|My $169 development Chromebook|
|By Thom Holwerda on 2017-07-28 19:44:59|
In the last year while talking to respected security-focused engineers & developers, I've come to fully appreciate Google's Chrome OS design. The architecture benefited from a modern view of threat modeling and real-world attacks. For example, Trusted Platform Module (TPM) hardware chips are built into every Chromebook and deeply incorporated into the OS. The design documents go into some detail on the specific protections that TPM provides, particularly around critical encryption functions.
I also learned that Chromebook is the daily driver for many of Google's own senior developers and security engineers. In short, the combination of the underlying Chromebook hardware with the OS architecture makes for a pretty compelling secure development environment.
It's pretty neat to consider the possibility of pre-travel "power washing" (resetting everything clean to factory settings) on an inexpensive Chromebook and later securely restore over the air once at my destination. Since there is a wide range in Chromebook prices, the engineering challenge here was to find something powerful enough to comfortably use exclusively for several days of coding, writing, and presenting, but also cheap enough that should it get lost/stolen/damaged, I wouldn't lose too much sleep. The threat model here does not include recovery from physical tampering; if the machine were somehow confiscated or otherwise out of my custody, I could treat it as a burner and move on.
Interesting guide on how to turn an inexpensive Chromebook into a burner developer device safe for international travel.
- Ambitious browser mitigation for Spectre attacks comes to Chrome - 2018-07-12
- Google downranks 65000 pirate sites in search results - 2018-06-30
- Talking to Duplex: Google's phone AI feels revolutionary - 2018-06-27
- 'Machina' brings support for running Linux on top of Fuchsia - 2018-06-22
- More related articles