New Secure Boot bug could render it worthless
https://www.youtube.com/watch?v=7sYzwb6eUgQ

Keep an eye out for motherboard firmware updates.
最近の変更はCrashedが行いました; 2024年7月26日 20時31分
< >
1-11 / 11 のコメントを表示
More worthless than it already was? Impossible.
TPM and BitLocker already was pointless. I've said before if you want full disk encryption use good 3rs party software, not MS
A&A 2024年7月27日 17時21分 
After all, this is a very niche feature...
Bad 💀 Motha の投稿を引用:
TPM and BitLocker already was pointless. I've said before if you want full disk encryption use good 3rs party software, not MS
Do you have any technical explanation? Ubuntu now supports TPM based LUKS disk encryption.

The point behind the video is that the Secure Boot database on many manufacturers appears to have been compromised with keys intended only for testing. This will require a firmware update to fix.
最近の変更はCrashedが行いました; 2024年7月27日 17時45分
Crashed の投稿を引用:
Bad 💀 Motha の投稿を引用:
TPM and BitLocker already was pointless. I've said before if you want full disk encryption use good 3rs party software, not MS
Do you have any technical explanation? Ubuntu now supports TPM based LUKS disk encryption.

The point behind the video is that the Secure Boot database on many manufacturers appears to have been compromised with keys intended only for testing. This will require a firmware update to fix.

Ok but that's not MS crap.

Like I said, use 3rd party.

If a Linux Distro offers it as a built-in option, that's great.

What I mostly meant about useless and/or dumb is this "NEED" or requirement to have TPM + SecureBoot. While I agree every Desktop and Laptop Motherboard should have it as part of built in features. It should be optional and never enabled by default. The higher ups in this industry do not need to attempt to dictate that we ALL need to have it, just because they want to push something; agenda or otherwise.
最近の変更はBad 💀 Mothaが行いました; 2024年7月27日 19時19分
BlackBloodRum の投稿を引用:
Things like this make me glad I clear the default keys, roll my own keys and self sign. Avoiding this whole issue. (Along with enabling a uefi password, so you can't just bypass secure boot by disabling it in the uefi)

Pretty sure that does not help in the way you are thinking though. TPM + SecureBoot is rather meaningless unless disk encryption is actually used. And if it was used, let's say by you, then I can't get around that if I stole your PC simply by entering the BIOS and disable TPM + SecureBoot because your OS Drive was already encrypted.
Bad 💀 Motha の投稿を引用:
Crashed の投稿を引用:
Do you have any technical explanation? Ubuntu now supports TPM based LUKS disk encryption.

The point behind the video is that the Secure Boot database on many manufacturers appears to have been compromised with keys intended only for testing. This will require a firmware update to fix.

Ok but that's not MS crap.

Like I said, use 3rd party.

If a Linux Distro offers it as a built-in option, that's great.

What I mostly meant about useless and/or dumb is this "NEED" or requirement to have TPM + SecureBoot. While I agree every Desktop and Laptop Motherboard should have it as part of built in features. It should be optional and never enabled by default. The higher ups in this industry do not need to attempt to dictate that we ALL need to have it, just because they want to push something; agenda or otherwise.
Ubuntu is also Secure Boot signed for the default keys. Only thing I use regularly that doesn't support Secure Boot is MemTest86+. And it's only recently that even supports UEFI.
Hmm ok... never use a default key. Make it generate a new one for you.

Yes if needed you can always go and disable SecureBoot so you have access to Bootable USB Tech Tools stuff. Then reboot and re-enable so you can boot off your OS Drive properly.
最近の変更はBad 💀 Mothaが行いました; 2024年7月28日 3時29分
I mean who uses these default keys
It would be like letting MS or Google set a universal 4 digit code for all email password logins
Since this is a security issue with Motherboards could brands and OEMs just offer up BIOS firmware updates so there is no default key? So a new one must one generated upon using any actual Disk Encryption?
最近の変更はBad 💀 Mothaが行いました; 2024年7月28日 6時55分
Bad 💀 Motha の投稿を引用:
I mean who uses these default keys
It would be like letting MS or Google set a universal 4 digit code for all email password logins
All your HTTPS websites run off a set of "default" keys. But then, there is an organization dedicated to managing the validity of those keys.
< >
1-11 / 11 のコメントを表示
ページ毎: 1530 50

投稿日: 2024年7月26日 20時30分
投稿数: 15