|
Authored by: Anonymous on Tuesday, December 04 2012 @ 09:42 AM EST |
I still have very much trouble understanding how M$ has the
authority to control what OS gets booted by a computer. This
is something that the FTC and anti-trust investigators must
step in and stop.
[ Reply to This | Parent | # ]
|
|
Authored by: Anonymous on Tuesday, December 04 2012 @ 02:43 PM EST |
> it turned out that UEFI system was checking the descriptive string
> for each operating system
So with this shim, and naming my evil H4ckz0s
"Red Hat Enterprise Linux" you are pwned?
That's about as silly as MacOS' essential startup
DSMOS.kext (Don't Steal MacOS)
[ Reply to This | Parent | # ]
|
|
Authored by: SpaceLifeForm on Wednesday, December 05 2012 @ 12:13 AM EST |
Matthew Garrett
writes:
I'm pleased to say that a usable version of shim
is now available for
download. As I discussed here, this is intended for distributions that
want to support secure boot but don't want to deal with Microsoft.
...
A
couple of final notes: As of 17:00 EST today [2012-11-30], I am officially
(rather than merely effectively) no longer employed by Red Hat, and this binary
is being provided by me rather than them, so don't ask them questions about it.
Special thanks to everyone at Suse who came up with the MOK concept and did most
of the implementation work - without them, this would have been impossible.
Thanks also to Peter Jones for his work on debugging and writing a signing tool,
and everyone else at Red Hat who contributed valuable review
feedback.
---
You are being MICROattacked, from various angles, in a SOFT manner. [ Reply to This | Parent | # ]
|
|
|
|
|