm8.info

* Apple uses its security measure to block its competitors' app stores:

cydia.saurik.com

43/
* Apple caved to Chinese state pressure and blocked all working privacy tools from its App Store to enable mass surveillance of Chinese users:

reuters.com/article/us-chi…

44/
Now, Apple's secure computing infrastructure isn't nearly as comprehensive as the Palladium proposal. As far as I can tell, no one is doing the "full Palladium."

45/
But Apple's version of Palladium shares the same foundational problems as Palladium itself, and has some new ones as well.

Apple doesn't use separate secure co-processors to do remote-attestation and check for unauthorized software.

46/
Instead, it uses a "secure enclave," which is basically a subsection of the main chip that is subject to heightened testing and design constraints in order to make it as secure as possible.

47/
Like a co-processor, the secure enclave is designed to be both inscrutable (users can't inspect or terminate its processes) and immutable (users can't change it).

48/
This means that, by design, any time someone finds and exploits a defect in a secure enclave, it can operate in ways that users can't detect or stop.

49/
It also means that there is no way to remediate a defect in a secure enclave: if you can patch a secure enclave to fix a bug, then an adversary could patch it to *introduce* an exploitable bug.

50/
Like Palladium, secure enclaves are break-once, break-everywhere, break-forever. They have forever-day bugs. But unlike Palladium, secure enclaves are not physically separate from the main processor, making them easier to attack and exploit.

51/
But remember, the most significant attacks on Apple had Apple's help. Apple uses its security to keep users from switching App Stores, and also runs an App Store that, until recently, allowed stalkerware apps and blocked anti-stalkerware apps:

digit.fyi/stalkerware-ap…

52/
Likewise, when the Chinese government decided to ban its residents from using VPNs to hide their activity from state surveillance, Apple was a willing collaborator, and Apple - not the Chinese state - blocked those privacy tools.

53/
The insider threat of this security model is all around us. The fact that one computer *can't* force another computer to disclose its configuration as a condition of further communication helps criminals. But it also helps anyone on the wrong end of a power-imbalance.

53/
Your boss can put a camera in your office, but they can't watch you through the camera in your laptop. Your school district can monitor your in-class conversations, but they can't monitor your networked conversations.

54/
Your government can subpoena your communications, but they can't recover the chats you've deleted. Your abusive spouse can make you show them your saved messages, but they can't follow you around when they're at work and find out that you're talking to a shelter.

55/
If your boss or school district or the cops or the government or spouse or parents can detect your operating system at a distance - if they can give it orders that you can't countermand, dictating which software you can run - then your computer becomes *their* computer.

56/
Everything your computer knows about you - or can know about you - they can know, too. They can do it at scale. They can store deep histories and go back to them later when you arouse their suspicion.

57/
They can automatically parse through the stream and algorthimically ascribe guilt to you and punish you.

In short, if you're worried about "#DisciplinaryTechnology," you should be really worried about this secure computing model.

58/
Now, it's been 20 years since the first Palladium paper and no one is doing a full Palladium. The incomplete Palladium approximations in the field have only rarely been leveraged for insider attacks.

59/
I think that's a matter of political economy, not technology. The technologists who appreciate the power of remote attestation and secure bootloaders are also largely skeptical of them because they can't be patched and because they can be abused.

60/
As a body, these technologists stand up for the right of computer users to understand and alter how their computers work. They defend the right of researchers to disclose defects in computers - even widely used computers and reject the idea of "security through obscurity."

61/
Generally, I think of this as "my side" in this fight. This is the side that rejects disciplinary technology used for trivial or bad purposes:

* Preventing cheating during remote test-taking:
pluralistic.net/2020/10/17/pro…

62/
* Spying on work-from-home employees:
pluralistic.net/2020/07/01/bos…

* Spying on students and their families:
en.wikipedia.org/wiki/Robbins_v…

* Repossessing Teslas:
tiremeetsroad.com/2021/03/18/tes…

* Disabling cars after a missed payment:
edition.cnn.com/2009/LIVING/wa…

63/
* Forcing you to buy official printer ink:
eff.org/deeplinks/2020…

* Spying on people who lease laptops:
ftc.gov/news-events/pr…

* Bricking gear the manufacturer doesn't want to support anymore:
memex.craphound.com/2016/04/05/goo…

64/
But not everyone on my side is as foursquare against this stuff as I am. Many of them make exceptions, for example, for corporate compliance systems (to prevent insiders from stealing customer data), or to keep unsophisticated users from installing malicious apps.

65/
I'm a lot more dogmatic about this stuff. Partly, that's because even the "good" uses are ripe for abuse. The same tool that stops an employee from stealing user data also stops whistleblowers from gathering evidence of corporate crimes.

66/
App stores that permit stalkerware and block anti-stalkerware aren't doing anything for their users' security.

But let's say that we could fix all that stuff (I don't think we can).

67/
I would still worry about this security model because of what it would do the culture of security research and information security overall.

For three decades, security researchers and corporations have sparred over disclosure of defects in digital products and services.

