Hardware Attestation as Monopoly Enabler
744 points
6 hours ago
| 37 comments
| grapheneos.social
| HN
miohtama
4 hours ago
[-]
The EU Digital (identity) Wallet EUDI requires hardware attestation by Google or Apple, effectively tying all the digital EU identities to American duopoly. Talk about digital sovereignity. Apparently protecting the children > sovereignity.

https://gitlab.opencode.de/bmi/eudi-wallet/wallet-developmen...

reply
retired
4 hours ago
[-]
So with a single flip of the switch, the president of the USA can shut down our EU Digital Identity Wallet.

Why was this decision ever made?

reply
dathinab
2 hours ago
[-]
> Why was this decision ever made?

because it wasn't made

the decision which was made was having a digital ID wallet, that this needs hardware attestation (or something comparable) is somewhat of a direct consequence of existing laws/regulations regarding making IDs forgery safe

it also is a phone only application

the huge huge majority of phones runs Googled Android/iOS, so you support them

if there where a relevant 3rd party competition it would (most likely) supported it, too

going back to the "the president .. shut down .." argument: The US can shut down >90% of all smart phones used in the EU. I don't think the US being able to shut down something which in the end is fundamentally just a minor convenience feature is making much of a difference here.

But I also think that whole identity wallet (the regulations behind it) is approaching things from the wrong direction, carrying a credit card sized ID with you isn't really a problem or very inconvenient. So instead of having the whole attestation nonsense it would be more practical to simply not have attestation and in turn allow the digital ID only for usage where the damage it can cause is quite limited. Especially given that device attestation systems have a long history of being circumvented...

As a side note this whole app is distinct from the "use you ID with through your phone/NFC with applications" thing many EU countries have, through that solutions also tend to have attestation issues in most cases. But again most relevant use-case of it can be done just fine, without the security level attestation tries to provide, if approached pragmatically.

reply
reactordev
1 hour ago
[-]
Have you seen our President? Minor conveniences are what trigger him into launching full blown DOJ investigations, wars, and economic disaster. If he realizes he can just "turn off" the EU, oh, he will threaten that on Truth Social tonight in a rant about how they should make a deal or else.
reply
like_any_other
1 hour ago
[-]
An open threat like that would be the best case scenario, as it would (hopefully) cause a reaction in EU countries trying to get rid of this yoke. Instead usually it happens through backroom dealings, or just the services being a nuisance to competitors while being helpful to friendly companies, and thus the target country is drained of its resources and economic independence, slow enough to not provoke retaliation.

With the exception of the current US administration, hostile countries and corporations try to appear non-hostile when possible.

reply
izacus
45 minutes ago
[-]
Can you show an example of defeating hardware attestation? It would be useful for many 3rd party ROM users.
reply
nine_k
36 minutes ago
[-]
Gaming consoles typically have hardware attestation (as in verified software on verified hardware, sealed), and it has been broken many times in the past.
reply
dathinab
31 minutes ago
[-]
most times it's done by (reliably re-)rooting a attested phone in a way which bypasses detection of the attestation system

so not really useful for 3rd party ROMs

reply
tardedmeme
2 hours ago
[-]
They can also shut down all European payment cards.
reply
OhMeadhbh
1 hour ago
[-]
Maybe not all of them, but certainly a few large, popular ones. You bring up a good point though, it seems surprising that Wero/PEPSI don't have more momentum. Maybe Europeans hate their continental neighbors more than American financial conglomerates.
reply
lxgr
1 hour ago
[-]
The EU might have slept on Russia having to urgently come up with its own payment systems after the 2014 Crimea annexation (which in turn enabled it to deal with the complete Visa/Mastercard exit in 2022) because political goals were aligned and transatlanticism was still alive and well. But they've been wide awake ever since ICC employees have been personally sanctioned by the US as well [1].

Big ships turn slowly, but I give it at most two more years until at least one pan-European retail payment scheme (cards, QR, or maybe the "digital Euro") has been regulated into existence.

[1] https://www.theguardian.com/law/2026/feb/18/international-cr...

reply
PunchyHamster
1 hour ago
[-]
Just big systems having even bigger inertia
reply
Gravityloss
4 hours ago
[-]
Is some party or coalition putting forth candidates that stand against this?
reply
kmeisthax
1 hour ago
[-]
We (America) made the decision for them. The EU's member states were either:

1. Explicitly designed as client states for the US

2. Explicitly designed as client states for the Soviet Union, with alliances switching over as the Soviet Union fell apart

3. Great Britain, a country whose electorate would probably only reconsider rejoining if the EU agreed to explicitly become British client states, because the only thing Britain hates more than France is those dastardly American upstarts[0].

The reason why this persists despite an openly hostile American president is the fact that the EU has no real alternative. The EU has a shitton of internal political distrust between member states, and the US was offering a lubricating alternative: "Just trust us." Politically distributed alternatives require balancing coalitions that are far more fragile.

[0] The history of European anti-Americanism is extremely fascinating, because it's effectively a Reactionary meme - as in, "wanting to restore the Ancien Regime" Reactionary, not "funny way to say Nazi Party member" Reactionary. And yet it's jumped across so many incompatible political ideologies that the average European probably had no clue why they hate America until Donald Trump gave them a good reason to.

reply
varispeed
4 hours ago
[-]
Corruption. A taboo topic people prefer to downvote and pretend it does not exist.

But even bigger problem is that institutions designed to prevent this from happening are not doing their job.

Thousands security service and civil servants take their wages and look the other way.

reply
armada651
3 hours ago
[-]
I think it's actively harmful to your own cause when you suggest corruption without any evidence. Just because politicians don't take action on an issue you think is important doesn't mean they're corrupt. It's more likely that the issue you think is important is simply not important to most voters.

Suggesting politicians are corrupt without any evidence will make that worse. If people think their politicians are corrupt they will further disengage with the political process, which will ensure there's even less pressure on politicians to take action on niche issues like this.

reply
EmbarrassedHelp
2 hours ago
[-]
The EU Commission was caught breaking the law in order to lobby for Chat Control: https://noyb.eu/en/gdpr-complaint-against-x-twitter-over-ill...

The EU Commission also gave a foreign tech company called Thorn (they pretend to be a charity), special access to government officials: https://netzpolitik.org/2022/dude-wheres-my-privacy-how-a-ho...

I think both of those cases would be examples of lobbying and corruption.

reply
armada651
2 hours ago
[-]
Neither examples are evidence of corruption. That doesn't mean they're not problematic, but there's no evidence here of a politician receiving a kickback for any of these actions.
reply
hedora
1 hour ago
[-]
https://fortune.com/europe/2023/09/26/thorn-ashton-kutcher-y...

$600K+ went to kickbacks, er… “lobbying”, and thorn was hit with some pretty nasty scandals involving sex crimes.

reply
Asraelite
1 hour ago
[-]
Corruption does not necessarily mean a politician receiving a kickback. It can be a lot more indirect and subversive.
reply
surgical_fire
2 hours ago
[-]
The thing is that "The EU commission" is an entity composed os politicians, appointed by member states.

It's little coincidence that national governments want Chat Control (laundering that through EU), and the EU parliament is the entity that shots it down (coincidentally the entity that is most beholden to the public).

It would be nice to learn which comissioners are lobbying for it.

reply
nolroz
1 hour ago
[-]
I think a hearty fuck off is warranted for responses like this. What the shit do you base the converse off? Pretend there's no corruption and there won't be any??
reply
armada651
1 hour ago
[-]
Of course not, if there's evidence of corruption then those involved should be rooted out and prosecuted to the full extent of the law.

What I'm saying is that if there's no evidence of corruption, then simply assuming corruption will harm your cause because it will make it seem like political activism is futile in the face of supposedly hidden corruption.

reply
microtonal
3 hours ago
[-]
The EU does regulate Google and Apple through the DSA and the DMA. I don't think most EU politicians are corrupted by these companies.

I think it is far more likely that it is a lack of knowledge and incompetence. I am pretty sure that the majority of Parliament members, Council members and maybe even Commission members do not even know that there are viable alternatives outside Google (certified) Android and iOS. So they try to regulate their app stores, etc. instead.

I hope that with digital sovereignty becoming more important, there will be more interer in alternative mobile operating systems.

reply
grufkork
2 hours ago
[-]
A lot of the suggestions do actually sound pretty good at a quick glance, but have far-reaching consequences that are not instantly obvious if you don't know your tech/security/privacy or otherwise value a specific topic highly. The average HN reader is likely more concerned about privacy and less so about crime and safety than the average guy on the street, and politicians need to handle and balance a lot many more interests than only that of privacy advocates.

"Securely signed/verified devices for accessing your bank" or "increased surveillance and tracking of criminals" sound like splendid ideas and direct solutions to immediate problems. Now, how to actually implement them and how it will affect society in the long run might seem less important when you've got increasing crime rates, a slowing economy, displeased voters or whatever looming. In short, some dilemmas have very clear answers when you (willingly or through unawareness) only concern yourself with a subset of the effects of a decision, and this goes both for politicians and special interest groups. That being said, I'm very pro-privacy and it's the job of policymakers to know the details of what they're deciding on. Reality is however usually very complex and nuanced with several things being true because they all contribute a part to what's going on.

e: what am I doing, speaking like I actually know how things work? Nothing is absolute and nuance is important, but sometimes it is also very useful to simplify and generalise to get things done. If no one had any conviction, not much would ever happen. But moderation in all things.

reply
palata
2 hours ago
[-]
> I think it is far more likely that it is a lack of knowledge and incompetence.

I agree with that. Reading HN comments, where people are supposed to be generally tech-savvy, I see a ton of "lack of knowledge and incompetence" (not in a negative way, just "uninformed"). Why should politicians know better than the average tech-savvy person?

But politicians get yelled at by everybody, saying everything and its contrary, while the tech-savvy people can comfortably take a condescending tone explain why "being so stupid is impossible so it has to be corruption".

reply
II2II
2 hours ago
[-]
It's more of a case of the boy who cried wolf than it is of denial.

Too many people see something they don't like, imply a nefarious motivation without evidence, then expect everyone to agree that it is corruption.

If there is corruption, show the evidence. Otherwise, be honest and state that you don't agree with something. If you want to persuade people, back up your claims with verifiable evidence without falling back to nebulous claims of corruption.

reply
fidotron
2 hours ago
[-]
> Thousands security service and civil servants take their wages and look the other way.

Diplomatic status tax free too.

reply
kyleee
4 hours ago
[-]
No doubt there is corruption; but it’s also momentum. There aren’t stable and good alternatives for so many reasons so the duopoly has momentum
reply
varispeed
4 hours ago
[-]
I understand, but this is a national security matter. The focus should be on developing matching domestic capability.
reply
cyanydeez
3 hours ago
[-]
you know that domestic capability means putting taxes to take things into a public good and corporations and paranoia are the bigger problem to overcome than anything technical. Any endevour will be cast as some kind of fascist takeover of governance.
reply
bornfreddy
3 hours ago
[-]
Well no, there is no need to develop domestic capability. Put laws in effect which disable foreign capabilities and which reward domestic ones, and they will be developed. No endeavor from government needed (which is a good thing, since governments are not really great at doing such stuff).
reply
cyanydeez
2 hours ago
[-]
Well yes, just because you think it's a public good worth competing over doesn't mean there's anyone who thinks it's a viable business model.
reply
epistasis
2 hours ago
[-]
Who is doing this corruption?

If it's Apple or Google let us know in the US because we have laws to go after them for acting corruptly in other countries.

Vaguely asserting corruption without specifics or even naming the perpetrators isn't "taboo", it's just poor form and silly. Letting such vague accusations float without evidence, motive, or even people to blame, leads to nothing good, and only vague distrust, which itself enables corruption. It leads to people believing there's no way to know the truth, therefore helplessness, and results in fascism like in Russia.

Lazy cynicism is itself a form of corruption of one's own mind.

reply
onlytue
4 hours ago
[-]
I hate to beat a dead horse and have people downvote me but: the EU has always been corrupted. The knowledge and effects are not evenly distributed until it hits each niche group. Then they find out the hard way that they were useful idiots. It’s ok to be wrong/admit. Let’s just move past the infighting and see those in power for the evil that they are.
reply
epistasis
3 hours ago
[-]
The question isn't if there's corruption, the question is who is behind the corruption.

