logoalt Hacker News

gzreadyesterday at 6:10 PM2 repliesview on HN

Only if I get to set the keys or no keys - under all circumstances.

There should be a physical button inside the case labeled "set up secure boot"


Replies

torginusyesterday at 11:44 PM

Just like with HTTPS, you can enrol your own keys in the TPM module, or sign your binaries with a key thats already trusted by your system.

This is just establishing chain of trust, and does not prevent you from doing anything on your system.

True, this could be hypothetically extended to disallow booting third party binaries, but I would say that's just extrapolation for now and not reality.

ShowalkKamayesterday at 10:35 PM

under the doctrine that software "trust" is needed YOU are the attacker. It's entirely about stripping your control (thus ownership) from the hardware you paid for (see the safetynet shitshow).

show 1 reply