Comment on Windows' original Secure Boot certificates expire in June—here's what you need to do
h_ramus@piefed.social 12 hours agoGives the illusion of security without being secure. Get the drive in a separate machine and, unless encrypted, secure boot is security theatre. Windows login password is similarly useless when the drive can be accessed when attached elsewhere.
Get rid of secure boot, install a granny-safe Linux distribution like Mint and get your drive LUKS encrypted.
Hirom@beehaw.org 11 hours ago
You’re talking of an attacker with physical access. This can indeed defeats secure boot, but physical access defeat most computer security. In an evil maid scenario even LUKS can be defeated. An attacker with physical access can clone the drive, install a keylogger (hardware or software) and capture the passphrase the next time the machine boots.
Secure Boot can be useful to prevent malware from inserting themselves into the boot process, preventing them from elevating privilege or gaining persistence www.xda-developers.com/secure-boot/
Secure Boot isn’t perfect but it’s widely available and is an useful extra layer of protection, on top of disk encryption (eg LUKS).
h_ramus@piefed.social 10 hours ago
I can’t take any Microsoft attempt at security seriously. One of the most important elements to improve security is to delete windows. Secure boot is lots of things but not secure.