Simon Hobson writes:
Isn't it the bootloader that UEFI loads and runs, and as long as the bootloader (Grub) is signed, then UEFI should boot it and grub can boot anything you want. Kind of blasts the argument that secure boot is either essential or secure out of the water when you can sign one bit of "insecure"* code and have it load anything.

I wonder if you misunderstand, perhaps...

I have a linux laptop with data you shouldn't access. You may assume it's sensibly configured (secure boot, luks, etc, but standard hardware, no epoxy). Can you explain to me how you would evade its security? I'm not interested in how I could misconfigure it, because I'm not worried about attacks by myself. Assuming I configured it sensibly, how would you either access the data or install password-sniffing software?

Arnt

_______________________________________________
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng

Reply via email to