Condescendingly and incorrectly assuming that others think that corruption is impossible is kinda rude and also dodges attempts at correcting the corruption.

reply
AnthonyMouse
2 hours ago
[-]
Not only that, "corruption" is pretty squishy. Let's apply Hanlon's Razor for once.

Google et al go to the government and say they've got this attestation thing that can something something security. No one is taking a bribe but also no one they're hearing from is telling them that doing this is going to cement the incumbents. "Security" is good, right? So it makes it into the law.

That doesn't meet most formal definitions of corruption. It's more like incompetence than malice. But the outcome is indistinguishable from corruption. The bad thing gets into the law.

The difference is, if the politicians are taking bribes and you get mad at them, they fob you off because they're more interested in lining their pockets. But if the politicians are just misinformed bureaucrats and you get mad at them, they might actually fix it.

And attributing everything to "corruption" discourages people from doing the latter even in cases where it would be effective.

reply
danielmarkbruce
1 hour ago
[-]
Anything involving trust cements the incumbents or at least creates a force to an outcome of few players. It is what it is.

It's not a given that it's incompetence.

reply
AnthonyMouse
41 minutes ago
[-]
> Anything involving trust cements the incumbents or at least creates a force to an outcome of few players.

I don't think that's even true, unless you're using "trust" as a synonym for centralization.

Suppose you had actual competing app stores. Google doesn't control which ones you use; you can use Google Play or F-Droid or Amazon or all three at once and anyone can make a new one. You could get Android apps through Apple's store and vice versa. And then you choose who you trust; maybe you only trust F-Droid and Apple and you think Google and Amazon stink. Maybe you install 90% of your apps through F-Droid but are willing to install your bank app on GrapheneOS from Google Play because you trust your bank and you also trust Google enough to at least verify that the bank app is actually from your bank.

This is the thing that doesn't help the incumbents, right? The bank and the customer both trust Google to distribute the bank app but Google isn't allowed to prevent the user from trusting F-Droid for other apps as a condition for getting the bank app from Google Play. You can have trust without centralization.

reply
fragmede
2 hours ago
[-]
> Google et al go to the government and say

The money that goes into lobbying in order to have that say is, depending on who you ask, corruption. I, as a random citizen, don't get the same say that a multi billion dollar international corporation does.

reply
AnthonyMouse
1 hour ago
[-]
That seems like a pretty useless definition of corruption. It implies that retirees writing letters to Congress is "corruption" because working people don't have the same amount of free time to do that.

It's also kind of weird to propose it as an asymmetry. Google's parent company spends around $4M on lobbying in the US:

https://www.opensecrets.org/federal-lobbying/clients/summary...

That's around $0.01 per capita. Your per capita contribution for individuals to out-spend Google on lobbying is two cents.

reply
coliveira
22 minutes ago
[-]
The day a low income retiree can have meetings with politicians to lobby for their favorite policies is the day this comparison will be useful.
reply
AnthonyMouse
8 minutes ago
[-]
You don't think the AARP has meetings with politicians to lobby for things?
reply
rvz
4 hours ago
[-]
Exactly. I have said this for a very long time and the EU (and many other governments) are not our friends and they are just as corrupt. Remember ChatControl?

Anytime anyone criticises the EU here, you will get downvoted even after trying to warn the EU defenders that they are not our friends at all.

I was asking for evidence about the EU digital ID wallets about what the "disinformation" was around it 3 years ago [0] and not a single link of it was given.

At this point, being an EU defender and supporting the "open web" are incompatible since you will be using your EU digital identity wallet [1] with your phone to login to your bank and the internet will push age verification with it, locking you out if you don't sign up.

[0] https://news.ycombinator.com/item?id=36105002

[1] https://eudi.dev/latest/

reply
palata
3 hours ago
[-]
> Remember ChatControl?

That thing that got refused multiple times already?

Because not all politicians think like you does not mean they are corrupt. Seems like enough politicians have voted against ChatControl until now.

I always wonder what people who say stuff like "politicians discussed this topic I hate and refused it, but the mere fact that they discussed means that they must all be corrupt" understand about politics. You know that it is about people with different opinions (representing people with different opinions) discussing stuff, right?

reply
miohtama
3 hours ago
[-]
The Commission got it through on the last round, though, so eventually it passed.
reply
EmbarrassedHelp
2 hours ago
[-]
Chat Control hasn't passed yet. But the Chat Control lobbyists are still lobbying for it behind the scenes, and are currently pushing for all phone calls in the EU to be covered.

Source:

https://www.patrick-breyer.de/wp-content/uploads/2026/05/861...

https://digitalcourage.social/@echo_pbreyer

reply
izacus
43 minutes ago
[-]
So what should be done about it? EU Commission issue a decree that it should never be spoken or debated again in public? Never proposed? Any other tyrannical idea?

Do you have a list of other things that shouldn't be brought in front of the elected parliament?

reply
palata
2 hours ago
[-]
So ChatControl was accepted and is in the process of being implemented is what you say?
reply
surgical_fire
2 hours ago
[-]
reply
dijit
3 hours ago
[-]
(ignorant) people proposing things does not mean corruption: the fact that these things are voted down and never pass is proof that the system works, not evidence of corruption.

Corruption would be if it passed despite it being unpopular, because some corporate or rich peoples interests desired it.

reply
surgical_fire
2 hours ago
[-]
> Exactly. I have said this for a very long time and the EU (and many other governments) are not our friends and they are just as corrupt. Remember ChatControl?

The EU parliament shot down ChatControl.

In fact, without the EU, most likely many member states would have ChatControl in some shape. National governments are the ones all in on this crap.

reply
graemep
3 hours ago
[-]
Governments are place a higher priority on controlling internal threats than external ones. In this case the EU wants to control its own people more than it wants to avoid deoendence on the US. It would like both,but the former is more important
reply
pjmlp
4 hours ago
[-]
I wrote to the EU contact about this, got a patronising reply about how good it is, app being open source and what not.

Clearly tailored to the regular normie without technical skills.

reply
noir_lord
4 hours ago
[-]
Probably because the reply was written by someone without technical skills.

I’ve written to politicians over the years about technical matters and it’s uniformly either a clearly form response or an inaccurate summation of the technical risks, if I’m been charitable because they don’t understand them either.

At a certain point it begins to feel pointless.

reply
palata
3 hours ago
[-]
> At a certain point it begins to feel pointless.

I think you're right that they are incompetent. The point is not to make them understand it, but rather to make them see that enough people care. The problem is that most people don't write, so the politicians don't see that they care. Same thing for companies. How many GrapheneOS users say "well when it stops working, I just move to another service, and if there is none, then I live without the service entirely". That way the companies never see that there is a need.

reply
__MatrixMan__
2 hours ago
[-]
> How many GrapheneOS users say "well when it stops working, I just move to another service, and if there is none, then I live without the service entirely".

Being prepared to be this voice is one of the reasons I'm a Graphene OS user. Another is that it helps me avoid accidentally writing code that depends on google play services. When you've got an agent doing most of the driving, it's easy to not realize that your app is broken without google, unless you're testing it on a degoogle'd device.

reply
palata
3 hours ago
[-]
Where did you write? Is there a link or something you could share? I am not in the EU so I assume I can't, but would be nice to share a link so that other EU citizen could write.

If enough people write, they may start finding it relevant.

reply
pjmlp
3 hours ago
[-]
reply
andy99
4 hours ago
[-]
Came here with roughly the same thought. Given the stated importance to many of sovereignty and not being dependent on the US, why isn’t there more opposition? I assume it’s just ignorance?
reply
vanviegen
3 hours ago
[-]
Digital sovereignty has only become a serious political topic in the EU over the past year. It may take a decade to see the effects of this in laws and policies.
reply
pphysch
1 hour ago
[-]
It's more than that, before recently the very idea of "digital sovereignty" was framed as a dangerous Russian conspiracy by the West's top info warriors.

Example: https://www.lrb.co.uk/blog/2021/july/information-sovereignty

reply
elric
4 hours ago
[-]
There is some opposition, but none of it is making a dent. It's depressing. I can't decide if it's incompetence, corruption, or malice.
reply
palata
3 hours ago
[-]
Before thinking about corruption or malice, I like to try to assume good faith. And I see a couple things:

1. Most people don't write.

2. The people who write are not always competent.

3. The people who write often have an agenda, too.

What's the consequence of that? Imagine what the politicians receive: tons of messages of people complaining, most of which are factually wrong. What to do then? How to know who is right? It's genuinely hard.

EDIT: please write here: https://european-union.europa.eu/contact-eu/write-us_en

reply
greggoB
4 hours ago
[-]
Probably some combination of all three.
reply
izacus
2 hours ago
[-]
Since you're so much more informed - which integrity guaranteeing product would you use for mobile devices that European citizens use? Covering more than 90% of population?
reply
bojan
3 hours ago
[-]
We have voted in the most right-wing Parliament and, by extension, Commission, in the EU's history.

It only makes sense they'll prioritize big-business interests over those of the common folk.

reply
dmoy
3 hours ago
[-]
Yea that's fair / makes sense from a democracy point of view (even if I might disagree personally).

It's a bit odd that Europe prioritizes American big-business interests I guess? Idk, as an American it does seem kinda like an odd choice.

reply
cherryteastain
3 hours ago
[-]
It's more useful to view the whole situation as EU politicians prioritizing to have their pockets filled with lobbyist money, rather than the EU as a political entity deciding this per se.
reply
palata
2 hours ago
[-]
It's not completely fair. The US also bullies them into doing those things, it's not only "pure corruption to fill their pockets".

How many European countries buy American weapons because they are scared of what would happen if they pissed off the US? And then they still get tariffs and threats of military invasion.

reply
Pfeil
3 hours ago
[-]
Does it really make sense? Right wing politicians are calling themselves patriots, why would they support foreign companies and give them so much power? Must be a dangerous mix of corruption and stupidity?
reply
matthewdgreen
2 hours ago
[-]
One of the major problems with on-device identifiers is that they must by tied tightly to devices, due to the risks of cloning. This is particularly true for privacy-preserving identifiers. That's why device attestation is so important, because you can't ensure that identity (keys) are locked to a device unless you can verify that the hardware prevents users from extracting keys. The worst part of this is that motivated criminals will certainly figure out how to extract those keys and use them for fraud; it's open-source and open computing that will be destroyed by this.
reply
subscribed
2 hours ago
[-]
Yeah, but they aren't.

Google certifies devices unpatched for the last 10 years, rooted, riddled with the malware, because the keys have leaked.

Google knows and still sells the lie.

But you should know better. Google is not selling the actual security, it's just protecting its business.

reply
matthewdgreen
2 hours ago
[-]
Google's business is advertising. Right now they don't care whether your phone is "authentic" or secure, because it doesn't cost them money. As AI-enabled bot fraud rises, they will care. Fighting this requires identifying human beings, and that requires trusted devices to be associated with human beings. We're in the foothills still, but look forward and up at where adtech is going.
reply
EmbarrassedHelp
2 hours ago
[-]
Don't hardware identifiers also mean that Google can blacklist your device from vast portions of the internet whenever they feel like it?
reply
lxgr
2 hours ago
[-]
Only if you need to have the entire application behavior (or at least some trusted confirmation) attested, right? Otherwise, an external USB dongle, tapping a contactless smartcard on a phone etc. could do just fine.
reply
matthewdgreen
2 hours ago
[-]
Sure, but then you need to receive an attestation from that external dongle, and/or pre-provision it with an identity (like a national ID smartcard.) It might work in places that distribute this hardware, but it's a crummy UX. I expect that the goal of these systems is to make ID verification a requirement for most routine device usage, sadly, and external dongles will crap that up from a UX perspective.

There is also the problem that most external hardware is less secure than things like Apple's SEP. (But on the other hand, probably more secure than the long tail of cheap Android phones, which use virtualization rather than real hardware.)

reply
lxgr
2 hours ago
[-]
> then you need to receive an attestation from that external dongle, and/or pre-provision it with an identity (like a national ID card.)

