this post was submitted on 26 Jul 2024
24 points (90.0% liked)

Technology

34778 readers
99 users here now

This is the official technology community of Lemmy.ml for all news related to creation and use of technology, and to facilitate civil, meaningful discussion around it.


Ask in DM before posting product reviews or ads. All such posts otherwise are subject to removal.


Rules:

1: All Lemmy rules apply

2: Do not post low effort posts

3: NEVER post naziped*gore stuff

4: Always post article URLs or their archived version URLs as sources, NOT screenshots. Help the blind users.

5: personal rants of Big Tech CEOs like Elon Musk are unwelcome (does not include posts about their companies affecting wide range of people)

6: no advertisement posts unless verified as legitimate and non-exploitative/non-consumerist

7: crypto related posts, unless essential, are disallowed

founded 5 years ago
MODERATORS
top 5 comments
sorted by: hot top controversial new old
[–] [email protected] 11 points 3 months ago (1 children)

I have yet to see a good implementation of Secure Boot, and that's just from a user interface standpoint.

How can I check which keys are installed in the EFI/BIOS UI? And then delete a specific key? I only ever saw options like "reset to factory settings".

Factory settings are just Microsoft's keys most of the time, and often there's no way to delete/not trust Microsoft's keys.

The whole system is way too intransparent. May as well turn it off.

[–] [email protected] 3 points 3 months ago (1 children)

Yeah, the only thing I've ever seen is the MOK management thingy your bios will throw you into if something wants to add a new key, but iirc that can only list the key you're about to add, not all of them. I also have no idea how you get to that menu without adding a new key.

[–] [email protected] 1 points 3 months ago

I still get issues with efi. I hate these things honestly.

[–] [email protected] 4 points 3 months ago* (last edited 3 months ago) (1 children)

So basically secure boot as usual? Or is there something new here?

[–] [email protected] 2 points 3 months ago

The new bit is essentially that a bunch of vendors have been using test keys in production hardware, mostly enterprise hardware, and nobody has implemented key clustering or rotation like the original design spec recommended.

Beyond that, the older news is the legitimate production key compromise, stored online behind a four character password. But this one’s not as big an issue as most of the implicated hardware is already EOL and no longer in use.