I wonder if any of the people crying "omg secure boot is dead, if I get owned I could have malware forever in my BIOS" are actually running a proper secure boot system with all the obvious backdoorable parts secured (at least those you can do anything about).
-
-
And of course you've audited your BIOS and found all the bugs in the UEFI reference implementation, all the bugs added by the BIOS OEM, all the bugs added by your CPU vendor, all the bugs added by your motherboard vendor, and all the bugs in any modules and OS loader.
Show this thread -
What, you're not doing half of those things? Congrats, the NSA and anyone else who bothers to invest the time already has a half dozen malware persistence vectors for your hardware and there's squat you can do about it.
Show this thread -
Keep people away from root on your machine and hope for the best. At least AMD doesn't stick a webserver with a huge attack surface in there, unlike Intel. If you want real security, you need to design your own motherboard where *you* control and sign and validate flash.
Show this thread
End of conversation
New conversation -
-
-
I don't think any distro (other than maybe Qubes) even enables the IOMMU by default. Kind of a rude discovery when I was trying out vfio.
-
And this is how IOMMU support never improves. I had to send in a patch to make my FireWire controller work with IOMMU (hardware bug workaround), and I still get random crap-outs that break Ethernet once in a while.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.