That's how it works in Germany: You tap your national ID card (as a citizen) or eID card (as a non-citizen) on any NFC-capable iPhone or Android device. I personally much prefer that solution over one that requires a specifically trusted device.

The big gap is trusted user confirmation, though: Users need to see what they sign by tapping their card, and then you're usually back to some form of attestation.

Practically, they also completely botched the rollout; literally everyone I know managed to somehow lock themselves out of their card at the first attempted use (assuming they've even bothered to set it up).

reply
matthewdgreen
2 hours ago
[-]
The adtechs want this so they can verify the "human" quality of each user. To do this, they don't want people tapping their government ID on their phones every single time they sign up for Reddit or receive an advertisement. Hence (some derivative of) the ID has to be stored on-device to make the browsing/usage experience seamless.
reply
lxgr
1 hour ago
[-]
Fair enough, I can see why not.

To me, it seems like just the right amount of friction, and user expectations can work in favor of privacy here: People will hopefully refuse to tap their ID on their phone for a service where they want to remain completely anonymous, even if the protocol technically might support anonymous assertions.

reply
userbinator
2 hours ago
[-]
You want a secure identity? ISO7816 exists and is completely independent of Big Tech. The question of who should be required to show ID is different (and I'd argue the answer is "no" in most online-only situations), but there's already a solution that's been trusted by the financial sector for decades.
reply
fidotron
2 hours ago
[-]
The EU problem here is they are simply reactive, and slow at it. By ceding the active part of commercialized innovation to the US (because paying the people that do such things what they're worth is simply incomprehensible) they allow them to dictate the terms of engagement. The utter dependence on WhatsApp being a shining example, as well as cloud services in general.

If anyone wants to assert control they have to be where the puck is going instead.

reply
jasonvorhe
3 hours ago
[-]
Protecting the children is their favorite reason for ramping up authoritarian measures.
reply
leptons
1 hour ago
[-]
If they really wanted to protect children, they wouldn't give them phones, tablets, or laptops until a certain age.

It's like handing a loaded gun to a kid, and saying "just don't take the safety off".

Of course kids are going to find ways around it. They are going to take the safety off.

reply
SchemaLoad
15 minutes ago
[-]
Australia started on this by banning kids from social media. Reddit kicked up a huge stink and sued the government over it. Also phone bans in school a few years prior.
reply
cyanydeez
3 hours ago
[-]
>To reduce platform dependencies, we also evaluate additional platform independent signal sources. In this context, we evaluate signals from runtime application self-protection (RASP) systems, for example. We also might revisit later whether there are comparable security mechanisms for other platforms.

They're basically saying they have no choice but will evaluate better options.

So the follow up question is: Are you going to push the EU & Governments to do the logical thing and start developing, with your tax dollars, the necessary software & hardware to make it into the public domain so they arn't reliant.

Mostly it seems like few people see the need for brining government into software, no matter how much software & hardware are becoming essential utilities.

reply
miohtama
3 hours ago
[-]
There is the alternative to not to pursue domestic spyware in the fist place. Especially because this is tied to the attempts to deanonymise Internet users.
reply
cyanydeez
2 hours ago
[-]
It's also an attempt to keep various malefactors such as America, Russia, Israel, China, etc out off the propaganda efforts driving a large amount of far right nationalists into violent uprising.
reply
miohtama
1 hour ago
[-]
But this scheme will give all the control to the US. They own the master key.
reply
einpoklum
2 hours ago
[-]
> Apparently protecting the children trumps sovereignity.

Capital remains sovereign in Europe.

reply
subscribed
2 hours ago
[-]
I think you misread the parent comment.

Being a highly skilled lawyer, UN official, can get you banned from all government EU services of the Drumpf doesn't like the fact you're investigating war crimes.

A part of that has already happened.

reply
p0w3n3d
2 hours ago
[-]
"protecting" the "children"
reply
coppsilgold
4 hours ago
[-]
Requiring authorized silicon (and software) isn't even the biggest problem here.

They do not use zero knowledge proof systems or blind signatures. So every time you use your device to attest you leave behind something (the attestation packet) that can be used to link the action to your device. They put on a show about how much they care about your privacy by introducing indirection into the process (static device 'ID' is used to acquire an ephemeral 'ID' from an intermediate server) but it's just a show because you don't know what those intermediary severs are doing: You should assume they log everything.

And this just the remote attestation vector, the DRM 'ID' vector is even worse (no meaningful indirection, every license server has access to your burned-in-silicon static identity). And the Google account vector is what it is.

Using blind signatures for remote attestation has actually been proposed, but no one notable is currently using it: <https://en.wikipedia.org/wiki/Direct_Anonymous_Attestation>

There are several possible reasons for this, the obvious one is that they want to be able to violate your privacy at will or are mandated to have the capability. The other is that because it's not possible to link an attestation to a particular device the only mitigation to abuse that is feasible is rate limiting which may not be good enough for them - an adversary could set up a farm where every device generates $/hour from providing remote attestations to 'malicious' actors.

reply
AnthonyMouse
2 hours ago
[-]
> The other is that because it's not possible to link an attestation to a particular device the only mitigation to abuse that is feasible is rate limiting

I still don't see how you can keep something anonymous and still rate limit it. If a service can tell that two requests came from the same party in order to count them then two services can tell that two requests came from the same party (by both pretending to be the same service) and therefore correlate them.

reply
coppsilgold
2 hours ago
[-]
The way it would work with blind signatures is that the server will know the device that comes to it to request a blinded signature and will be able to rate limit how often that device asks it.

But once you get the response you can unblind the signed signature and obtain the token (which is just the unblinded signature). This token can then be used once either because its blacklisted after use (and it expires before the next day starts for example).

The desired property of blind signatures is that given a token it's information theoretically impossible to determine which blinded signature it came from (because it could have come from any of them) even if the cryptographic primitive is broken by a mathematical breakthrough or a quantum computer. There is technically the danger that if the anonymity set is too small and all the other participants collude you can be singled out.

Correlating times is a threat vector that needs to be managed either by delaying actions (not tolerable by normal users) or by acquiring tokens automatically and storing them in expectation. Or something other I haven't thought of probably. There is also a networking aspect to this, you will need a decentralized relay server network that masks origin of requests.

reply
AnthonyMouse
1 hour ago
[-]
> But once you get the response you can unblind the signed signature and obtain the token (which is just the unblinded signature).

The premise of this is to keep the person issuing the tokens and the person accepting them from correlating you.

The issue is when you have more than one service accepting them. You go to use Facebook and WhatsApp but they're both Meta so you present the same unblinded signature to both services and now your Facebook and WhatsApp accounts are correlated against your will. And they have a network that does the same thing, so you go to use a third party service and they require you to submit your unblinded signature to Meta which allows them to correlate you everywhere.

reply
coppsilgold
1 hour ago
[-]
> you present the same unblinded signature to both services

You would never do this as it defeats the entire purpose of using blind signatures to begin with.

reply
AnthonyMouse
57 minutes ago
[-]
That's the point. You go to example.com and get the "sign in with Google" box as the only login option, but now you can't have separate uncorrelated Google accounts. Or if browsers do it automatically then every site does a background load or redirect through adtracker.nsa so you're presenting the same token on every service.

It's not the user who wants any of this to begin with. "You would never do that" except that it's now the only way to be let into the service.

reply
nullc
1 hour ago
[-]
Just to give an example to prime your intuition: define your "usage token" as H(private_key|service_domain_name|date|4-bit_counter). Make your scheme provably reveal the usage token when you authenticate. Now you can use the service 16 times a day on a particular domain and no more simply by blocking token reuse. And yet the service has no ability to link different tokens to each other or to a specific person because they don't have anyone elses private keys.

You can make variations on this for a wide spectrum of rate limiting behaviors.

But also I agree with xinayder's comment-- the anticompetative, anti-privacy, invasive surveillance is unacceptable. There is a lot of risks with ZKP's that we just make the poison a little less bitter with the end result being more harm to humanity.

I think ZKP systems are intellectually interesting and their lack of use helps make it more clear that the surveillance is really the point of these schemes, not security because most of the security (or more of it) could be achieved without most of the surveillance.

But allowing the apple google duoopoly to control who can read online is wrong even if they did it in a way that better preserved privacy.

And because I can't believe no one else in the thread has linked to it: https://www.gnu.org/philosophy/right-to-read.html

reply
AnthonyMouse
55 minutes ago
[-]
> define your "usage token" as H(private_key|service_domain_name|date|4-bit_counter)

But how are you preventing multiple services from using the same value for service_domain_name because they're cooperating to correlate your use?

reply
nullc
43 minutes ago
[-]
Because-- in this hypothetical-- your user agent restricts the usage to the name displayed on the screen and also because your agent won't send the same value twice either (it'll increment the counter or tell you that its run out of tokens).
reply
AnthonyMouse
9 minutes ago
[-]
Requiring the name to be displayed isn't going to do much for ordinary people. They mostly wouldn't look at it and even if they did, "continue as-is or no service for you" means they continue as-is.

Not sending the same value twice would prevent them from being correlated, but now what are you supposed to do when you run out? Running you out could even be the goal: You burn a token to get a cookie and now you can't clear your cookies or you'll be denied a new one since you're out of tokens.

reply
nullc
3 minutes ago
[-]
I'll be the first to admit that the technology can be abused-- that it's even ripe for abuse. That sort of problem can be avoided by allowing 'enough'-- and if the goal is to just prevent a site being flooded out 'enough' could be pretty high.

Of course, I think the effective purpose of google's attest feature is to invade everyone's privacy which we should assume is part of why they don't use privacy preserving techniques. Privacy preserving techniques could still be abused, however.

Maybe they're even worse for humanity because they make bad schemes more palatable. I think right now I lean towards no: the public in general will currently tolerate the most invasive forms of these systems, so our issue isn't that they're being successfully resisted and the resistance might be diminished by a scheme which is still bad but less bad.

reply
xinayder
2 hours ago
[-]
Can we stop normalizing being surveilled online and on our devices?

Saying something like "the problem is not hardware attestation, but that they don't use ZKP".

You are normalizing the new behavior. You shouldn't. It doesn't matter if they use ZKP or the latest, secure technology for hardware attestation. The issue is hardware attestation. It's the same with age ID. The issue is not that Age ID is prone to data leaks, the problem itself is called Age ID.

reply
userbinator
2 hours ago
[-]
Hell yes. I was going to post the same comment. I don't give a flying fuck how it's implemented. Remote attestation is inherently evil.

I remember the WEI apologists trying to do the same thing to derail the argument. The problem is the goal, not the details. Just say no: DO NOT WANT!

reply
lxgr
2 hours ago
[-]
Remote attestation is a technology, not a policy or a political effort, so it can't be inherently evil. You can disagree with all its known or proposed uses, but then I think it makes more sense to name these.
reply
xinayder
2 hours ago
[-]
DRM is a technology and is inherently evil. Web attestation is DRM for the web, and is inherently evil. Age ID is a technology and is inherently evil.

We have over 30 years of the world wide web and for these more than 3 decades this was never a problem. Suddenly, we "need" to create new technology that seem to be security features, but are essentially just being used for evil, thus being inherently bad.

It's not like these technologies were created for the greater good and misappropriated by bad actors. They were proposed by bad actors in the first place, they cannot not be inherently good.

reply
lxgr
1 hour ago
[-]
DRM is arguably a specific use of various generic technology ranging from whitebox cryptography to trusted computing.

I don't think remote attestation (or even more so its umbrella technology, trusted computing) is nearly as specifically targeted as DRM.

> We have over 30 years of the world wide web and for these more than 3 decades this was never a problem. Suddenly, we "need" to create new technology that seem to be security features, but are essentially just being used for evil, thus being inherently bad.

I agree that requiring remote attestation for generic web use is evil. It's way too heavy-handed an approach better reserved

I still don't think this somehow outright disqualifies the technology itself.

reply
userbinator
2 hours ago
[-]
Then explain why RA was invented? It is inherently against user freedom, just like "secure" boot and the rest of the corporate-authoritarian crap.

