I’ve made the effort to secure mine and am aware of how the trusted protection module works with keys, Fedora’s Anaconda system, the shim, etc. I’ve seen where some here have mentioned they do not care or enable secure boot. Out of open minded curiosity for questioning my biases, I would like to know if there is anything I’ve overlooked or never heard of. Are you hashing and reflashing with a CH341/Rπ/etc, or is there some other strategy like super serious network isolation?

-2 points

You have to turn off Secure Boot to enable hibernation, and I value hibernation enough to do so.

permalink
report
reply
15 points

This is patently false. Secure boot and hibernation are not mutually exclusive.

permalink
report
parent
reply
4 points

While I believe you, I haven’t been able to enable hibernation with it on.

permalink
report
parent
reply
7 points
*

It’s a kernel build config. Debian for one ships with support disabled due to security concerns.

permalink
report
parent
reply
4 points

Not mutually exclusive, but it’s highly probable that if you’re running a mainstream distro, the default kernel is in lockdown mode, preventing hibernation while secure boot is enabled.

permalink
report
parent
reply
Deleted by creator
permalink
report
parent
reply
10 points

I believe if your swap partition is on an encrypted LVM, you can still hibernate with kernel lockdown enabled.

permalink
report
parent
reply
2 points

This is my setup on debian. Works without any issues.

permalink
report
parent
reply
13 points

I have my home folder encrypted and I enter my password on boot. I’m not really sure what benefits Secure Boot has in environments where you have to enter your password anyway. And in environments where you don’t have to enter your password, someone could just steal your system anyway and boot it to get your data.

permalink
report
reply
46 points

Secureboot is meant to help protect you against the evil maid attack. IE someone with physical access to your computer can compromise your boot loader with a keylogger that can capture your encryption password so that when they return they can gain access to your computer as they now know your password. Though the vast majority of people just don’t need to worry about that level of attack so I have never really bothered with secureboot.

permalink
report
parent
reply
34 points

The thing is… If someone has access to your system enough to replace your bootloader, they could probably just slip a USB keylogger between your keyboard and computer. Or set up a small hidden camera. Or plug all your devices into a raspberry pi to spoof the login screen.

It strikes me as odd that people assume that an attacker with a few hours physical access is going to bother going down the “change the bootloader” route when there are other, easier routes available.

Ironically, the only practical use case I can see for Secure Boot is when you have a dual boot setup where you don’t trust one of the OSes. Which I’m betting wasn’t Microsoft’s intention at all.

permalink
report
parent
reply
1 point

No point in putting locks on your house, because an attacker can just drive their car through your front door.

The attacks you mention have their own ways of being detected: usually eyeballs. But eyeballs can’t help you against something hiding in your bootloader. So Secure Boot was made.

And I don’t really follow your dual boot claim. If you don’t trust one of the OSes, and you boot it up on your hw, you’re already hosed. At that point it can backdoor your bootloader and compromise your other OS. Secure Boot prevents malicious OSes from being booted, it can’t help you if you willingly boot a malicious OS.

permalink
report
parent
reply
27 points
*

Just because they can do X doesn’t mean you shouldn’t protect against Y.

Just as an example scenario, say border guards took my laptop out of my eyesight. A camera or USB keylogger won’t do anything in that case. Hijacking my bootloader though potentially gives them access to my machine without me having any clue.

Secure Boot is useful and worth setting up. But everyone has to decide their own level of comfort when it comes to security.

permalink
report
parent
reply
3 points

Basically xkcd 538 as always.

permalink
report
parent
reply
4 points

Just use disk encryption and be done

permalink
report
reply
7 points

Disk encryption doesn’t protect against what Secure Boot does. They are very different, often complimentary, systems.

permalink
report
parent
reply
6 points

At the point where the feds are paying Israelis millions to break your boot shit, they’re paying dudes to watch you type in your password or any number of other things. I’d argue as long as you’re not among the [number of prey] the predators are looking to take down at the back, for whatever category of shit you’re in, you’re fine

permalink
report
reply
5 points

And if you are?

permalink
report
parent
reply
9 points

Disconnect

permalink
report
parent
reply
3 points

Is there a phone number I can call to check if I am?

permalink
report
parent
reply
6 points

Now I’m not very smart, but I see no purpose of it, so I just turn it off so it doesn’t fuck with my ability to boot.

permalink
report
reply

Linux

!linux@lemmy.ml

Create post

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word “Linux” in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

  • Posts must be relevant to operating systems running the Linux kernel. GNU/Linux or otherwise.
  • No misinformation
  • No NSFW content
  • No hate speech, bigotry, etc

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

Community stats

  • 9.8K

    Monthly active users

  • 5.8K

    Posts

  • 162K

    Comments