Rich Freeman on 17 Oct 2014 10:28:12 -0700 |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
Re: [PLUG] Offline apps for Chromebook |
On Thu, Oct 16, 2014 at 2:32 PM, Joe Rosato <rosatoj@gmail.com> wrote: > Also - there is crouton but I think that is more for geeks like me. Allows > you to install linux next to chrome os. ;-) > FYI - thanks for that. I have at times installed Ubuntu/etc along the side on my Chromebook but this seems like a much cleaner solution than re-partitioning/etc. Granted, doing it with a chroot does entail more RAM use since you end up with 2 X11 servers, display managers, etc running (and chrome will always be running in the one - not a particularly lightweight application). The Cruton docs make a big deal about developer mode disabling encryption/etc, but as far as I can tell that shouldn't be the case. Developer mode does disable secure boot, but I would think that user profile directories will still be encrypted in flash using the TPM for decryption protected by the device key and the user password. That should mean that even root cannot access a user's profile unless that user is logged in (and thus the profile is mounted). Of course, developer mode on ChromeOS does allow root to do things like install keyloggers and all that stuff, so it is obviously less secure than production mode ChromeOS. I imagine that it is still a fair bit more secure than a typical Linux distro especially if the physical device has only a single owner who takes the time to re-enable OS verification on boot and set a root password. Anybody with a Chromebook should feel free to play around with side-installs of other OSes (whether in chroots or otherwise). Your ChromeOS settings/files/etc should be backed up to the cloud in general, and if you mess things up at most you should just have to hit the recovery switch and insert a recovery USB drive to restore your OS to factory condition. The only way to brick a Chromebook is to enable writes to the otherwise read-only firmware (usually involves taking the thing apart and flipping an internal switch - and I'm not sure if all Chromebooks even have one), and mess it up - most people hacking Chromebooks generally don't mess with that. Normally the read-only portion of the firmware is capable of restoring the writable firmware and OS from a signed recovery image on USB. Honestly, it would be nice if Linux Distros enabled more of the features found on ChromeOS. Some good primers can be found at: http://www.chromium.org/chromium-os/chromiumos-design-docs/security-overview http://www.chromium.org/developers/design-documents/tpm-usage I think they actually find a good balance between ensuring that the Chromebook remains a general-purpose computing device where the owner remains in charge, and having a secure mode where it is almost impossible to tamper with the OS. The only thing I don't like about their design is that it allows for remote attestation - ideally it should allow the true device owner to forge remote attestation responses if they have appropriate credentials (such as the initial TPM password obtainable after factory resetting the device). That ensures that remote attestation serves the device owner, and not other parties, and it still allows for use cases like verification of employer-provided hardware (but not BYOD devices - which should not be verifiable since they aren't owned by the employer). -- Rich ___________________________________________________________________________ Philadelphia Linux Users Group -- http://www.phillylinux.org Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce General Discussion -- http://lists.phillylinux.org/mailman/listinfo/plug