People have woken up to the truth as the pieces come together.

This article from 2022 is fun to look at and see how prescient it was: https://news.ycombinator.com/item?id=29859106

reply
nullc
1 hour ago
[-]
"It’s a poor atom blaster that won’t point both ways."
reply
zx8080
1 hour ago
[-]
The biggest problem is banking system. "Don't want - no bank for you". That's the problem.
reply
lxgr
2 hours ago
[-]
You're not necessarily being surveiled just because you're forced to authenticate yourself. It often is the case practically, but it's not inherent, and mixing the two up makes the discussion too imprecise in a technical forum.

Hardware attestation often also has problems of centralization, but that's something else as well.

By just labeling it as an abstract bad thing without seeing nuance, I'm afraid you won't be convincing those in power to pass or block these laws, or those convincing your fellow voters which efforts to support.

reply
zx8080
1 hour ago
[-]
> You're not necessarily being surveiled just because you're forced to authenticate yourself.

Oh hell you do! Google profit comes from ADS! It's for their profit to surveil and track and deanonymize TO SELL ADS.

reply
xinayder
2 hours ago
[-]
Those in power who need convincing are the same ones pushing for mass surveillance online.
reply
bigyabai
1 hour ago
[-]
> It often is the case practically, but it's not inherent

Oh my god. It's 2026, and we're still repeating the "I trust Apple/Google/Microsoft enough to resist the government" spiel.

Hardware attestation is a surveillance mechanism. If China was enforcing the same rule, you would immediately identify it as a state-driven deanonymization effort. But when the US does it, you backpedal and suggest that it could be implemented safely in a hypothetical alternate reality. Do you want to live in a dystopia?

reply
lxgr
1 hour ago
[-]
> Oh my god. It's 2026, and we're still repeating the "I trust Apple/Google/Microsoft enough to resist the government" spiel.

Who is?

> But when the US does it [...]

I don't live in the US, and while US is often setting global trends, in this case I don't think that's actually that likely, unless it somehow goes significantly better (i.e., the benefits actually vastly exceed the collateral damage to anonymity and resiliency via heterogeneity) than expected.

reply
coppsilgold
2 hours ago
[-]
There is a problem where it's becoming increasingly harder to determine which internet packets that are coming to your service are at the behest of a human in the course of normal activities or an automated program.

If all the internet was is static content, that wouldn't be much of a problem. But we live in world where packets coming to your service result in significant state changes to your database (such as user generated content).

I suspect that we are currently in the valley of do-something-about-it on the graph which is why you see all this angst from the big players. Would Google really care if automated programs were so good that they were approximating real humans to such an extent that absolutely no one can tell? I suspect they would not only be happy with such a state of affairs, they would join in.

reply
userbinator
2 hours ago
[-]
That's not a problem at all. It's an artificially created distraction, created to manufacture consent, by those pushing for this shit.
reply
Hoodedcrow
4 hours ago
[-]
Would like to read a writeup on this, I was certain it was going to be something like this from the app's announcement.

Also I recall a discussion on Graphene's forums that DRM ID is not only retained there, but stays the same across profiles.

reply
coppsilgold
4 hours ago
[-]
I simplified the process in my description. The DRM ID Android has is not what I was referring to.

I was referring to the static private key that is stored in the silicon. At any time an application can initiate a license request process using DRM APIs which will elicit an unchangeable HWID from your device. The only protection is that it will be encrypted for an authorized license server private key so collusion may be required (intel agencies almost certainly sourced 'authorized' private keys for themselves). Google or Apple also has the option to authorize keys for themselves. In 'theory' all such keys should be stored in "trusted execution environments" on license servers and not divulge client identities for whatever that's worth: <https://tee.fail>.

reply
willis936
3 hours ago
[-]
Are these the kinds of issues privacy pass intends to fix? If so, what carrot and/or stick will get it adopted?
reply
ChuckMcM
6 hours ago
[-]
This is a really good thread on why this technology is becoming a problem for "open" anything. The argument "we can create our own separate web" is fine until all of your services are behind the web that locks you into owning a Google approved or Apple approved mobile device.
reply
steelframe
4 hours ago
[-]
I like to ride my bicycle with my friends in rides organized by the (Pacific Northwest) Cascade Bicycle Club. They require that I solve a Google reCAPTCHA in order to register for a ride. Google is already completely locking me out from being able to do that. When I try to click on the squares to select whatever items it's asking, it indefinitely loops. When I try using the audio version, it completely blocks me from using it saying that there has been suspicious activity.

That means that I ride alone these days. I did not renew my membership this year.

The last time I experienced something like this was when Facebook starting being the only way to participate in certain events. Back when that happened, I simply counted myself as excluded and did other things with my time and money.

reply
jdiaz5513
7 minutes ago
[-]
I also had a similar issue with Cascade Bicycle Club - they chose to organize things via WhatsApp, and since I am (inexplicably) banned from opening a Meta account I was completely left out of the group and missed out on many rides/details that were only shared via WhatsApp.

When I tell people that this is even possible I get wide-eyed stares — as if they never contemplated that Meta could exercise their right to ban someone from the platform.

It's a huge problem and I have no idea how to fix it except talk about it and spread awareness. And I am not remotely interested in trying to work around the ban.

reply
andy99
4 hours ago
[-]
I hope you contacted them to explain why. People usually think I’m a nut when I do it, or are too stupid to understand and think it’s a tech support issue, but it’s worth at least trying to make it clear that you are choosing not to use/do/pay something because of their choice to use recaptcha
reply
ChuckMcM
3 hours ago
[-]
+1 to this. I had a long conversation with a local shop that went to only ordering online or through an enslaved ipad on a pedestal at the entrance. I explained to them that I wasn't going to use their app or web page online and the iPad at the door has people trying to figure it out so orders take longer, and the combination means I just won't eat there any more.
reply
Footprint0521
2 hours ago
[-]
Why not just 2captcha it and go on with your life?
reply
saltcured
4 hours ago
[-]
And it didn't even take attestation to cause this absurd situation where many businesses or social groups were only reachable behind Facebook or Whatsapp or whatever.

To me this is such a bizarre cyberpunk dystopia. Like if we could only send letters and packages to people subscribed to the same private postal service, or drive on roads that had cross-licensing with our brand of car.

reply
Someone
5 hours ago
[-]
IMO, it would be better if they removed the claim “It doesn't provide a useful security feature” because, even if it does, the collateral damage of making non-Google, non-Apple OSes second class citizens remains, and that is the main problem.
reply
AnthonyMouse
1 hour ago
[-]
> it would be better if they removed the claim “It doesn't provide a useful security feature” because, even if it does,

What evidence is there that it does?

Attestation purports to prove the code is running on an "approved" device. There are multiple reasons that has no real security value.

The first is that "approved" not only has no relationship to "secure", they're actually anti-correlated. As the article points out, GrapheneOS has better security than normal Android. Moreover, as a general rule the stock firmware that can pass attestation is more likely to be outdated and have security vulnerabilities than a custom ROM, and also as a general rule devices (like PCs) with more open hardware have the ability to be updated. A four year old attestation-passing Android phone may already be out of support and unable to be updated while still passing attestation; a 20+ year old PC can run the latest supported release of e.g. Debian.

The second is that "secure" and "runs code the service doesn't want" are likewise unrelated. Suppose there is an Android device which is still receiving updates. A local privilege escalation vulnerability comes out and that device will get the patch, but hasn't yet. So now any attacker with any of those devices can get root on it until they apply the patch. Which means they can get root after the main filesystem is unlocked, modify the filesystem so they continue to have root by changing something that isn't part of the attestation hash but still causes code or scripts to run as root later, and then update to the latest kernel and continue to have root on a device that passes attestation. The device is secure -- fully patched -- but it's the attacker's own device and they can run arbitrary privileged code on it. Requiring every device to be "secure" against the person who has ownership and permanent physical possession of it is a ridiculous thing to take as a security assumption.

And the third is that attestation doesn't actually do what you want it to anyway. Banks want to make sure the user isn't entering their credentials into a compromised phone, but having the official bank app refuse to run on that phone doesn't actually prevent that, because the fake bank app which is stealing the user's credentials on a compromised device won't require attestation to pass regardless of whether the real one does.

reply
Hoodedcrow
4 hours ago
[-]
I feel like the complaint about this not adding to security could be read in a really wrong way. Instead of "this is some hypocritical BS", could be interpreted as "lol let's lock EOL devices from even lower integrity tiers". Doubt this is possible because so, so many people use EOL phones, but still.
reply
userbinator
3 hours ago
[-]
Doubt this is possible because so, so many people use EOL phones, but still.

Because many people have fortunately realised that "EOL" is just an excuse to create lots of e-waste and push even more hostile unwanted changes.

reply
thomastjeffery
4 hours ago
[-]
That's one of the two main claims made by in favor of hardware attestation; so it makes sense to argue against it. Of course, the other claim (that categories of people must be kept "safe" from categories of content) is more insidious, so it does deserve more attention.
reply
luckylion
5 hours ago
[-]
Wouldn't the argument be that you'd build separate copies of those services as well?

Granted, for banking or government-interactions that isn't feasible, but wouldn't it for many other things? It would likely be more expensive given that the work to build something still needs to be done and the cost is distributed among fewer shoulders and the lower complexity since you don't need to build ad-tech doesn't make up for that, but I suppose that's a bit like quality food.

Hardware will be more difficult.

reply
samplifier
5 hours ago
[-]
Are there enough of us to run our own country? It makes me feel dumb, but this is a serious question.
reply
otterley
5 hours ago
[-]
If you live in a democracy, you already do run your own country. Vote accordingly. Get involved in politics.
reply
daishi55
5 hours ago
[-]
There are mountains of academic research showing that even in “democracies”, public opinion rarely translates into policy (by design).
reply
tbrockman
4 hours ago
[-]
Even accepting your premise your options are still either:

1) Don't participate (and accept the consequences)

2) Participate (and accept potential disappointment/failure, with the benefit of having tried)

If you view 2) as fruitless unless your desired outcome is likely, you miss the potential value in the pursuit itself: working with like-minded people, building community, developing new skills, taking agency in your own life, and whatever else might come up along the way.

I don't begrudge anyone for choosing 1) (as long as they own their decision and don't force it on others), but 2) still seems like the aspirational choice I'd want to make if I could.

reply
zozbot234
5 hours ago
[-]
The problem with that argument is that there really is no such thing as public opinion at scale. You can poll people/the general public on just about any issue and the answers are going to differ massively depending on framing effects. In the end, it's hardly better than just flipping a coin.
reply
ryandrake
2 hours ago
[-]
Even if public opinion is unified, if they want something to happen, they are just going to ignore the public and do it anyway. Like the recent cases of data enter projects where they just ignore the public voting against them. Democracy’s weakness it it requires people to follow the rules, but if nobody voluntarily follows the rules, then we don’t really have one.
reply
otterley
1 hour ago
[-]
> Like the recent cases of data enter projects where they just ignore the public voting against them

Do you have an example? And was this a binding or non-binding vote?

reply
ryandrake
31 minutes ago
[-]
reply
otterley
3 minutes ago
[-]
As usual, the story is much more nuanced and complicated than the simplistic narrative of "ignoring the public." Here is the full story:

> The commission rejected the plan to rezone the farmland [that would allow the data center to be built]. The township board followed suit, voting 4–1 to deny it. But locals quickly discovered that amid the frenzied AI infrastructure gold rush, “no” does not always mean no.

> Two days later, on Sept. 12, Saline Township was sued by Related Digital and the site’s landowners. Their lawsuit alleged “exclusionary zoning”—that the community had unreasonably barred a legitimate land use under Michigan law, and it hinged on the fact that Saline Township had no land zoned for industrial use, and that a data center qualified as a “necessary” use that could not be excluded altogether.

> The lawsuit underscored the township’s limited leverage. Even if officials had fought it, their lawyers advised them, the project could likely have moved forward via other avenues, such as partnering with an institution like the nearby University of Michigan, which can build projects that are not subject to local zoning in the same way as private developments. Meanwhile, a prolonged legal battle against well-resourced developers risked significant costs for the township, without securing concessions.

