emacs/var/elfeed/db/data/c4/c4c4723ab55778ba0e0af4ccfec1016e88090079
2022-01-03 12:49:32 -06:00

1 line
1.1 KiB
Plaintext

<!-- SC_OFF --><div class="md"><p>After seeing a few YT videos and reading the Arch wiki about secure boot, I understand it can be useful to prevent kernel tampering. However it does seem like a lot of effort and by using 3rd party key solutions, it wouldn&#39;t make things any more secure right? If someone tampered with the kernel when booted, it can probably even sign it perfectly fine?</p> <p>Anyway I&#39;m using systemd-boot and the given solutions seems to be a bit mixed either. The most easy way seems to sign your own keys by adding prehooks that run on every kernel upgrade?</p> <p>I would like to use SB to upgrade Windows, but with all those things considered I simple could just run W11 in a VM instead.</p> </div><!-- SC_ON --> &#32; submitted by &#32; <a href="https://www.reddit.com/user/improve-me-coder"> /u/improve-me-coder </a> <br/> <span><a href="https://www.reddit.com/r/archlinux/comments/q8kcet/is_secure_boot_worth_the_effort/">[link]</a></span> &#32; <span><a href="https://www.reddit.com/r/archlinux/comments/q8kcet/is_secure_boot_worth_the_effort/">[comments]</a></span>