Linked by Thom Holwerda on Fri 23rd Sep 2011 22:22 UTC, submitted by kragil
Windows The story about how secure boot for Windows 8, part of UEFI, will hinder the use of non-signed binaries and operating systems, like Linux, has registered at Redmond as well. The company posted about it on the Building Windows 8 blog - but didn't take any of the worries away. In fact, Red Hat's Matthew Garrett, who originally broke this story, has some more information - worst of which is that Red Hat has received confirmation from hardware vendors that some of them will not allow you to disable secure boot.
Thread beginning with comment 490761
To view parent comment, click here.
To read all comments associated with this story, please click here.
RE[8]: Stop whining!
by Icaria on Mon 26th Sep 2011 08:04 UTC in reply to "RE[7]: Stop whining!"
Member since:

For the 15'th time, I not claiming that it's impossible to secure the boot environment - I am saying that securing the boot environment has zero, 0, NULL effect on the security of the system as it cannot prevent a *OS* or *USER* level vulnerability (or plain stupidity) from compromising the OS and/or the user file.

You started out saying:
OK, you do realize that once the OS is compromised, nothing stops the malware from deactivating the signature check mechanism and installing a key logger as a signed update or even throw in a modified kernel image while they are at it, right?
Which is what I addressed.

How could I possibly make my point clearer?
Perhaps by not changing your 'point' once it proves fallacious? I've been perfectly civil and patient with you throughout this exchange, so I feel justified when I say don't be a douchebag.

Reply Parent Score: 2

RE[9]: Stop whining!
by gilboa on Mon 26th Sep 2011 10:25 in reply to "RE[8]: Stop whining!"
gilboa Member since:

Oh boy....

Edited 2011-09-26 10:26 UTC

Reply Parent Score: 2