> Lucas, the town’s attorney, says the township board had little choice and did its best to be transparent. It was “between a rock and a hard place,” he said. “I’m not sure there were any good solutions.” Within weeks, the township had settled: It signed a court-approved agreement allowing the project to proceed, and construction began soon after.

> In exchange, the township secured roughly $14 million in community benefits—a relatively small sum in the context of a multibillion-dollar project, but more than 10 times its roughly $1 million annual budget. It includes funding for farmland preservation, local projects, and fire departments; along with a series of environmental and operational limits: restrictions on water use, noise caps, preserved agricultural land, and limits on expansion.

> David Landry, the attorney who represented Saline Township in the Related Digital lawsuit, told Fortune that he stands by his recommendation that the board settle with the developer. “The zoning power of any municipality—a township, a city, a village—is not absolute,” he explained. “In this case, exclusionary zoning was substantive—the municipality has to have a reason to say no. They just can’t say, ‘We don’t want it.’”

> Sarah Mills, a professor at the University of Michigan who studies land use planning, agreed that the town had few good options once the lawsuit was filed. “States determine how much authority local governments have in zoning, and those systems vary widely,” she said. “What local governments can do through zoning is highly controlled and regulated by the state.” Local governments are also often strapped for cash, making it difficult to defend against zoning challenges, she added.

> Marion, the township clerk and sole board member who voted in favor of the proposal, said this reality was on her mind when she voted yes. It wasn’t because she favored a data center, she said, but because she did not believe the town could win in a showdown with Related Digital. “They were doing studies,” she said. “They were pulling permits.” Township attorneys and consultants had warned that a denial could trigger a lawsuit—an outcome Marion said felt intimidating. “Everything was drafted and filed with the county within two days of the meeting,” she said of the lawsuit. “They had this all prepared.”

> If the township had continued to fight and lost the lawsuit, Marion said, homeowners could have been on the hook for tens of thousands of dollars in tax assessments to pay for the legal battle. “The insurance company was only going to pay for an attorney to defend us up to so much money if we decided to fight it,” she said.

https://archive.ph/Kiyn9

reply
Sh0000reZ
4 hours ago
[-]
https://www.nber.org/papers/w29766

Stop re-electing people.

Stop sitting at home projecting apathy and ennui in between WOW raids and rounds of LoL.

Mountains of evidence from history shows public has to stand up for itself, not lick boot.

Refuse to give the politicians and owner class assurances they too refuse to provide.

Most of them are old af and have no survival skills. They're reliant on the latest social memes, stock valuations not religious allegory, that are not immutable constants of physics.

Boomers looted the pension system of the prior generation to fund Wall Street. Take their money. It's American tradition.

Remind them physics is ageist and neither physics and American society afford no assurances anyone has food and healthcare.

reply
marcosdumay
4 hours ago
[-]
Not much of a democracy...
reply
ls612
1 hour ago
[-]
When one group says “we don’t want surveillance” and the other group says “we will use surveillance to destroy you” the equilibrium is clear. This is why liberalism will not survive in the 21st century.
reply
dvdkon
3 hours ago
[-]
I'm convinced that in the billions of people living on Earth, there are a couple million that could agree on things that currently divide countries, like this. Sadly they're unlikely to ever be able to gather together in a single state.

The status quo is nation-states in roughly their post-WW2 borders, and it's fiercely protected. The upside is stability and fewer wars, the downside is that the only way to try anything new is to co-opt an existing country. Adding to that, most countries are ethnostates that would prefer to have only a small percentage of their population be migrants. It's an easy way toward social cohesion, you just stay roughly where you're born, with people who were also born there and share the same cultural background. As we can see, it's not ideal - two lifelong neighbours can easily hold completely opposite moral values.

reply
palata
2 hours ago
[-]
The problem with "us" is that it's not enough to agree on one small question ("is hardware attestation good or bad") to happily live together in our own country. "We" have a wide variety of opinions about pretty much everything.

In other words, "we" exist only to fight against this one thing we disagree with. And even there, we probably don't all agree on how to fight it or what to do instead.

reply
voakbasda
5 hours ago
[-]
Where would you do that? Realistically, the question is one that cannot even be asked safely: are there enough of us to overthrow the existing systems and replace them with something better?

The answer to either question, really, is no. The powers that be have systematically implemented policies that keep us divided to prevent that eventual outcome.

reply
userbinator
1 hour ago
[-]
In terms of headcount, and especially those who are working on this hostile stuff, Big Tech is not even that big compared to the rest of the population.
reply
mwwaters
3 hours ago
[-]
The “enough of us” is at least a majority of voters agreeing. I’m not sure what the alternative to that is.
reply
epistasis
4 hours ago
[-]
Who is the "us" in your question? Theoretically in democracies we should be able to decide this, if we aren't being distracted from real political questions with the culture war stuff that divides the public's attention and divides neighbors from each other.

Any new country will have these same issues, eventually, and probably a lot more that don't seem obvious on the surface.

Fighting against these sorts of monopolies seems far more likely if we can figure out what forces inside the EU and the US are driving these changes and find a way to educated the public, interest groups, and politicians about what's going on.

reply
throw7
5 hours ago
[-]
We already have a republic. If we can keep it.
reply
IdiotSavage
5 hours ago
[-]
reply
thomastjeffery
4 hours ago
[-]
Ideally, we just run our own lives, collaboratively. That's the anarchist default position that we all start in.

What we really need is to meaningfully participate outside of the hierarchical monopolistic systems that demand our participation. That doesn't just mean that we create and hang out in distributed networks: it also means that we make and do interesting shit there, too.

The biggest hurdle I see is that we only really use uncensored spaces to do the shit that would otherwise be censored. We don't use distributed networks to plan a party with grandma, or bitch about the next series of layoffs. We don't use distributed networks to share scientific discovery or art.

I think part of the solution is to make software that is better at facilitating those kind of interactions, and the other part of the solution is actually fucking using it. How many of us are only waiting for the first part?

reply
nullc
1 hour ago
[-]
but what if the alternatives are fundamentally worse? Turns out centralization has a lot of advantages.

I think it's an error to demand the alternatives be as good-- that might not even always be possible. But even if they're less good they're usually still better than anything we could have imagined decades ago-- they're good enough to use.

And that should be enough because we shouldn't consider handing control of ourselves to third parties to be an acceptable choice at all.

reply
hnlmorg
5 hours ago
[-]
I’m not sure why you’re asking this question, but you can run a country as a population of 1 (ie just yourself) if you wanted.

The problem being raised isn’t due to the size of the country though. It’s the size of the company (ie Apple and Google)

reply
riedel
5 hours ago
[-]
The question is rather: can political parties develop a vision beyond libertarian views or full state control on the other side.

I feel that we need a better political consensus on a free society that puts the monopoly of force in the hand of democratic legitimate forces. I currently feel that all digital violence lies in the hands of a few corporations. And at the same time there is politician that like this because they can through this proxy can indirectly execute control without any political legitimacy. Sorry, I do not believe in markets as guarantees for freedom. I have read too much dystopian sci-fi for that.

reply
skybrian
5 hours ago
[-]
Yes, it requires you to have an approved device for certain tasks.

But you can own multiple devices. You can use an approved device specifically for banking or Netflix and whatever device you like for all your other tasks. Maybe you could use an approved device (a Yubikey?) to authenticate your other devices?

Also, governments should be leaning on them to approve more devices.

reply
userbinator
2 hours ago
[-]
In 1999, Intel received an absolutely massive amount of opposition when they decided to include a software-readable serial number in their CPUs, so much that they reversed the decision.

Then the "security" and Trusted Computing authoritarians continued pushing for TPMs and related tech, and contributed to the rise of mobile walled gardens. Windows 11's TPM requirements were another step towards their goal. The amount of propaganda about how that was supposed to be a good thing, both here and elsewhere, was shocking.

It turns out a significant (but hopefully decreasing) number of the population is easily coerced into anything when "security" is given as a justification.

The war on general-purpose computing continues, and we need to keep fighting.

Stallman was right, as always. Time to give his "Right to Read" another read. (If it hasn't been done already, an AI-generated short film of it would be a great idea...)

"Those who give up freedom for security deserve neither."

reply
krupan
2 hours ago
[-]
Totally with you until you brought in AI, a completely centralized and proprietary tool.
reply
SchemaLoad
11 minutes ago
[-]
Especially considering AI bots are the whole reason google is pushing this new recaptcha.
reply
userbinator
2 hours ago
[-]
Local models exist, but there's also irony in using the tools to spread the message of the opposition.
reply
krupan
1 hour ago
[-]
The local models are still centralized and proprietary. They are basically closed source software.
reply
userbinator
1 hour ago
[-]
Closed or open source doesn't matter; it's the ability to control them that's important. People have been cracking and patching for decades without source, but they have that control.

Contrast this with remote attestation, where they might show you the source code for everything but you're still powerless to do anything.

reply
nullc
1 hour ago
[-]
RMS found it acceptable to use SunOS initially to create GNU.

Open weight models can be a big boost to building Open AI (cough). Progress comes from incremental improvements, -- and open weight models are a big advance in privacy, security, and autonomy over relying on hosted closed systems.

Source vs not is only one (important!) dimension, moreover in FSF land they define source as being the preferred form for modification, at at least for some kinds of modifications the weights are the preferred form.

reply
manytimesaway
7 minutes ago
[-]
>RMS found it acceptable to use SunOS initially to create GNU.

Any source on that?

reply
grishka
5 hours ago
[-]
Our civilization desperately needs a method to modify modern microelectronics after manufacturing that can be used at least in a well-equipped repair shop, and it needs it yesterday.

Alternatively, just make it illegal to ship any kind of initial bootloader as part of a CPU's/SoC's mask ROM in any computing device that is marketed as a general-purpose one. I.e. the first instruction that the CPU executes after reset must come from a storage device that is physically external to the CPU package.

reply
pietervdvn
4 hours ago
[-]
Or maybe we should just get rid of the "breaking DRM is illegal"-laws. See https://pluralistic.net/2026/01/01/39c3/
reply
grishka
1 hour ago
[-]
That'll also work somewhat, but the problem would remain that even if it's legal to break the DRM, you can't exactly break it when it's assisted by hardware and there are no vulnerabilities in the "trusted" code.
reply
altairprime
5 hours ago
[-]
This won’t help; the SOC silicon can be revised to record each executed instruction from power-on until secure-boot handoff opcode, with various supporting opcodes to query status-of / overflow-of / signature-for so that the OS reports pre-boot tampering implicitly as part of developing its own attestations.
reply
grishka
4 hours ago
[-]
Then also make it illegal for the SoC to contain any cryptographic key material.

My intention with this is to make sure that if someone were to desolder the flash chip and reprogram it, they could completely own the device without the device or SoC manufacturer having a say in it or a way to prevent or detect it.

reply
altairprime
4 hours ago
[-]
Simpler to just make discrimination by hardware or software illegal than to legislate the silicon contents. That’s what everyone is upset about, after all: websites are gaining the ability to discriminate based on hardware-software with specific fidelity they never had before. If that was made unlawful, then you’d benefit billions of existing devices as well as future ones. The hard part is making the case that this sort of discrimination is worth fighting, but the John Deere lawsuits are (indirectly) further ahead on that point than the rest of tech is, weirdly enough.

Example: I’m perfectly fine with my Touch ID sensor having a crypto-paired link to my SOC so that someone can’t swap in a malware-sensor at a border checkpoint; I also don’t want my device (or websites) to be able to discriminate against me installing my own homemade sensor. What that looks like in practice is close to what we have now, but not quite there yet — and is definitely not ‘no crypto-pairing at all’, as a ban on key material would enforce.

reply
monocasa
3 hours ago
[-]
That's probably not going to happen for a very long time. Relatively simple SoCs already do tons of work before the architectural reset vector in undocumented boot ROMs in order to assist the reset process.

