Originally posted by chithanh
View Post
Announcement
Collapse
No announcement yet.
Secure Boot Isn't So Secure After All: The Golden Key Is Out
Collapse
X
-
Originally posted by chuckula View PostWell when secureboot first came out it was accused of being some giant conspiracy to stop PCs from ever running Linux.
5 years later and dozens of easy successful Linux installs later [long before this hack was announced], that was obviously wrong.
As for preventing boot-level malware, well the vast majority of malware has no need to ever get that low-level in the first place, so we're not really any less secure in the real-world than before secureboot showed up.
In other news, I'd greatly like to see secureboot put onto every Android device in existence. I'd like the so-called "open" Android platform to be just as locked down as all those evil Microsoft PCs so I can actually put a real Linux distribution on it just like the supposedly "locked down" PCs.
Some laptop's secureboots are buggy as hell, and it took me several days to figure out what the hell the problem is. It's not a success story no matter how you look at it.
Now, I compile kernels myself for my PC. I am ZERO interested in messing with secure boot. End of story.
Leave a comment:
-
That's incorrect. Often you only need to set a password to disable Secure Boot.
Leave a comment:
-
Originally posted by chuckula View PostHrmmmm.... ways that I know your repeated posts are all wrong:
1. Linux installs just fine.
2. You cited zdnet as "proof" of your assertions. Automatic admission that you're wrong.
1b. Ubuntu and other distros (Fedora) paid microsoft to get their own key, so yeah, they work fine even with Secureboot. But that's an issue for others.
- Likes 1
Leave a comment:
-
Originally posted by chithanh View PostTegra 3 with 10" 1366x768 screen? Not what I would call awesome.
I guess what I meant was it is awesome as far as "open" ARM tablets go. Not only are there very few open ARM tablets in the wild (does anyone else find this really weird?) but those that do exist are very low spec prototype or test devices.
- Likes 1
Leave a comment:
-
Originally posted by chuckula View Post
Hrmmmm.... ways that I know your repeated posts are all wrong:
1. Linux installs just fine.
2. You cited zdnet as "proof" of your assertions. Automatic admission that you're wrong.
1.Just because someone found a way around secure boot that does not mean that they did not intend to lock other operating systems out.
2.You can also find the Free Software Foundation referring secure boot as restricted boot.
3.Unlike you i don't just listen and believe.
- Likes 3
Leave a comment:
-
Originally posted by RealNC View PostActually it references the cracking scene. Cracked games had a "cracktro" like this one.
There's also widely spread opinions about from when a crack-intro should be included in the demoscene.
I'm not saying your wrong only that it's more of an potato potahto argument.
Leave a comment:
-
Originally posted by GreenFireFly View Post
Hrmmmm.... ways that I know your repeated posts are all wrong:
1. Linux installs just fine.
2. You cited zdnet as "proof" of your assertions. Automatic admission that you're wrong.
Leave a comment:
-
Conspiracy Fact! Secure Boot was meant to stop you from installing other operating systems. This two paragraphs are from microsoft-secure-boot-key debacle.
The design flaw in the Windows operating system can be used to unlock Windows devices, including smartphones and tablets, which are otherwise protected by Secure Boot in order to run operating systems other than Windows on locked down systems.
This, in turn, allows someone with admin rights or an attacker with physical access to a machine not only to bypass Secure Boot and run any operating system they wish, such as Linux or Android, but also permits the installation and execution of bootkit and rootkits at the deepest level of the device, security researchers MY123 and Slipstream revealed in a blog post on Tuesday.
The full article can be found here.
Leave a comment:
-
Originally posted by chuckula View PostWell when secureboot first came out it was accused of being some giant conspiracy to stop PCs from ever running Linux.
5 years later and dozens of easy successful Linux installs later [long before this hack was announced], that was obviously wrong.
As for preventing boot-level malware, well the vast majority of malware has no need to ever get that low-level in the first place, so we're not really any less secure in the real-world than before secureboot showed up.
In other news, I'd greatly like to see secureboot put onto every Android device in existence. I'd like the so-called "open" Android platform to be just as locked down as all those evil Microsoft PCs so I can actually put a real Linux distribution on it just like the supposedly "locked down" PCs.
The design flaw in the Windows operating system can be used to unlock Windows devices, including smartphones and tablets, which are otherwise protected by Secure Boot in order to run operating systems other than Windows on locked down systems.
This, in turn, allows someone with admin rights or an attacker with physical access to a machine not only to bypass Secure Boot and run any operating system they wish, such as Linux or Android, but also permits the installation and execution of bootkit and rootkits at the deepest level of the device, security researchers MY123 and Slipstream revealed in a blog post on Tuesday.
The full article can be found here.
Leave a comment:
Leave a comment: