101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

487
active users

#secureboot

4 posts4 participants0 posts today
IT News<p>This Week in Security: Sharepoint, Initramfs, and More - There was a disturbance in the enterprise security world, and it started with a Pw... - <a href="https://hackaday.com/2025/07/25/this-week-in-security-sharepoint-initramfs-and-more/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/07/25/this-w</span><span class="invisible">eek-in-security-sharepoint-initramfs-and-more/</span></a> <a href="https://schleuss.online/tags/thisweekinsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>thisweekinsecurity</span></a> <a href="https://schleuss.online/tags/hackadaycolumns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackadaycolumns</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/secureboot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>secureboot</span></a> <a href="https://schleuss.online/tags/sharepoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sharepoint</span></a> <a href="https://schleuss.online/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a></p>
#cryptohagen<p>Microsoft has a signing key that many <a href="https://social.data.coop/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> distributions use to support <a href="https://social.data.coop/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureBoot</span></a>, and that key expire on September 11, 2025</p><p>A replacement key has existed since 2023, but apparently - many systems don’t support it yet</p><p>Fixing this problem requires firmware updates from original equipment manufacturers (OEM) but there is a risk that not all OEMs will issue updates - especially those for older, or less popular devices<br><a href="https://www.techradar.com/pro/security/linux-users-are-about-to-face-another-major-microsoft-secure-boot-issue" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">techradar.com/pro/security/lin</span><span class="invisible">ux-users-are-about-to-face-another-major-microsoft-secure-boot-issue</span></a></p>
Larvitz :fedora: :redhat:<p>Some Linux users might be interested, reading about this (Subscriber link, that bypasses the Paywall, since I find this information important to spread for awareness): </p><p><a href="https://lwn.net/SubscriberLink/1029767/0a550f0972703141/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">lwn.net/SubscriberLink/1029767</span><span class="invisible">/0a550f0972703141/</span></a> </p><p>„Linux users who have Secure Boot enabled on their systems knowingly or unknowingly rely on a key from Microsoft that is set to expire in September. After that point, Microsoft will no longer use that key to sign the shim first-stage UEFI bootloader that is used by Linux distributions to boot the kernel with Secure Boot. But the replacement key, which has been available since 2023, may not be installed on many systems; worse yet, it may require the hardware vendor to issue an update for the system firmware, which may or may not happen.“</p><p><a href="https://burningboard.net/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://burningboard.net/tags/secureboot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>secureboot</span></a> <a href="https://burningboard.net/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a> <a href="https://burningboard.net/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://burningboard.net/tags/servicetweet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>servicetweet</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Gigabyte" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Gigabyte</span></a> motherboards vulnerable to <a href="https://mastodon.thenewoil.org/tags/UEFI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UEFI</span></a> <a href="https://mastodon.thenewoil.org/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> bypassing <a href="https://mastodon.thenewoil.org/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureBoot</span></a></p><p><a href="https://www.bleepingcomputer.com/news/security/gigabyte-motherboards-vulnerable-to-uefi-malware-bypassing-secure-boot/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/gigabyte-motherboards-vulnerable-to-uefi-malware-bypassing-secure-boot/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/mobo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mobo</span></a> <a href="https://mastodon.thenewoil.org/tags/motherboard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>motherboard</span></a></p>
AskUbuntu<p>KVM/libvirt error with ubuntu cloud image when secureboot enabled <a href="https://ubuntu.social/tags/uefi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>uefi</span></a> <a href="https://ubuntu.social/tags/virtualization" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>virtualization</span></a> <a href="https://ubuntu.social/tags/secureboot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>secureboot</span></a> <a href="https://ubuntu.social/tags/cloudinit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudinit</span></a> <a href="https://ubuntu.social/tags/libvirt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>libvirt</span></a></p><p><a href="https://askubuntu.com/q/1552683/612" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">askubuntu.com/q/1552683/612</span><span class="invisible"></span></a></p>
AskUbuntu<p>Enrolling MOK with safe boot disabled <a href="https://ubuntu.social/tags/boot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>boot</span></a> <a href="https://ubuntu.social/tags/secureboot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>secureboot</span></a></p><p><a href="https://askubuntu.com/q/1552691/612" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">askubuntu.com/q/1552691/612</span><span class="invisible"></span></a></p>
Anarchadyksabled / Anarchodéglingouinax<p>Coucou,</p><p>j'ai récup à la poubelle un hp élite d'entreprise sous windows 11, que j'aimerais évidemment passer sur debian, sauf qu'il y a un mot de passe sur le bios qui m'empêche d'y accéder, et vu que j'ai récup l'ordi à la schlague je peux pas contacter le constructeur. Le bios est uniquement accessible via windows, c'est protégé via hp secure boot.</p><p>Quelles pistes pour virer le mot de passe et booter sur ma clé d'installation la linuxteam ?</p><p>J'ai vu la possibilité de démonter l'ordi et enlever la batterie de la carte mère mais j'ai vu des avis divergents sur cette technique.</p><p><a href="https://corneill.es/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://corneill.es/tags/Debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Debian</span></a> <a href="https://corneill.es/tags/BIOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BIOS</span></a> <a href="https://corneill.es/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureBoot</span></a> <a href="https://corneill.es/tags/LibreTips" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LibreTips</span></a></p>
AskUbuntu<p>dual boot entry not visible for ubuntu 24.04 with full disk encryption &amp; Windows 11 with bitlocker, uefi, and secureboot <a href="https://ubuntu.social/tags/dualboot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dualboot</span></a> <a href="https://ubuntu.social/tags/uefi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>uefi</span></a> <a href="https://ubuntu.social/tags/luks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>luks</span></a> <a href="https://ubuntu.social/tags/secureboot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>secureboot</span></a> <a href="https://ubuntu.social/tags/bitlocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bitlocker</span></a></p><p><a href="https://askubuntu.com/q/1552530/612" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">askubuntu.com/q/1552530/612</span><span class="invisible"></span></a></p>
Linux Guides<p>Wollt Ihr euren Rechner vor unerlaubtem Zugriff schützen, ist die Festplattenverschlüsselung um einiges effektiver.<br>Solange Ihr bspw. kein Journalist in einem falschen Land/etc. seid, ist SecureBoot meines Erachtens sowieso nicht nützlich. Und wenn doch, dann seid Ihr mit Tails-Linux besser dran :)</p><p><a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://mastodon.social/tags/secureboot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>secureboot</span></a> </p><p>(2/2)</p>
Geekland<p>Ubuntu Security ‘Oversight’ Lets Attackers Access Encrypted Systems <a href="https://mastodon.social/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a> <a href="https://mastodon.social/tags/dracut" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dracut</span></a> <a href="https://mastodon.social/tags/secureboot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>secureboot</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/zfs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zfs</span></a><br><a href="https://www.omgubuntu.co.uk/2025/07/ubuntu-security-initramfs-bypass-encryption" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">omgubuntu.co.uk/2025/07/ubuntu</span><span class="invisible">-security-initramfs-bypass-encryption</span></a></p>
heise online English<p>Prepare for an impact: Microsoft warns of secure boot certificate update</p><p>"Prepare for the first global, large-scale secure boot certificate update," warns Microsoft. Not only Windows is affected.</p><p><a href="https://www.heise.de/en/news/Prepare-for-an-impact-Microsoft-warns-of-secure-boot-certificate-update-10462433.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Prepare-for-a</span><span class="invisible">n-impact-Microsoft-warns-of-secure-boot-certificate-update-10462433.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://social.heise.de/tags/macOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macOS</span></a> <a href="https://social.heise.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.heise.de/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureBoot</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
heise Security<p>Vorbereiten auf Einschlag: Microsoft warnt vor Secure-Boot-Zertifikat-Update</p><p>"Bereite dich auf das erste globale, großflächige Secure-Boot-Zertifikat-Update vor", warnt Microsoft. Nicht nur Windows ist betroffen.</p><p><a href="https://www.heise.de/news/Vorbereiten-auf-Einschlag-Microsoft-warnt-vor-Secure-Boot-Zertifikat-Update-10461866.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Vorbereiten-auf-</span><span class="invisible">Einschlag-Microsoft-warnt-vor-Secure-Boot-Zertifikat-Update-10461866.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://social.heise.de/tags/macOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macOS</span></a> <a href="https://social.heise.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.heise.de/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureBoot</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a> <span class="h-card" translate="no"><a href="https://feddit.org/c/de_edv" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>de_edv</span></a></span></p>
The New Oil<p>Found in the wild: 2 <a href="https://mastodon.thenewoil.org/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureBoot</span></a> exploits. <a href="https://mastodon.thenewoil.org/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> is patching only 1 of them.</p><p><a href="https://arstechnica.com/security/2025/06/unearthed-in-the-wild-2-secure-boot-exploits-microsoft-patches-only-1-of-them/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">06/unearthed-in-the-wild-2-secure-boot-exploits-microsoft-patches-only-1-of-them/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
openSUSE Linux<p>Unified <a href="https://fosstodon.org/tags/Kernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kernel</span></a> Images in <a href="https://fosstodon.org/tags/openSUSE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openSUSE</span></a>: stronger boot, simplified structure. 🔐 Register for the <a href="https://fosstodon.org/tags/openSUSE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openSUSE</span></a> Conference and <a href="https://fosstodon.org/tags/learn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>learn</span></a> more. <a href="https://fosstodon.org/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureBoot</span></a> <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://events.opensuse.org/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">events.opensuse.org/</span><span class="invisible"></span></a></p>
