LSS: Secure Boot
LSS: Secure Boot
Posted Sep 13, 2012 7:38 UTC (Thu) by skitching (guest, #36856)Parent article: LSS: Secure Boot
And how will this affect WUBI, where the Microsoft bootloader is used to boot into Linux? That approach is specifically targeted at non-technical Windows users, ie those least likely to disable secure boot in the firmware.
What are the implications if secure boot is disabled in the firmware, then Windows is booted? Will windows refuse to run (or some programs, eg Microsoft's Genuine Windows validation checks)? If so, can a custom bootloader be used to "lie" to windows about secure-boot being enabled when it actually is not?
Posted Sep 13, 2012 13:29 UTC (Thu)
by pjones (subscriber, #31722)
[Link] (8 responses)
Posted Sep 13, 2012 14:44 UTC (Thu)
by robertm (subscriber, #20200)
[Link] (7 responses)
Posted Sep 13, 2012 17:48 UTC (Thu)
by pjones (subscriber, #31722)
[Link] (3 responses)
Posted Sep 13, 2012 18:23 UTC (Thu)
by hummassa (subscriber, #307)
[Link] (2 responses)
IOW: NOTHING will, in the end, impede malware to install bootkits/jailbreaks. :-D
This way, people are doing all this work to appease Microsoft, under risk of making people think that Secure Boot (TM) is actually secure, which will after all DIMINISH the security status of potential-botnet-drones around the world. Ah, let's not forget the privacy/liberty implications. Hmm...
Posted Sep 13, 2012 19:04 UTC (Thu)
by pjones (subscriber, #31722)
[Link] (1 responses)
Posted Sep 13, 2012 23:51 UTC (Thu)
by hummassa (subscriber, #307)
[Link]
You know, you kind of proved my point. There is NO added security, because you can always find another vulnerability in the kernel, and use that to escalate past the bootloader (like creating crafted restore-from-hibernation images) and people will act under the illusion that their systems have "added security" when they aren't, which, as I mentioned, diminishes the overall security. For instance, the crafted restore image could allow running unsigned or signed-by-the-malware-author executables or substitute key libraries.
And again, that is my point: "Secure Boot" == "fake security", which is far worse than "no security".
And worse yet: "Secure Boot" == "you are running a signed O.S. (with Defective by Design implications and I Can Phone Home and invade your privacy implications)" OR "you are running a signed (bla bla) but COMPROMISED by malware O.S."...
Posted Sep 14, 2012 12:05 UTC (Fri)
by jeroen (guest, #12372)
[Link] (2 responses)
Posted Sep 14, 2012 14:49 UTC (Fri)
by BenHutchings (subscriber, #37955)
[Link] (1 responses)
Posted Sep 14, 2012 20:50 UTC (Fri)
by idupree (guest, #71169)
[Link]
LSS: Secure Boot
Hey look at that, more features gone in this rush to bend over backwards to accommodate Microsoft's anti-software-freedom initiative.
LSS: Secure Boot
LSS: Secure Boot
LSS: Secure Boot
LSS: Secure Boot
LSS: Secure Boot
LSS: Secure Boot
LSS: Secure Boot
LSS: Secure Boot