There's also tons of value in a boot ROM that can't be accidentally erased to add low level DFU routines.

reply
userbinator
4 hours ago
[-]
Alternatively, just make it illegal to ship any kind of initial bootloader as part of a CPU's/SoC's mask ROM in any computing device that is marketed as a general-purpose one.

No, you just need to make it illegal to have the bootloader contain hardcoded key material and use it for verifying the code it loads.

reply
aleksejs
3 hours ago
[-]
TFA is authored by the developers of an alternative operating system that can be freely installed on every Google phone since Pixel 6.
reply
subscribed
1 hour ago
[-]
....and this is only Google phones solely because NONE of the alternatives meet the team's stringent security requirements.
reply
bigbadfeline
3 hours ago
[-]
> Our civilization desperately needs a method to modify modern microelectronics

Micro is now nano, not amendable to modification, and even if it was theoretically possible, hardware is a super-easy target for legislation.

> Alternatively, just make it illegal to ship any kind of initial bootloader as part of a CPU's/SoC's mask ROM

If you had the political means to enact such legislation, you could legislate much cleaner and easier ways to deal with the problem.

I find myself saying this a lot but I still can't quite figure our why people keep seeking technical solutions to political problems.

I mean, these things aren't comparable, in some limited cases the naive approach might help but insisting on it while neglecting political action is worse than doing nothing.

reply
dist-epoch
4 hours ago
[-]
> just make it illegal to ship any kind of initial bootloader

funny how you think the solution to people imposing their will on you is to impose your will on others

also, the solution you propose wouldn't work because signed firmware

reply
grishka
4 hours ago
[-]
And what code will verify the signature of the initial bootloader? As far as I know, in every modern implementation of secure boot that is done by that very bootloader, which is burned into the CPU/SoC. I can imagine someone implementing some sort of fixed-function block to do that, but see my sibling reply about that.

Also, governments are supposed to act in the interest of people.

reply
milutinovici
4 hours ago
[-]
It's called laws
reply
dminik
4 hours ago
[-]
It's amazing that we're letting the Google Apple duopoly completely decide who can and cannot use completely unrelated services.

Imagine getting banned from Google services for anti-google views and being unable to log into your bank account. We really should breakup the Alphabet.

reply
Retr0id
27 minutes ago
[-]
It is possible to bypass Play Integrity on most devices (even at the "strong" level) using a sewing needle.

Specifically, you poke the data lines of the memory bus to induce bitflips, much like I described in https://www.da.vidbuchanan.co.uk/blog/dram-emfi.html

This is trickier if your device has the DRAM mounted directly on top of the CPU, but still possible - you'll need to do some BGA rework to get a wire soldered to one of the DQ lines.

Once you get a physical memory read/write primitive, you can start patching the kernel. Play Integrity does not detect this, since it only attests the state of the kernel at boot. I chose to patch out the permission checks related to ptrace, allowing me to inject frida-gadget into running apps, and to inject shellcode into pid 1.

The initial exploit is pretty unreliable, and usually takes a few reboots to hit. But once it lands, the device is pwned until the next reboot - like a "tethered jailbreak".

I tested this on a Samsung A06 because it was the cheapest device supporting Play Integrity I could get my hands on, but there's no fundamental reason it shouldn't work on any other device, including flagships. Some mitigations would require a different exploit strategy (e.g. memory encryption), but the fundamental flaw is still there.

Demo: https://bsky.app/profile/retr0.id/post/3mljtyauw322d

reply
OhMeadhbh
1 hour ago
[-]
Partially apropos... There's a Heinlien quote that goes "When a place gets crowded enough to require ID's, social collapse is not far away. It is time to go elsewhere."

Which I think in this case may mean that I'm hoping an Apple or Google exclusive id system couldn't be ubiquitous enough to be required. But forethought doesn't seem to be modern man's strong suit.

reply
revolvingthrow
4 hours ago
[-]
Is it possible to dual-boot on android? It sounds defeatist but I no longer believe it’s possible to change course - the increasingly authoritarian governments, google and most moneyed interests are all on the same side, so it’s just a matter of when.

Being on the palantir-approved google ranch for the few Apps You Need + graphene (or some other alt OS) for everything else would be quite inconvenient, but still better than carrying two phones, which nobody wants to do.

reply
palata
2 hours ago
[-]
Well, authoritarian governments don't like to be at the mercy of another country. So even for authoritarian governments it would make a lot of sense to allow open source alternatives like GrapheneOS instead of depending entirely on US monopolies.
reply
jgord
33 minutes ago
[-]
What freedoms do we value ? freedom of speech, freedom of compute, freedom to own assets, to sell our work or give it away, bodily autonomy, freedom to travel, to read to learn ?

Amid the massive hype of the Web3 Crypto era, there was a kernel of useful innovation : that you can choose to have unique digital copies of things, and thus you can have a way of sending value that bypasses the middlemen, be they local thugs, bent politicians, violent regimes, benevolent dictators, or the dominant hegemony.

Having central big-Corp approve your content or sign your executable or take a vig on your sales, or license your hardware - these may be common, but are not a universal law of nature.

The internet itself is our best example of the value of technology open for all to use. Frankly, that is in danger.

Whether it is bogus age-checks in your OS, a hidden bios OS, or the move away from owning your own compute [ because the GPU / CPU and RAM are priced so high you have to rent them ], consumers need to pool resources and ensure open access.

Kudos to France for mandating a Linux OS for their public service workforce. Good on the Europeans for doubling down on renewables to insulate themselves from petrodollar volatility, and making sure portable devices have replaceable batteries.

Cory Doctorow has some great rants on enshizzification. Garys Economics YT channel has some great rants on why high inequality steals resources, see also Piketty.

The technocrats on this forum have an understanding of these measures the common person may not, and thus a moral obligation to weigh in on the issues and warn 'genpop'.

Resist, dont let the buzzkills wear you down.

reply
CharlesW
5 hours ago
[-]
The thread is a bit vague. Am I understanding correctly that GrapheneOS Foundation's objection isn't to attestation per se, but that they can't participate in Google-controlled attestation APIs? In other words, although GrapheneOS can be cryptographically attested, apps using Google Play Integrity won’t accept it because it isn't Google-certified/GMS-licensed?
reply
microtonal
5 hours ago
[-]
My impression is that they are against remote attestation in apps/websites in general and if apps really want to do it, they should do it using the attestation API that AOSP already provides. The attestation API in AOSP allows companies to trust signing key fingerprints (such as those of GrapheneOS), which means that the attestation system is not controlled by a single company (Google).

The most damning part about Google Play Integrity is that, as the thread states, that Google lets devices pass that are full of known security holes, whereas they do not allow what is very likely to be the most secure mobile OS. This shows that they only use it as a method to shut out competitors and to control Android device manufacturers to pre-install Google software like Chrome (otherwise their devices do not get certified and won't pass Play Integrity).

IANAL, but anti-competition lawyers/bodies should have a field day with this, but nobody seems to care. Worse, the EU, despite their talk of sovereignty adds Play Integrity-based to their own age verification reference app.

I recommend every EU citizen, also if you do not use GrapheneOS, to file a DMA complaint about this anti-competitive behavior:

https://digital-markets-act.ec.europa.eu/contact-us-eu-citiz...

Also, every time this comes up, @ the relevant EU bodies, commissioners and your government's representative on Mastodon, etc.

reply
Hoodedcrow
4 hours ago
[-]
> The attestation API in AOSP allows companies to trust signing key fingerprints (such as those of GrapheneOS), which means that the attestation system is not controlled by a single company (Google).

I wonder if this would exclude rooted OSes, non-relocked bootloaders and things like that? Sorry for stupid question, still not quite understanding how this works.

reply
microtonal
3 hours ago
[-]
Currently probably not, because there are leaked keys, etc. But otherwise it would, since the verified boot state, etc. is added as part of the signed material.
reply
dataflow
4 hours ago
[-]
> very likely to be the most secure mobile OS

> IANAL, but anti-competition lawyers/bodies should have a field day with this, but nobody seems to care

I'm gonna take a wild guess that proving the above statement in court (and then its necessary impact) might be a significant obstacle here?

reply
kelnos
2 hours ago
[-]
You don't really "prove" statements like that. You get some "expert witnesses" to testify one way or another, and your opposition gets some "expert witnesses" to testify the opposite, and then the judge/jury decides who they think was more credible.

I imagine the way to do this effectively would be to get some well-regarded infosec firms to audit both OSes (from source as much as possible), and also compile lists of vulnerabilities found, fixed, not-fixed, etc. over time. Then you need a witness who can explain all of it in a way that's accessible to and likely to sway a jury.

reply
aaronmdjones
5 hours ago
[-]
> Am I understanding correctly that [...]

What I took away from the thread is that they're against services forcing attestation in general, and also pointing out that Play Integrity isn't about security, but rather about control, because Google could trivially make it work with GrapheneOS (which is more secure than any other Android OS on the market) but they won't.

reply
Haemm0r
3 hours ago
[-]
It is not only about Google. Its also about the App developers. Nothing prevents them to use the non-google attestation, however they decide not to use it (for many reasons). First time you actually notice this is when you installed GrapheneOS (attestation OK and bootloader locker) and some apps complain about a modified/rooted/... device. Another thing is, that you are warned by your Google device while booting that something is "not OK".
reply
CharlesW
5 hours ago
[-]
> …Google could trivially make it work with GrapheneOS (which is more secure than any other Android OS on the market) but they won't.

But if Google did support third-party attestation, would the GrapheneOS Foundation be happy? Most of the thread seems to be a call for attestation to die, which feels impractical and unachievable. But "Google could use it to permit GrapheneOS for Play Integrity if that was actually about security" seems to be the real ask, and that seems reasonable and achievable. If that's true, I think it would’ve been more effective to lead with that and focus on it.

reply
microtonal
4 hours ago
[-]
Why should Google decide which devices are safe enough to pass remote attestation? Seems to me that if we want this at all, it should be an independent body that approves signing keys of vetted vendors (e.g. vendors roll out security updates timely, etc.).

As long as this is in Google's hands, they can abuse it to control the market.

That said, Play Integrity accepting GrapheneOS would be a step forward, but they will never do it, because then other vendors might also want to pass attestation without preloading Google apps.

reply
Hoodedcrow
4 hours ago
[-]
> Seems to me that if we want this at all, it should be an independent body that approves signing keys of vetted vendors (e.g. vendors roll out security updates timely, etc.).

This is also a horrible idea. If an OS can be vetoed for untimely security updates, it can also be vetoed for not having something like clientside scanning.

reply
foltik
3 hours ago
[-]
Then you’re just replacing one DRM cartel with another.

What would even be the criteria for approval? Pinky promise to not let the end user have full control of their own device? That’s all “integrity” really means in practice. Don’t be fooled by appeals to security.

reply
thomastjeffery
4 hours ago
[-]
No. That would be a relatively better circumstance, but we would still have the root problem.

> Most of the thread seems to be a call for attestation to die, which feels impractical and unachievable.

I disagree, and I expect GrapheneOS devs do, too. Hardware attestation is a new thing, that isn't even really here yet. It absolutely can and should meet its demise.

reply
laserbeam
4 hours ago
[-]
It's impossible to say. But as a reminder from Cory's first talk on enshittification... When Google and Facebook were small, they would argue for open protocols and competition. Facebook would reverse engineer MySpace's protocols to allow people to migrate away. Once FAANG became dominant, they went the opposite direction to built monopolistic practices.

GrapheneOS is still small and appears honest. Despite them being in the right in this fight and them deserving our support... We gotta keep them honest in the long run!

I don't think there's any way to tell if a small company will keep their values if they succeed in getting enough market share.

reply
BrenBarn
1 hour ago
[-]
> I don't think there's any way to tell if a small company will keep their values if they succeed in getting enough market share.

That is why all companies should be small and no company should ever have a huge market share.

reply
zb3
5 hours ago
[-]
It's a different thing if banking/government apps require a device certified for security, and a different thing if this certification certifies that the user's device has Google spyware preinstalled with elevated privileges..

