Another Reason to Boycott UEFI: Back Doors or Crackers
- Dr. Roy Schestowitz
- 2015-03-25 08:39:29 UTC
- Modified: 2015-03-25 08:39:29 UTC
Summary: UEFI makes computers more prone to infections, according to some security experts
THE abusive Intel spreads UEFI to help the abusive Microsoft by means of lockout (there have been many articles about that as of late). It serves to protect the Windows monopoly and protect Intel's monopoly (with UEFI patents that we highlighted previously). Our posts about UEFI contain a lot of examples of that. UEFI 'secure' boot is not really about security and in some ways it makes security even worse, as we showed on numerous occasions before. UEFI can enable espionage agencies (such as GCHQ, NSA and so on) to remotely brick PCs, rendering them unbootable (no matter the operating system). Remember Stuxnet.
There are several new reports which say that UEFI has got additional ways in which it makes computers
less secure. To quote the
British media: "The high amount of code reuse across UEFI BIOSes means that BIOS infection can be automatic and reliable."
To quote some
US media: "Though such "voodoo" hacking will likely remain a tool in the arsenal of intelligence and military agencies, it's getting easier, Kallenberg and Kovah believe. This is in part due to the widespread adoption of UEFI, a framework that makes it easier for the vendors along the manufacturing chain to add modules and tinker with the code."
Next time Intel or Microsoft insist that UEFI is needed for 'security' we should have stronger arguments with which to debunk such myths. It's marketing of monopolies disguised as "advancement".
⬆