How about the malware authors just use fedora's or linux foundation's shim bootloader to run their malware?
Then: microsoft revokes the keys to those bootloaders, and thousands of people's linux computers simultaneously say "I can't let you do that, Dave" and stop working.
(How does UEFI get information about revoked keys anyway? Does it contact some website to look for instructions about keys without user approval? If so, it sounds suspiciously like Palladium in new clothes... an outside entity can, at any time, shut down your computer at will. How is that not scaring people shitless?)
Then: microsoft revokes the keys to those bootloaders, and thousands of people's linux computers simultaneously say "I can't let you do that, Dave" and stop working.
(How does UEFI get information about revoked keys anyway? Does it contact some website to look for instructions about keys without user approval? If so, it sounds suspiciously like Palladium in new clothes... an outside entity can, at any time, shut down your computer at will. How is that not scaring people shitless?)
Comment