Skip to content Skip to footer
0 items - $0.00 0

Another Crack in the Chain of Trust: Uncovering (Yet Another) Secure Boot Bypass by vitplister

Another Crack in the Chain of Trust: Uncovering (Yet Another) Secure Boot Bypass by vitplister

Another Crack in the Chain of Trust: Uncovering (Yet Another) Secure Boot Bypass by vitplister

7 Comments

  • Post Author
    vitarnixofntrnt
    Posted June 10, 2025 at 8:13 pm

    [dead]

  • Post Author
    db48x
    Posted June 10, 2025 at 8:40 pm

    > The root cause of this bug, once again, lies in the unsafe handling of NVRAM variables.

    Sheer incompetence, in other words.

  • Post Author
    baxtr
    Posted June 10, 2025 at 9:42 pm

    > Because the attacker’s code executes before the operating system even loads, it opens the door for attackers to install bootkits and undermine OS-level security defenses.

    Excellent.

  • Post Author
    fsflover
    Posted June 10, 2025 at 9:56 pm

    Fortunately there's a FLOSS alternative: TPM with Heads, https://osresearch.net/. Works for me.

  • Post Author
    jerhewet
    Posted June 10, 2025 at 10:12 pm

    Please … just give me back my BIOS.

  • Post Author
    jrm4
    Posted June 11, 2025 at 3:02 am

    I still genuinely struggle to understand the advantage of UEFI/Secureboot whatever over BIOS.

    I own a piece of hardware, so I can do what I want to it. Out there, there is software, which I have to figure out how I'm going to trust, whether it's e.g Windows and I'm trusting that whole way of doing things, or Linux and that other whole way of doing things.

  • Post Author
    jeffrallen
    Posted June 11, 2025 at 6:16 am

    A fish, a gun, and a smoking barrel. Sigh.

Leave a comment

In the Shadows of Innovation”

© 2025 HackTech.info. All Rights Reserved.

Sign Up to Our Newsletter

Be the first to know the latest updates

Whoops, you're not connected to Mailchimp. You need to enter a valid Mailchimp API key.