No signed kernel, just a signed boot loader
Posted Jun 25, 2012 23:22 UTC (Mon) by dashesy
In reply to: No signed kernel, just a signed boot loader
Parent article: Details on Ubuntu's UEFI secure boot plan
I am assuming Malware is running under a legitimate Linux kernel (with no bugs) messing with Windows partition with full access right. So something like DISABLE_INTEGRITY_CHECKS in boot.ini no longer works on Windows 8? Also root can no longer use CertMgr to add custom certificate for custom signed drivers?
My point is that, with the complexity of NT, by having root access to those bits and bytes the attack surface is so tremendous there is probably no need to have an unsigned Linux kernel
to post comments)