One way
To avoid the Intel driver problems - use an AMD system instead !!!
Nearly three months after infosec biz Eclypsium highlighted widespread security weaknesses in third-party Windows hardware drivers, you can now add Intel to the list of vendors leaving holes in their all-powerful low-level code. In a follow-up report to its August DEF CON presentation, Eclypsium found that not only are those …
"In the meantime, users and admins are advised to protect themselves as best they can by avoiding software from untrusted sources and making sure their firmware and drivers are fully up-to-date and patched."
Says in the article this IS trusted software signed by MS. The cycle of flawed software > patch > Oops flawed software again > patch etc. is getting really hard to swallow day after day after day. Either the core tools that make these programs is flawed, the people who write this stuff are morons, or deliberate holes are being created by unknown actors for back door access. None of those options is assuring.
Whenever I see "Trusted Installer" in the process list, I shiver. I don't fekking trust it. They have abused my trust too often to put that title on a process and not have me laughing until I cry. Control over our personal computers and devices is slipping daily and it will not end well.
To quote from one report "Too many trusted Windows 10 peripheral drivers, ... are riddled with exploitable security vulnerabilities"
Peripheral drivers. Intel network cards, wireless, Bluetooth etc. Not just the motherboard, and perhaps not the processor chipset at all.
Still pwned dude.
As was noted in that DEF CON presentation by Jesse Michael and Mickey Shkatov, vulnerabilities in drivers are a huge risk because the code typically runs at the lowest levels in an operating system, has access to peripherals, storage, and applications, and thus if exploited, will grant miscreants total control over a machine. The drivers are also signed off by Microsoft and are therefore trusted by the operating system.
In one of their Scooby-Doo raids in the past to keep out BSDs, Linux etc. etc., didn't poor old Microsoft call this sort of thing, 'Trusted Computing' ?
And a country with a "ministry of justice" or "justice department" has no justice.
The pattern is clear.
Much the same holds good in business. Here in the UK, it is generally understood that any new housing development called "Lakeside" is out of sight of open water, and a place called "the Coppice" is entirely treeless.
Judging by a photo of a building site where a new housing estate is going up near Doncaster, anyone who bought "off plan" may be regretting it now. I suspect they may have problems selling those new houses. The builders need waders, not wellies to work there.
"In the same way a country with democratic in its named is not democratic"
Next you'll be telling me the Democratic People's Republic of Korea isn't really Democratic. They have elections you know? There's only one name on the ballot, but still, it's an election none-the-less.
"In one of their Scooby-Doo raids in the past to keep out BSDs, Linux etc. etc., didn't poor old Microsoft call this sort of thing, 'Trusted Computing' ?"
Trusted Computing includes many things, not just the TPM part. Trusted Computing Group was formed by AMD, Intel, MS, HP and IBM (according to Wikipedia). Are you sure they're not all conspiring against 'BSD, Linux etc. etc.'?
I remember conspiracy theories how TPM chip was going to end Linux usage. Obviously didn't happen, but people here still are scared by with its magic sauce. Just like AMD and Intel are not open yet everyone are using them without a second thought.
The same arguments with TPM were (re-)used with ACPI (Linux support was patchy when introduced), UEFI (same) and Secure Boot as well. I don't think any of those affected Linux usage at all since ACPI computers still had APM, BIOS support is/was still there and Secure Boot can be toggled on/off, and it was toggled off many times because people and companies wanted to run Win7 instead of Win8.
TPM is actually banned in Russia. I have a feeling that's because they suspect TPM can be used to remotely brick the computers of a foreign power should the US government decide so to do.
You may think their suspicions are valid, I couldn't possibly comment.
Are you sure they're not all conspiring against 'BSD, Linux etc. etc.'?
They are all conspiring against us, the computer owners.
All of those features like secure boot can be useful and helpful, but also very simple to deploy against the end user's freedom to do as they want with the machine. Can you boot your choice of OS on any of MS' ARM-based tablets yet, you know the ones that MS no longer support?
Also the key issue of UEFI is it is so fsking complex it is bound to have bugs, probably due to adding all the code for "easier use" (compared to text-mode BIOS interfaces). Add to that the secretive God-mode engine management sort of blobs lurking deep in your system and anyone who really cares about privacy or security is bound to be worried.
A signed driver just ensures it's from what it says it is - if it's an Intel driver you know it's the original Intel driver and not something else. But it's not a quality assurance.
WHQL drivers may undergo more extensive testing for functional quality, but I doubt they are tested for security.
It's not different from a Linux package signature - it only ensures where the code is from, not that it is bug free and doesn't contain vulnerabilities.
"WHQL drivers may undergo more extensive testing for functional quality, but I doubt they are tested for security."
I'm assuming the drivers in question are WHQL approved due to being a backdoor into Windows.
If the story was "WHQL drivers focus on stability instead of security - this needs to change" I suspect we would have had more understanding and less confusion about what to expect from drivers.
No third-party assessment << third-party assessment and testing << secure drivers