Hacker News new | past | comments | ask | show | jobs | submit login

https://www.theverge.com/2024/8/15/24221151/google-pixel-sho...

  “This was very deleterious of trust, to have third-party, unvetted insecure software on it,” Dane Stuckey, Palantir’s chief information security officer, told The Washington Post. “We have no idea how it got there, so we made the decision to effectively ban Androids internally.”

  “It’s really quite troubling. Pixels are meant to be clean,” Stuckey, of Palantir, told the Post. “There is a bunch of defense stuff built on Pixel phones.”
Pixel phones have AVF/pKVM, which can be used to isolate security-sensitive workloads in a separate VM, https://source.android.com/docs/core/virtualization/architec...



interesting, though i don't think that isolating sensitive stuff in a vm is a reasonable security strategy if we are talking about low-level compromise of the entire architecture, or did you want to rationalize the usage for "defense stuff"?


If sensitive data is isolated in an EL1 pKVM VM, it is protected from compromise of host OS that is also at EL1, thanks to hypervisor at EL2.


that's a matter of terminology.

i'd argue that what you describe as "host" is rather a management vm which is allowed to talk directly to the hypervisor. though, through this privilege is most likely able to compromise it and all other guests.

but this doesn't really matter as the attack vector we are talking about already has dma and does not care about any of that.


It's kind of wild that Palantir would ban Android phones when this was software installed by Verizon. If Apple had installed disabled-but-insecure software on iOS, would it even be discoverable?


If the underlying OS has a remote access vulnerability wouldn't that compromise every VM OS running on top?


> wouldn't that compromise every VM OS running on top?

pKVM VMs run "on the side" rather than "on top" of the host OS, so any compromise of the host is isolated from guests, besides DoS.


This vulnerability isn't with the underlying OS though. They just installed a disabled application that has security concerns, but someone has to manually enable it for it to be a problem.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: