Skip to main content

Questions tagged [secure-boot]

0 votes
0 answers
49 views

Assuming that RAM is inside the SoC, nullifying the possibility of cold-boot attacks, the only other way to obtain the decryption key is to extract it from the secure storage in which it is saved. I ...
allexj's user avatar
  • 537
1 vote
2 answers
172 views

For context, my question relates to the use of the systemd-cryptenroll and the related TPM enrollment options where one set of options "configures a TPM2 signed PCR policy to bind encryption to.&...
Hari's user avatar
  • 109
0 votes
2 answers
198 views

This Reddit comment suggests that even if malicious software gains root access, SecureBoot + Lockdown mode in the Linux kernel can help prevent malware from gaining access to the kernel to perform ...
zstewart's user avatar
  • 131
3 votes
1 answer
440 views

A lot of systems have secureboot but don't require any password to access bios/efi settings, which means you can disable secureboot without authentication. Additionally, it seems like many Linux ...
zstewart's user avatar
  • 131
1 vote
0 answers
198 views

I'm running on a Linux Embedded product and U-Boot Bootloader. I enabled the Secure Boot Chain of Trust, from ROM to Kernel + DM-verity and DM-Crypt partition protection. Now I'm worried about the U-...
Sbon's user avatar
  • 11
1 vote
0 answers
171 views

I noticed that when the secure boot options is disabled on a Bitlocker enabled Windows laptop with TPM, in order to boot into a forensic live OS like Kali in Forensic Mode or Parrot OS that the TPM is ...
Bob Ortiz's user avatar
  • 7,715
4 votes
2 answers
367 views

My Dell XPS 9310 has secure boot enabled and the BIOS is up to date and there are no manual keys added there. Can I download a ubuntu .ISO from anywhere and flash into any computer without worrying ...
Poperton's user avatar
  • 317
1 vote
1 answer
177 views

I have searched online, but have not been able to find anything about this. I understand the PKFail can compromise the boot process by allowing a signed key to sign malware to insert into the UEFI, ...
davidgo's user avatar
  • 713
0 votes
1 answer
183 views

SecureBoot uses a PKI path to verify particular signed bootloader binaries before it runs these binaries. This PKI, as far as I understand, is basically owned by Microsoft, meaning that only Microsoft ...
Jonathan Wilbur's user avatar
1 vote
0 answers
77 views

Are PUFs used, EVERY time we power on the computer to verify that nothing has been tampered with (by using CRP authentication)? Which element performs this authentication? (bios, secureboot, I don't ...
allexj's user avatar
  • 537
-1 votes
2 answers
338 views

Suppose you need a laptop repair, so you bring it to A big box store where you have some sort of coverage (who will have the computer for 2-3 weeks) A small chain of repair shops a small independent ...
SurferTaco's user avatar
1 vote
1 answer
575 views

In my laptop I've set up a bios password when I power on the laptop, and once I enter it the laptop starts my linux distro and decrypts the disk without asking any other password. To do this I've set ...
Allexj's user avatar
  • 137
1 vote
1 answer
287 views

Apple Silicon-based Macs have a LocalPolicy file that controls the secure boot process. To prevent replay attacks of the LocalPolicy, hashes of nonces are used. From here: The lpnh is used for anti-...
Melab's user avatar
  • 276
0 votes
2 answers
303 views

As far as I've seen, the Secure Boot process is described like so: A firmware stored in read-only memory and therefore considered secure starts. It verifies the next software component (e.g. a ...
arkountos's user avatar
2 votes
1 answer
881 views

This is coming from Qualcomm's Secure Boot explanation. https://www.qualcomm.com/content/dam/qcomm-martech/dm-assets/documents/secure-boot-image-authentication_11.30.16.pdf Within it, it explains that ...
itsmarziparzi's user avatar

15 30 50 per page
1
2 3 4 5