• Kyrgizion@lemmy.world
    link
    fedilink
    English
    arrow-up
    40
    arrow-down
    7
    ·
    3 days ago

    Needlessly intrusive. Can obviously be circumvented by cheaters anyway, so quite possibly superfluous. Apart from that it protects against the kinds of attacks that typically require physical access to the computer. If you have physical access you have full access anyway. Etc.

    • 9tr6gyp3@lemmy.world
      link
      fedilink
      English
      arrow-up
      21
      arrow-down
      3
      ·
      3 days ago

      If you have physical access you have full access anyway. Etc.

      You know secure boot was specifically made to protect users for this exact use case. Any tampering of the system will prevent the system from booting.

      • Eggymatrix@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        17
        arrow-down
        8
        ·
        3 days ago

        I get your pc, “tamper” it, then i install a fake bios that tells you all is well and that your tpm and secureboot and whatever else bullcrap they invent is still happy.

        See the problem?

        • Corngood@lemmy.ml
          link
          fedilink
          English
          arrow-up
          7
          arrow-down
          3
          ·
          3 days ago

          It won’t boot though, because the keys to decrypt the system are stored in the TPM.

          Sure you could replace the whole OS, but that’s going to be very obvious and won’t allow you access to the data.

            • PHLAK@lemmy.world
              link
              fedilink
              English
              arrow-up
              7
              arrow-down
              2
              ·
              3 days ago

              If you enable Secure Boot you should also set a BIOS password for this very reason.

              • Saleh@feddit.org
                link
                fedilink
                English
                arrow-up
                12
                arrow-down
                1
                ·
                3 days ago

                So, if you set a bios password either way, which benefit does secureboot give?

                • AlphaOmega@lemmy.world
                  link
                  fedilink
                  English
                  arrow-up
                  4
                  ·
                  3 days ago

                  Not sure if this works these days, but on older systems there was a reset bios config jumper and pulling the cmos battery.

            • Miaou@jlai.lu
              link
              fedilink
              English
              arrow-up
              0
              ·
              3 days ago

              Can’t access the bios with secure boot on (at least I could not on an old laptop I was refurbishing, thank god the owner could login into windows)

              • jjjalljs@ttrpg.network
                link
                fedilink
                English
                arrow-up
                1
                ·
                2 days ago

                That’s unusual, I think. Every computer I’ve had that had it on, I was able to turn it off when I went to install Linux.

          • atticus88th@lemmy.world
            link
            fedilink
            English
            arrow-up
            2
            ·
            3 days ago

            Isnt it possible to have a recovery key? Isnt that technically a backdoor? Maybe the terms are not correct but there is a way in physically.

      • Limonene@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        arrow-down
        1
        ·
        3 days ago

        A person with physical access can tamper with the OS, then tamper with the signing keys. Most secure boot systems allow you to install keys.

        Secure boot can’t detect a USB keylogger. Nothing can.

        • 9tr6gyp3@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          2 days ago

          The signature checks will immediately fail if ANY tampering has occurred.

          Adding a USB keylogger that has not been signed will cause a signature verification failure during boot.

          • Limonene@lemmy.world
            link
            fedilink
            English
            arrow-up
            2
            ·
            2 days ago

            A USB keylogger is not detectable by the computer, not in firmware nor operating system. It passively sniffs the traffic between the USB keyboard and the computer, to be dumped out later.

            • 9tr6gyp3@lemmy.world
              link
              fedilink
              English
              arrow-up
              1
              ·
              2 days ago

              If your keys are stored in the TPM for use during the secure boot phase, there will be nothing for it to log.

    • Tanoh@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      1
      ·
      3 days ago

      If you have physical access you have full access anyway

      No, encrypt your drives.