Google doesn't certify devices basing on security, so that kind of attestation should have no place in banking/government apps, otherwise it just enforces the duopoly

reply
surajrmal
3 hours ago
[-]
It's hard to listen to arguments when everything is so hyperbolic. The stated rationale for attestation for captcha is to ensure there is a human on the other end and not a bot. This requires a system which is not capable of automated input. The other use case is for ensuring that an application is running on a system which protects the app from being tampered with (by the user, malware, or otherwise). While that seems to run counter to the preferences of the hn userbase, it is a legitimate desire from an application developer.

Neither of these situations are related to any so-called spyware. The fact that Google is involved here had to do with the fact that they are a trusted party for folks to rely on to ensure the desired properties are being met, nothing more. In theory it should be possible for other parties to provide similar attestation, but that party needs to be deeply involved in the OS and boot chain. Apple is obviously capable and is equally trusted. Graphene probably provides the necessary properties but lacks a good way to attest due to the reliance on Google specific attestation APIs. That could be remedied. Otherwise Graphene would need to create their own APIs and applications would need to use them, which would be a harder sell. In both cases the party asking for the attestation needs to decide to trust Graphene, which is still a barrier, but that's an easier way forward. Alternatively, Google could trust Graphene and everyone who already trusts Google would inherit such trust.

reply
nullc
50 minutes ago
[-]
> it is a legitimate desire from an application developer

I want a pony! A legitimate desire. So it's okay if I rifle through your underwear drawer in case there are any ponies I could take?

Requiring there be a physical phone is a speedbump at best ( https://i.dailymail.co.uk/i/pix/2017/05/12/13/403C0D44000005... ) and so de-anonymizing every person using the internet by attaching them to a device and allowing google to track them is not sufficient, nor is the privacy loss necessary for the kind of improvement they could realistically hope to achieve.

But most over even if the panopticon were highly effective and even if were the only option to achieve that end we should still reject it because it's wrong.

reply
izacus
5 hours ago
[-]
There's a thread awhile back where there were VERY angry at someone trying to setup their own attestation project database (essentially a list of known Android builds and their signatures).

They want apps to add their signing hashes manually just for them and don't want to join projects that would aggregate and act as a database or certificate authority.

reply
microtonal
4 hours ago
[-]
You mean Universal Attestation, which is from a vendor cartel, of which most of the individual vendors are typically waaaaay behind security updates, etc.
reply
izacus
2 hours ago
[-]
No, it wasn't those. It was another EU org.
reply
acgourley
5 hours ago
[-]
It's so obvious to me states need to create a soul bound identity system, replace social security numbers with it, and then let everyone else use cryptography on top of that (which is now cheap when you don't care about sybil attacks) to do private stuff.
reply
kcb
4 hours ago
[-]
Any system mandated by the government will have a backdoor to deanonymize users. Nothing would convince me otherwise.
reply
acgourley
4 hours ago
[-]
Let me try anyway (maybe I'm a masochist)

First I'll say the government already has an ID system with a backdoor they mandate you use (your federal social security ID and state ID). The backdoor isn't very interesting because anyone with your ID in hand also has it.

So how about this:

1. State assigns citizens an ID at birth 2. State allows citizens to submit a public key along with their ID at any time 3. Citizens can go to their bank / private social network / whatever and say "this is my public key, you can use it to sign messages to me, and you can verify someone a) alive and b) a citizen of $state is reading it (from here you can bootstrap whatever protocol you want) 4. The state<>citizen network established in (2) is constantly under attack as stealing someones private key valuable so you also need a legal and technical framework to defend it

The protocol for submitting private keys and defending it from attack is a much longer post, I'm convinced there are ways to do it that drastically favor defense over offense, but that's not the point here.

Our question is can a government force it's way into the protocol you bootstrapped on top

How would they?

1. They could reset your public key to one they control the secret to, and then impersonate you digitally to break into your bank or social network. However I don't think they could do this secretly (the key update would necessarily be publically visible), so it's not really a back door. They can already do this with a search warrant. And if you're paranoid you can bootstrap your secondary cryptographic networks with multiple factors. So, this is on net more secure for you.

2. They could try to recover your secret key by force or warrant - but again not a back door.

I think the real concern isn't backdooring it's blacklisting, if this system becomes the L1 for every L2 crytographic interaction, they can practically remove your ability to freely transact. But that's a political problem you address with political means, I'm convinced from a technical perspective this is more secure and far cheaper for everyone.

reply
realusername
5 hours ago
[-]
The places you actually need an ID are so rare, I don't think it's worth it to build such a system (and no, porn or social network definitely aren't valid use cases).

It's a problem in search of a solution.

reply
elric
4 hours ago
[-]
> It's a problem in search of a solution.

The cynic in me suspects it's a way of slowly but methodically eradicating online anonymity and thus anonymity in general.

reply
acgourley
4 hours ago
[-]
I think it would make the web MORE anonymous, not less!

The reason it's hard to boot up a secure social network (such as Signal) is the handshake for (re)identifying people. Signal makes a ton of conceits here (the UX essentially asks people to assume phone numbers are securely held) in the name of low friction and it's why they grew so fast. The "real" secure social networks are essentially too difficult to get real adoption because they don't make these conceits around phone numbers, and demand real key exchanges.

But if you had a L1 set of private and public keys the government works to maintain and defend, the L2 social networks like Signal (or banks, or markets, whatever) can do this cheap and easily.

reply
SilverElfin
5 hours ago
[-]
We also need liability. Every time someone’s data is lost, the company losing it must be held accountable. They owe us huge amounts of money, and executives + board members should be jailed. No free pass.

Let’s see then if they really want to collect all our information all the time. Right now, they take it and handle it irresponsibly because they’re free from consequences.

reply
2OEH8eoCRo0
4 hours ago
[-]
My driver's license should have some anti-tamper identity proof that can do a challenge response. Or let me go pay a few bucks for an identity proof at the post office.

There must be a dozen other ways smarter people can think of but identity verification kills profits so the smart people don't work on them IMO. It's more profitable for social media to be an astroturfed shithole. It's more profitable to remove control of your PC.

reply
hakfoo
4 hours ago
[-]
Social media in an ad economy serves two masters.

End users should be authenticated so you can prove you're selling real eyeballs in the demographic mix you claimed to marketers and to provide lip service for the 'think of the children' regulators.

But anyone who's paying for ads should have as little friction as possible to dropping money and spewing garbage.

I'm surprised nobody is looking at some sort of "corporations are people" angle here-- we've attested the device ownership, but it's owned by the Lorem Ipsum Corporation, which is a legal/demographic dead end and spawned just long enough to buy the device.

reply
altairprime
5 hours ago
[-]
You just need to deploy auditable (source-available, reproducible-build, firmware checksums LCD on-chip) biometrics booths that generate private keys from normalized biometric inputs, and then use those ephemeral private keys to generate and sign portable identity keys. Most people have fingerprints and retina patterns and that’s twelve signatures on an identity alone, allowing for continuity across severe biometrics events like regrown fingertips etc.

A nonprofit business could do this if backed by all existing dotcom and bitcoin billionaires. But they’d all want to profit from it, so either non-profit (NGO) or governmental it is.

Fun fact: this is already a core function of USPS. They serve as an identity verification hub for both US passports and their informed delivery and PO box services. They just have a human-dependent process rather than an identity-generator booth. So they’d be perfectly positioned to take your ID, hand you an attestation request QR code, and get your identity-signatures on it — without being able to reverse-engineer your biometrics from those signatures, but still being able to detect gross variances when someone else tries to lie about being you in a future verification.

Anyways, none of this will likely ever happen, but the rich tech folks could make it happen at any time if they cared to. Instead we get THE ORB which is doing retinas as a for-profit without auditable artifacts or hardware. Sigh.

reply
acgourley
4 hours ago
[-]
I think you can do it without any biometrics at all, although using it as a second factor could make it smoother.

I'd propose the primary factor is social - when a child is born there is a recorded attestation from the family and care providers about the minting of a new soul. When keys are compromised you similarly seek attestations from your social network (or social worker) that you need to furnish a new key.

The network could be attacked by literal force, blackmail, or deception, but it's very expensive compared the defense (strong legal punishment for attempts to subvert the network)

That last part is why I think the state has to do it, not technologists. There has to be a strong legal and cultural immune system in place to defend the network.

reply
altairprime
3 hours ago
[-]
That’s adjacent to birth certificates and passports already, with some variations on a theme per country, but certainly I don’t object to it. But I’m still infuriated at having to provide a birth certificate to LinkedIn to support a legal name change, so I encourage further design at the interface between “citizen identity” and “online identity(s)”. Your idea has merits and isn’t like others I’ve seen, so it’s worth considering in more detail!
reply
martin-t
2 minutes ago
[-]
Observations:

1) Only law can fix this. Anybody (looking at you ancaps) telling you "if you don't like it, start a competitor" doesn't understand how the economy and network effects work.

2) The general population is a combination of not caring and not even being smart enough to be able to understand. If everyone votes on everything (like most "democracies" where you vote for parties), bigger issues like healthcare, abortions, LGBT will dominate and everything else is noise.

3) People who don't know what public-private crypto or zero-knowledge proofs are shouldn't be allowed to vote on issues where these are relevant factors.

4) We need to fix voting so people can vote on only the stuff they care about and only the stuff they are actually informed about. This works in small teams of highly competent people - at work or in FOSS - and only when they have the same goals. Politics is by nature adversarial and I don't know how to fix this.

reply
GeekyBear
4 hours ago
[-]
I am reminded of the period when secure boot was being developed for PCs.

Microsoft certainly wanted to be the only company whose OS was allowed to boot with secure boot turned on.

Google should not be allowed to close the supposedly "open" ecosystem they created any more than Microsoft was allowed to.

reply
thecatapps
4 hours ago
[-]
With all of the discourse around hardware attestation, digital ID, and age verification in recent weeks/months, is there actually any good solution to the problems these existing tools (Privacy Pass, WEI, Fraud Defense, uploading IDs) claim to solve? Are there open and privacy-preserving standards that can solve the problem of bots and minors? If not, what would be required to establish one, and is it realistic?

Businesses will do what businesses will do, but it seems to me having something to point to and saying "do this instead" is more effective than "this sucks and isn't even about security, don't do this at all" even though it's true.

reply
krupan
2 hours ago
[-]
What even is the problem? I keep my kids computers in the living room where it's easy to see what they are doing. Their lan shuts down at night when I'm asleep. They don't get full control of their own cell phone until they are around 16-years old. Bots on social media discourage me from using it which is a Good Thing if you ask me.
reply
SchemaLoad
6 minutes ago
[-]
The problem is that companies have a legitimate reason to want to block AI agents and verify the users are actually real. And it's incredibly difficult to do that when the old methods of clicking on squares or reading blurry words don't work anymore.

Solving proof of humanity is very difficult without tying to some kind of difficult to replicate or automate ID.

reply
xinayder
2 hours ago
[-]
> Are there open and privacy-preserving standards that can solve the problem of bots and minors? If not, what would be required to establish one, and is it realistic?

Ideally there shouldn't be standards for this. What we have already is enough.

Companies claiming they are closing down their services/devices to protect the users is total BS. Facebook has admitted they get 10% of their ad revenue from scams, and that's the reason they won't go after scammers on their platforms.

Same can be said for Google. They could come up with numerous ways to block bots or make captchas harder for actual bots (while also not flagging every non-Chrome user as a potential bot, like they do nowadays), but they pretend this is an unsolvable problem that requires a nuclear solution, it used to be Web DRM but now it's called Fraud Defense.

reply
mattmaroon
5 hours ago
[-]
So basically, ReCaptcha should be spun off into a not-for-profit.
reply
yowo
4 hours ago
[-]
I literaly switched away from banks whose apps dont work on GrapheneOS
reply
ajdude
3 hours ago
[-]
> Google's reCAPTCHA is planning an approach where they use Privacy Pass on Apple hardware, their own approach on Google Mobile Services Android devices and a QR code scanning system to require an iOS or Google certified Android device for Windows and other systems

I wonder if we'll get something similar happening with cloudflare

reply
xinayder
2 hours ago
[-]
If you use Turnstile you can skip all the Cloudflare captchas.
reply
aleksejs
3 hours ago
[-]
> It doesn't provide a useful security feature, but it does lock out competition very well.