68/
The companies argue that they should have a veto over who gets to warn their customers when their products are found defective. They insist that they need this veto, because it lets them fix the bugs before they're disclosed.

69/
That may sound reasonable, but in practice, companies routinely fail to fix those bugs *or* warn their users that they are at risk. Companies are terminally compromised when it comes to bad news about their own products.

70/
Thankfully, we largely operate in an environment where anyone can disclose true facts about defective products. That's due to a combination of the First Amendment and groups like @EFF, but also the generally unified rejection of security through obscurity by technologists.

71/
That's where the real worry comes in. Recall that, by design, secure enclaves and cryptographic co-processors can't be updated - they are break-once, break-forever systems. Any bug in one of these is a forever-day vulnerability.

72/
And there are an increasing number of applications that tech-minded people favor that are heading towards this security model. It's not just compliance and protecting naive users. These days, there's a lot of action in the anti-cheat realm.

73/
Gamers and technologists have a lot of overlap, and cheats *ruin* games. What's more, the e-sports world has turned these cheats from annoyances into multi-million-dollar spoilers.

74/
I worry that we're going to see more and more people switching from the "computers should obey their users" camp to the "computers should control their owners" side.

75/
The cheat/anti-cheat war is getting closer and closer to that model. The rise of "kernel hacks" and "kernel defenses" have moved the fight into "Ring Zero" - the lowest (accessible) level of the computer's operating system.

wired.com/story/kernel-a…

76/
The natural next step? "Ring Minus One" - secure processing modules.

The worst part of all this is that none of it will accomplish its goals. It doesn't matter how much you lock down a computer, you will never prevent cheats like this one:

arstechnica.com/gaming/2021/07…

77/
I've been pointing this out to "computer controls the user" advocates for twenty years, and they always have the same answer: "It may not stop bad guys, but it keeps honest users honest."

78/
As @EdFelten wrote 19 years ago, "Keeping honest users honest is like keeping tall users tall."

freedom-to-tinker.com/2003/03/06/kee…

79/
Esoteric as all this stuff might be, it really worries me. Switching to a default assumption that our computers should control us, not the other way around, is a terrifying, dystopian nightmare.

80/
It's a live issue: Apple is telling Congress this *right now*:

cnbc.com/2022/01/18/app…

81/

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Cory Doctorow

Cory Doctorow Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @doctorow

Feb 1
Today's Twitter threads (a Twitter thread).

Inside: The Mafia hires good accountants; and more!

Archived at: pluralistic.net/2022/02/01/col…

#Pluralistic 1/ Image
The Mafia hires good accountants: Honest cheaters enable the mob.

2/ Image
#15yrsago Schoolkids “passing notes” by commenting on random blog-posts web.archive.org/web/2007020304…

#15yrsago 9/11 Commission Report hobbled by #DRM web.archive.org/web/2007020401… 3/ Image
Read 20 tweets
Feb 1
Leaks like the #PandoraPapers and collapses like #Carillion have shone a spotlight on the role of "the professions" in enabling international finance crimes, which include both money-laundering and the underlying (ghastly, violent) crimes that produce the funds for laundering. 1/ A club-wielding thug whose ...
If you'd like an unrolled version of this thread to read or share, here's a link to it on pluralistic.net, my surveillance-free, ad-free, tracker-free blog:

pluralistic.net/2022/02/01/col… 2/
For example, the Sacklers knowingly, deliberately created the opioid epidemic that killed more than 800,000 Americans, and used America's most respectable, highest-price bankruptcy lawyers to let them keep billions and deny justice to their victims.

pluralistic.net/2021/05/23/a-b… 3/
Read 20 tweets
Feb 1
Be My Valentine, Charlie Brown (1975) gameraboy2.tumblr.com/post/674966882…
Be My Valentine, Charlie Brown (1975) gameraboy2.tumblr.com/post/674966882…
Be My Valentine, Charlie Brown (1975) gameraboy2.tumblr.com/post/674966882…
Read 4 tweets
Jan 31
Today's Twitter threads (a Twitter thread).

Inside: Grappling with Big Wrestling; Podcasting about the copyleft trolls who tried to shake me down; and more!

Archived at: pluralistic.net/2022/01/31/hee…

#Pluralistic 1/ Image: Nenad Stojkovic (mod...
Grappling with Big Wrestling: Vince McMahon has a monopoly on violence.

2/  Image: Ed Webster https://...
Podcasting about the copyleft trolls who tried to shake me down: Pixsy and the depravity of speculative invoicing.

3/ Image: Nenad Stojkovic (mod...
Read 18 tweets
Jan 31
This week on my podcast, I read my @Medium column "A Bug in Early Creative Commons Licenses Has Enabled a New Breed of Superpredator," describing my bizarre run-in with a group of #CopyleftTrolls who tried to shake me down for $600.

doctorow.medium.com/a-bug-in-early… 1/ A hand on a multibutton mou...
If you'd like an unrolled version of this thread to read or share, here's a link to it on pluralistic.net, my surveillance-free, ad-free, tracker-free blog:

pluralistic.net/2022/01/31/hee… 2/
What's a #copyleft troll, you ask? 3/
Read 32 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(