• @[email protected]
    link
    fedilink
    English
    16
    edit-2
    20 hours ago

    I still for the life of me can’t figure out what’s so great about secure boot and tpm. All it’s ever done for me is prevent me from booting a legitimate OS, or a bootable flash drive with iso images on it (like ventoy). It’s also pretty good at giving me a headache trying to figure out how the keys work and how to register them.

    I just turn them both off and live in ignorant bliss.

    • @[email protected]
      link
      fedilink
      English
      1819 hours ago

      Secure boot and TPM are tools for (among other things) making sure nobody (E.G. a virus or worm) has tampered with your OS and bootloader. You can for instance use both on Linux, it’s just by default they come preloaded with Microsofts configuration for loading Windows, and the technical knowledge for how to reconfigure it is a bit arcane.

      It’s an excellent security tool, it’s just abused by Microsoft to discourage competition.

    • @[email protected]
      link
      fedilink
      English
      220 hours ago

      It’s not for you, it’s for them. Secure boot means it only runs their operating system, not yours. Trusted enclave means it secures their DRM-ware from tampering by the user who owns the PC.

      • @[email protected]
        link
        fedilink
        English
        1419 hours ago

        Secure boot means that only the intended bootloader runs, it can be any one, but it just needs to be the intended one.

        Secure boot works with Linux.

        • @[email protected]
          link
          fedilink
          English
          116 hours ago

          It works for now on x86-64, yes. For now. As always, we are one “think of the children” crisis away from lobbyists taking that option away.

          • @[email protected]
            link
            fedilink
            English
            915 hours ago

            What? I think you maybe just don’t know what purpose secure boot serves.

            It’s not a tool to vendor lock computers, it’s a tool to establish a chain of trust to protect the boot process by only allowing cryptographically signed images from executing. Anyone can sign things for secure boot by simply creating an x509 certificate and importing it. If vendors wanted to prevent you from running a different operating system, they would just lock it down completely as is done in many devices like mobile phones and proprietary electronics.

      • @[email protected]
        link
        fedilink
        English
        419 hours ago

        What do you mean? I remove all vendor keys and enroll my own secure boot keys. This way only my install with my bootloader signed by my keys will boot.