Marco Ivaldi<p><a href="https://infosec.exchange/tags/Hydroph0bia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hydroph0bia</span></a> (CVE-2025-4275) - a trivial <a href="https://infosec.exchange/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureBoot</span></a> bypass for UEFI-compatible firmware based on Insyde <a href="https://infosec.exchange/tags/H2O" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>H2O</span></a>, part 1</p><p><a href="https://coderush.me/hydroph0bia-part1/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">coderush.me/hydroph0bia-part1/</span><span class="invisible"></span></a></p>
ADMIN magazine<p>With a focus on usability, <span class="h-card" translate="no"><a href="https://fosstodon.org/@almalinux" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>almalinux</span></a></span> OS 10 has been released<br><a href="https://www.admin-magazine.com/News/AlmaLinux-OS-10-Released?utm_source=mam" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">admin-magazine.com/News/AlmaLi</span><span class="invisible">nux-OS-10-Released?utm_source=mam</span></a><br><a href="https://hachyderm.io/tags/EnterpriseLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EnterpriseLinux</span></a> <a href="https://hachyderm.io/tags/AlmaLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AlmaLinux</span></a> <a href="https://hachyderm.io/tags/RHEL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RHEL</span></a> <a href="https://hachyderm.io/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://hachyderm.io/tags/OpenSSH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSSH</span></a> <a href="https://hachyderm.io/tags/sudo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sudo</span></a> <a href="https://hachyderm.io/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureBoot</span></a></p>
knoppix<p><a href="https://mastodon.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> has fixed the dual-booting bug affecting Windows and Linux with patch KB5058385, released nine months after the issue was reported.</p><p>This update prevents legitimate Linux bootloaders from being blocked.</p><p>However, the long delay raises concerns about Microsoft's commitment to niche user needs.</p><p>Will they prioritize core features over essential fixes for dual-boot users?</p><p><a href="https://news.itsfoss.com/microsoft-fixes-linux-dual-boot/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.itsfoss.com/microsoft-fix</span><span class="invisible">es-linux-dual-boot/</span></a></p><p><a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://mastodon.social/tags/Freedom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Freedom</span></a> <a href="https://mastodon.social/tags/FreeSoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeSoftware</span></a> <a href="https://mastodon.social/tags/Boot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Boot</span></a> <a href="https://mastodon.social/tags/DualBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DualBoot</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureBoot</span></a> <a href="https://mastodon.social/tags/TechNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechNews</span></a></p>
heise online English<p>Bootloader gap: Many Linux distributions are at risk</p><p>There is a security gap in the bootloader shim, which also allows secure booting for non-Windows operating systems.</p><p><a href="https://www.heise.de/en/news/Bootloader-gap-Many-Linux-distributions-are-at-risk-10365757.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Bootloader-ga</span><span class="invisible">p-Many-Linux-distributions-are-at-risk-10365757.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://social.heise.de/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://social.heise.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.heise.de/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureBoot</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
argv minus one<p><span class="h-card"><a href="https://mastodon.social/@techhelpkb" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>techhelpkb</span></a></span> </p><p>TL;DR: <a href="https://mastodon.sdf.org/tags/GRUB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GRUB</span></a> assumes that the file system is valid, and might execute arbitrary code if it isn't.</p><p>That is a perfectly valid assumption…or it would be if <a href="https://mastodon.sdf.org/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> wasn't still trying to ice-skate uphill by pushing <a href="https://mastodon.sdf.org/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureBoot</span></a>.</p><p>News flash, Microsoft: Secure Boot is only secure if the <a href="https://mastodon.sdf.org/tags/BIOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BIOS</span></a> is secure, and I'm sorry to break it to you but that is absolutely hopeless.</p><p><a href="https://mastodon.sdf.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
heise online English<p>FAQ: The secure boot disaster</p><p>The security problems of Secure Boot and Microsoft's – sometimes absurd – plans to fix them are causing a lot of uncertainty. We answer your questions.</p><p><a href="https://www.heise.de/en/guide/FAQ-The-secure-boot-disaster-9751994.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/guide/FAQ-The-secu</span><span class="invisible">re-boot-disaster-9751994.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/BIOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BIOS</span></a> <a href="https://social.heise.de/tags/Firmware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firmware</span></a> <a href="https://social.heise.de/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureBoot</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/UEFI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UEFI</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>