This seems to presuppose that service providers using reCAPTCHA are either clueless idiots or actively expending resources and lowering their conversion rates to support the supposed Google/Apple duopoly. That does not strike me as a plausible claim.

reply
bobmarleybiceps
3 hours ago
[-]
it's so great to see people boosting "security" in a way that also just happens to require locking in to big-tech approved apps that send all your data to big-tech so that they can deliver ads to you via your big-tech approved device using your big-tech approved os running your big tech approved browser showing your big-tech approved video platform with your big-tech approved content (oh, and also sends your data to your big-tech approved government)
reply
SilverElfin
5 hours ago
[-]
It is definitely a monopoly enabler. But also a threat to speech. You can only participate online if you have attested hardware. And that hardware will be tied back to you. It’s another threat to privacy like age verification laws.
reply
mohamedkoubaa
4 hours ago
[-]
Safety is the pretext. This is the actual reason why this is happening, and why it is accelerating now
reply
p0w3n3d
2 hours ago
[-]
To think I'm gonna live in a cross-state totalitarian world
reply
gib444
5 hours ago
[-]
GrapheneOS would do well to get a grip on its marketing/PR, especially at this pivotal moment of partnering with Motorola. This topic deserves to be a proper article. Please, not everyone wants to read a stream of tweets and replies.

And the audacity to reply rudely to someone in the thread with "Read the rest of the thread once it's posted". Absurd

(Wrote this on a Pixel running grapheneos fwiw)

reply
microtonal
4 hours ago
[-]
They recently said that in the future they want to do more long-form posts just in their discussion forum and then link to it from Mastodon, etc.
reply
vvpan
3 hours ago
[-]
Miss that monopoly busting of yesteryear. The elephant in the room is that private forces who do not have public good in mind have gotten way too powerful to the detriment of everybody's well-being. Everybody's except the state's surveillance wings.

Break them up. Break them up. Break them up.

reply
minraws
4 hours ago
[-]
I mean sure Google & Apple are evil, but don't we all need some evil in our lives, EU citizens doesn't matter we love the evil and honestly we enjoy it.

What can't we do for these two companies we will beg, we will bend, we might even consider grovelling as long as the evil is around, to help us find the greater evils in the world. That is, the people we don't like, might be the bad guys today, but just don't worry you will be the bad guy too, just wait until the bad guys get into power...

I haven't read the hobbit or lord of the rings but man if this isn't greed corrupting all men then I don't know what is.

I feel sick of all this, I might really just move out and live the rest of my life out on the farm somewhere.

reply
iamkrazy
5 hours ago
[-]
It's still not too late. With the help of Claude et. al, we can make a truly open mobile OS from ground up. We can make an app translater that can translate Android and iOS apps to our OS. We can make deals with manufacturers to start shipping phones with this OS. We have the will, there's enough of us on this site to make an impact. All ee need is good leadership. Please somebody with enough clout step up.
reply
applfanboysbgon
5 hours ago
[-]
The OP is from an already-existing open mobile OS, which already has a deal with a manufacturer. The problem isn't, and has never been, making an OS. This is not a technical problem. This is a political problem.
reply
whatsupdog
4 hours ago
[-]
But that open mobile OS is still a fork of Android, which is too hell bent on privacy (which is not a bad cause, but something that masses don't care about). We should focus on an OS which is hell bent on UX, UI and other features that masses crave.
reply
SchemaLoad
4 minutes ago
[-]
None of that helps the OP issue of hardware attestation for reCaptcha.
reply
krupan
2 hours ago
[-]
You really don't know the limits of LLMs. They can't make anything "from the ground up" they are only as capable what they were trained on. Someone had an LLM make a C compiler and they found code regurgitated verbatim from existing compilers. You better believe that any OS it writes will look astonishingly similar to an existing open source one.
reply
tamimio
2 hours ago
[-]
The best workaround for now is -as the solution is always to change these regulations not the technical workarounds- is to have a secondary smaller phone that has the sim card, google botnet services, etc., and use that for any verification needed or login to banks or whatever, and keep this device turned off in your house so they don’t track you too and use it where needed. That while also pressuring web services not to use recaptchas and similar invasive services.
reply
TZubiri
4 hours ago
[-]
Ironically, the other top article on HN right now is CVE-2024-YIKES.

You can't have the cake and eat it too. Maybe we need to close some doors, especially if the barrier for publication is literally just a couple of prompts and uploading the result to distributor like npm or play store.

reply
einpoklum
2 hours ago
[-]
Not to rain on the parade, but doesn't GrapheneOS only works on Google Pixel devices? I mean, that's still in the Google jail on a physical level, even if they swap out the software.
reply
criticalfault
2 hours ago
[-]
they made a deal with Motorola, from next year we should have an alternative.

in any case, google started to cause issues with pixel 10, so it's not as easy to port it

reply
dickywad
3 hours ago
[-]
Its actually worse than people seem to understand.

Hardware attestion will spread like a plague and you will soon no longer be able to log into anything without using "an approved computer". Which will mean a computer of someone elses choosing.

I could easily see large companies using this as a way to charge employees for their desktop access and a million other perversions of this nonsense.

Its bad enough we cant use our computers without being spied on, now they want to install their spyware and force us to use "their computers"

reply
mrexcess
2 hours ago
[-]
There are a number of technological / legal hybrid policies developing that come at the very jugular vein of computing freedom - the notion of a “general purpose” computer itself. OS level identity / age verification, hardware attestation, walled garden app signature requirements. All evincing the same aim.
reply
derelicta
3 hours ago
[-]
Mark my words: in ten years from now on, the Chinese web will be more free and open than any Western country.
reply
SchemaLoad
1 minute ago
[-]
In China they have solved this issue already by having every website log in with your phone number which is already directly tied to your Chinese ID.

Problem is some countries don't lock down their phone numbers this far so for this to work you have to whitelist country codes which have secured phone numbers.

reply
krupan
2 hours ago
[-]
Isn't half the reason companies push for these sorts of controls is so they are allowed by the Chinese government to do business there?
reply
comandillos
5 hours ago
[-]
These kind of things just make me want to use Graphene even more, or literally any platform that isnt the monopoly ones. Somehow I think AI and vibecoding, even if it may sound as an unpopular opinion, will allow people to build free ecosystems and actually usable devices that dont rely on the usual providers.
reply
rasengan
5 hours ago
[-]
I agree hw attestation is net negative when forced upon end users. OTOH, when service providers use it, it results in transparency to end users [1] so it's really about how it is used.

[1] https://bmail.ag/verify

reply
rvz
5 hours ago
[-]
Well there you have it.

> Governments are increasingly mandating using Apple's App Attest and Google's Play Integrity for not only their own services but also commercial services. The EU is leading the charge of making these requirements for digital payments, ID, age verification, etc. Many EU government apps require them.

Even the "beloved" EU government is also in on it as well as banking apps are pushing for this too. They do not care about you and the so-called "Open Web" is already dead on arrival.

[0] https://grapheneos.social/@GrapheneOS/116551068177121365

reply
bigyabai
5 hours ago
[-]
> They do not care about you

By "they" you mean FAANG and the FTC, right? Telling the EU to respect the Open Web does nothing to protect users if you continue to approve the export of attested hardware. America is deliberately abetting authoritarian schemes.

reply
rvz
5 hours ago
[-]
> By "they" you mean FAANG and the FTC, right?

You might need to the sentence again since I was quite clear who I was talking about:

"EU government"

"banking apps"

...and everyone else who benefits from pushing "digital payments, ID, age verification, etc." that will use "Apple's App Attest and Google's Play Integrity" APIs.

It isn't that hard to understand.

reply
bigyabai
4 hours ago
[-]
There's only two companies enabling those crooks, as far as I can see it. If America refuses to take action, then this power will be abused by worse governments like Russia and China.
reply
ls612
5 hours ago
[-]
Asymmetric cryptography and its consequences have been a disaster for the human race. I’m not even joking all of the centralization of power and the rise of totalitarianism tech is driving is downstream from asymmetric cryptography.
reply
grishka
5 hours ago
[-]
It's not asymmetric cryptography itself. It's the fact that it takes enormous resources to manufacture modern SoCs, such that the economy only makes sense if you're churning them out by millions at least. It's also the fact that they can't be modified after they've been manufactured.

It's basically those people who can manufacture chips having technological supremacy over the rest of the humanity.

reply
ls612
5 hours ago
[-]
It doesn’t matter if you can produce SOCs if your hardware isn’t trusted.
reply
grishka
4 hours ago
[-]
What if you can copy someone else's SoC including their keys?
reply
ls612
4 hours ago
[-]
I guess read-only memory is another requirement but that is very old technology we have never had asymmetric cryptography without read only memory.
reply
__MatrixMan__
4 hours ago
[-]
My introduction to asymmetric cryptography had to do with protecting myself from the authorities while buying drugs on the internet.

One of its first applications anywhere was protecting anti nuclear protestors from government provocateurs.

We could prevent so much fraud of we could only convince the credit card companies to start using it (instead of printing a symmetric secret on the outside of the card).

It's predominantly a force for good. If anything, its a bit anarchical.

What you're noticing is not the leading edge of set of harms brought about by asymmetric cryptography, but rather the late stage of adoption where the bad guys realize that their enemy's sword has had two edges all this time. Every technology that mediates an adversarial relationship goes through this eventually.

With the printing press came temporary freedom followed by intellectual property. So too with radios and the FCC. So too with social media. It's useless to blame the technology. Blame the people.

reply
ls612
58 minutes ago
[-]
My point is that as far as I understand (not a cryptography expert) once you have the mathematical concept of asymmetric cryptography you also have the mathematical concept of a certificate, so you can't have one without the other.
reply
amarant
5 hours ago
[-]
FFS, cryptography is not the problem. How many times will we have to shut down that particular stupidity? Asymmetric cryptography is a corner stone of basically all online secure communications, and has been since before Google and apple were even founded as companies! (First invented in 1970)

When did Https ever hurt you? That's built on asymmetric cryptography. Wherever you see the word "secure" it's basically shorthand for asymmetric cryptography.

Https

Ssh

Sftp

E2ee

It's asymmetric cryptography all the way.

reply
ls612
5 hours ago
[-]
Easy there I don’t want to take away your encrypted messaging. I’m just pointing out that the technology that enables it also enables the techno-totalitarianism we have been seeing rise since the mid 2010s
reply
amarant
4 hours ago
[-]
>Easy there I don’t want to take away your encrypted messaging

Then stop trying to take away the technology it's built on

reply
nullc
45 minutes ago
[-]
You're just not going far enough-- the dual use technology suppressing human liberty in this case isn't asymetric crypto, it's _computing_.
reply
krautburglar
1 hour ago
[-]
Exactly. The weapon is available to all, but only parasites like FAANG can afford to hire the best brains who know how to wield it. As Apple uses it to take a 30% cut of everything on their device, the “democratized” PGP features in mom’s mail client gather dust.
reply
nullc
46 minutes ago
[-]
you don't need asymmetric crypto to make remote attest like this.

Google can put a hmac key in each device which it knows and keeps secret. Device can author authenticated messages using it. Of course, only google can verify them-- but it appears that the workflow in this depends on google in any case and if anything that limitation would be more a feature to them than a bug.

reply
lpcvoid
5 hours ago
[-]
I disagree, I think you cast the net way too wide. Asymmetric cryptography enables secure communication in the first place. It's being used nefariously by Google and Apple, of course, but that's to be expected from big tech.
reply
rossjudson
5 hours ago
[-]
Nefariously how?
reply
microtonal
4 hours ago
[-]
Remote attestation also uses asymmetric cryptography. (Device-bound private key that can sign attestation challenges, a known public key that can verify that challenge was signed with the device-bound private key.)
reply
ls612
5 hours ago
[-]
Isn’t the ability to create certificates guaranteed conceptually once you have asymmetric crypto? In that case there is no intermediate technology which allows key exchanges without also creating digital totalitarianism.
reply
gibbsrich
4 hours ago
[-]
This was a wild ride, what an adventure. So many moving pieces, this really is just one big house of cards.
reply