• 1 Post
  • 150 Comments
Joined 11 months ago
cake
Cake day: June 3rd, 2025

help-circle






  • I think the OP is suggesting that Windows OS has been/is a loss leader for Microsoft.

    (Akin to Costco selling hot dogs for cheap)

    The Microsoft playbook was “make windows accessible, then use it as a platform to up sell Office, Exchange, etc”.

    Now with their shift and focus into the cloud and cloud subscriptions. All the users need is a web browser and a dumb terminal: they don’t have to run windows anymore.

    Thus, Microsoft’s investment in Windows and developing and cough testing cough a platform that will never be profitable is only costing MS money.

    And in order to try to gain some net profit from Windows, they’re turning it into the GeoCities of ad-ridden Operating Systems.











  • They’re two sides of the same coin. Can’t have privacy without security and can’t have security without privacy.

    Hmmm… I half agree with what you said. The corner stone of most security is an element of initial trust.

    With SSL, we’re trusting that the certificate authority is valid.

    With tools like GPG, I (as the sender) are trusting that the key I’m using to sign a message is really yours.

    With Android we (the users) and the application developers are trusting Google (hence why “sideloading” is now “bad”, because Google says it is).

    I absolutely agree that privacy cannot exist without security. But, your privacy is dependent on who your security model trusts.

    I don’t trust Google with my privacy (hence, I degoogle) , but my bank app doesn’t trust my security (hence, the app can only be installed via Google Play).

    So, privacy is dependent on security, but security is built on trust.


  • To expand on this a bit:

    It’s all built on top of the concept of “a chain of trust”, starting at the hardware level.

    (as mentioned) TPM is a chip that’ll store encryption keys at a hardware level and retrieval of these keys can only happen if the hardware is unmodified.

    I assume that part of this key is derived from aspects of your OS (ie: all device drivers are signed by MS).

    The OS will fetch this key, if it’s valid - the OS knows that the hardware is untampered, it can then verify that the OS is unmodified, which can then be used by application to determine that their not modified, etc.

    Now you could spoof your own TPM chip (similar to how Switch 1’s are chipped/nodded), but the deal-breaker is that when you add your key to the TPM chip, you sign it with a hardware vendor specific public key. And that vendor private key is baked into the hardware (often into the CPU, so the private key never crosses the hardware bus).