10

With the recent news that Dell installed a root certificate with a publicly accessible private key on their notebooks, I'm wondering how I can protect myself against this kind of incompetence. Of course I can't fully protect myself against actually malicious attacks by the vendor if I execute their binaries, but I would like to be notified if any program installs a root certificate that compromises my security.

Doing a clean Windows installation is something I do anyway, but as far as I know this wouldn't help in this case as the certificate was added by Dell software. And I probably need to install at least some Dell software for the drivers. I'd also like to prevent certificates from other sources to be installed without my knowledge.

Is there an easy way to verify if any root certificates are installed that aren't the default ones that come with Windows?

Mad Scientist
  • 891
  • 7
  • 20

1 Answers1

3

There isn't a completely sure way.

The best option I can think of is to check the certificate store before and after running software installs. If a new root CA is installed, consider your computer compromised, publicly post about the issue, and reformat.

There is inherently a lot of trust involved in installing software as the installer is given fairly broad rights on your system. Post-install app usage is not such a concern unless the app systemically uses UAC elevation to gain superuser privileges.

This is a very old problem. Ken Thompson's Turing Award Lecture Reflections on Trusting Trust was back in the ever appropriate year of 1984.

Alain O'Dea
  • 1,635
  • 9
  • 13