Editing Talk:Maemo security

Warning: You are not logged in. Your IP address will be recorded in this page's edit history.
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 27: Line 27:
[[User:lbt|lbt]] What is Nokias position? Peter made a statement at the talk - can someone transcribe it and/or get Nokia to clarify.
[[User:lbt|lbt]] What is Nokias position? Peter made a statement at the talk - can someone transcribe it and/or get Nokia to clarify.
-
 
-
[[User:keesj|keesj]] During the Q&A of the second Maemo 6 security presentation at the the Maemo 2009 summit it was made clear GPLv3 component will not be accepted in the platform.
 
===What exactly is available to the end user?===
===What exactly is available to the end user?===
Line 35: Line 33:
* PIM data encryption ?
* PIM data encryption ?
* encrypted/signed communications (phone, sms/mms, mails, IM) ?
* encrypted/signed communications (phone, sms/mms, mails, IM) ?
-
 
-
--[[User:elena_r|elena_r]] 12:45, 28 October 2009 (UTC): If I understood the question correctly, it is about the benefits for the user that the Security FW provides.
 
-
 
-
Here are the examples of the benefits:
 
-
 
-
1. Security FW allows us to introduce new business models (based on the DRM), which hopefully will bring much more good applications to the end users.
 
-
2. Security FW provides the tools for the applications, which can be used to make the user's data to be more secure (again, the example with the protected storage, which can be used to encrypt all your messages and store them on the device in the encrypted form (if application wishes to do so)).
 
-
 
-
One can find out more use cases, but in short, the Security FW is an enabler for many good future application and use cases(probably some we even can't see now). So, it is up to developer's to use this advantage and develop cool applications in new domains, where the security of an application (or its data) is important.
 
=== How does closed mode affect on-device debugging? ===
=== How does closed mode affect on-device debugging? ===
Line 54: Line 43:
E.g.: I start in DRM-mode, install DRM-free applications from Extras, take 3 pictures, add some contacts. Then I switch to DRM-free mode: Will I be able to run the applications installed in DRM-free mode, view and edit my contacts and view and edit my own pictures? (And the other way round, of course, starting from DRM-free mode and switching to DRM afterwards.)
E.g.: I start in DRM-mode, install DRM-free applications from Extras, take 3 pictures, add some contacts. Then I switch to DRM-free mode: Will I be able to run the applications installed in DRM-free mode, view and edit my contacts and view and edit my own pictures? (And the other way round, of course, starting from DRM-free mode and switching to DRM afterwards.)
-
 
-
 
-
--[[User:elena_r|elena_r]] 10:19, 28 October 2009 (UTC):I will answer based on the example given above. After switching to the DRM-free mode, you should be able to use your application, access your pictures, contacts and so on (of course, if you didn't reflash the whole rootfs (in this case, you will probably need to reinstall the application), or if the application doesn't use the protected storage to encrypt, for example,  the images(in this case, it won't be able to decrypt it)). The other way round is a bit more specific. As I answered above, in order to return to the "normal mode" (or "DRM mode"), one need to return all components to their initial state. The simplest way to do it is to reflash the whole Nokia signed SW image (kernel, rootfs, and so on) back, but in this case, the data on the rootfs is lost (and your application needs to be installed again). I can't say now that will be the final way to move back to the "normal mode", because this is still work in progress.
 
-
 
-
[[User:keesj|keesj]] Not having contact data protected sounds like a failure to provide useful  security features so I expect the contact data to be protected. If this is the case it should not be possible to view/edit the contact in open mode.
 
===What is open mode good for at all?===
===What is open mode good for at all?===
Provided you don't consume digitally restricted media and don't purchase applications that in any way rely on DRM: You don't need DRM-mode then, but on the other hand why would you want DRM-free mode? What is it you cannot do in DRM-mode in such a scenario?  Use case?
Provided you don't consume digitally restricted media and don't purchase applications that in any way rely on DRM: You don't need DRM-mode then, but on the other hand why would you want DRM-free mode? What is it you cannot do in DRM-mode in such a scenario?  Use case?
-
 
-
--[[User:elena_r|elena_r]] 10:03, 28 October 2009 (UTC): The typical use case for the "open mode" is that a user wants to define its own security policy, install its own system components, change/extend the kernel and so on. The change of the policy allows you to define the trust on each SW source, for example, you can add your own source of SW and allow it to grant an access to all protected resources (of course, the DRM would be disabled, when you switch to the "open mode"). Low-level platform development is also possible only in the "open mode".
 
===What is ARM's TrustZone?===
===What is ARM's TrustZone?===
Line 91: Line 73:
r-r: Could it serve other security purpose then in Open mode?
r-r: Could it serve other security purpose then in Open mode?
[[User:corsac|Corsac]]: afaik, TPM is x86 only. But that's the purpose of ARM TrustZone. And we already asked the question, see above.
[[User:corsac|Corsac]]: afaik, TPM is x86 only. But that's the purpose of ARM TrustZone. And we already asked the question, see above.
-
 
-
--[[User:elena_r|elena_r]] 12:47, 28 October 2009 (UTC): As was presented, we have a TrEE (based on the OMAP3), which we are using now.
 
=== How are important upgrades handled? ===
=== How are important upgrades handled? ===
Line 98: Line 78:
r-r: Do they require to sign a whole new system image?
r-r: Do they require to sign a whole new system image?
-
 
-
--[[User:elena_r|elena_r]] 09:52, 28 October 2009 (UTC):Security FW doesn't put any limitations on how the system SW updates are delivered. It is up to the people, who is doing this, to decide in which way they would like to provide the upgrades.
 
== Maintaining the discussion ==
== Maintaining the discussion ==
Line 136: Line 114:
===Customisation (Eg Enterprise, Partner)===
===Customisation (Eg Enterprise, Partner)===
* ??
* ??
-
 
-
== protected mode hacking ==
 
-
 
-
If signed kernel will had vulnerability, can it (legally) used by user for escalating his own rights on his own cellphone in protected mode? Will nokia charge such user (or user, publishing a way to hack official kernel) with legal pursuit? #![[Special:Contributions/80.249.182.252|80.249.182.252]] 15:23, 11 February 2010 (UTC)
 
-
 
-
== SIM locking rationale ==
 
-
 
-
Keeping the user away from DRMed multimedia content in open mode is a defensible proposition. But what is the rationale for prohibiting open mode on SIM-locked phones? You must know that the vast majority of users will have SIM-locked phones. Advertising Maemo as an open platform when most users will not be able to take advantage of that openness is disingenuous.
 
-
 
-
To be honest, I have the distinct impression that the SIM-locking restriction is designed to appease carriers who are accustomed to installing sub-optimal firmware that optimizes carrier revenue not user experience. With that restriction in place, there is little reason for users who buy SIM-locked phones to choose Maemo over any other platform.
 

Learn more about Contributing to the wiki.


Please note that all contributions to maemo.org wiki may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see maemo.org wiki:Copyrights for details). Do not submit copyrighted work without permission!


Cancel | Editing help (opens in new window)