"This Morning Might Turn Out to be an Interesting One for System Admins Who Haven't Updated Their Devices' Secure Boot Certificate" (If They Reboot)
Stating the obvious (some report issues already):
As noted yesterday, there's also a new paper (published a day earlier) about how Secure Boot does not improve security. "BYOVD, but in firmware. Signed UEFI shells, vulnerable modules offer new paths for Secure Boot bypasses."
As an upcoming event put it last night: "Binarly researchers Alex Matrosov and Fabio Pagani returns with 'Signed and Dangerous: BYOVD Attacks on Secure Boot', the first large-scale census of signed UEFI modules, revealing dozens of new bypasses, live Secure Boot exploits":
Who asked for this anyway? Microsoft asked itself (Microsoft)?
"Also had to disable secure boot otherwise the Nvidia drivers wouldn't work. Is this normal?" someone asked in relation to Linux a few hours ago. 2 hours ago someone else said about Linux Mint (LM): "You're screwed. LM won't behave properly with SecureBoot enabled to begin with. Worse, you bought a ThinkPad blind. As all of r/ThinkPad will tell you, never buy a ThinkPad blind. You never know if there's a BIOS/Supervisor password locking you out of the guts of the machine. Your only recourse now is to either contact the seller and get that password, or initiate a return/refund on the grounds that you weren't given what you paid for."
Yeah... "security"... █


