By that statement I take it then without TPM you basically can't have truly secure secure boot? Since the password is your protection from secure boot tampering but the TPM is your protection from password tampering
Scoopta
The last time I tried enabling a UEFI password clearing the CMOS would clear it. I haven't tried on my latest mobo...but I'm just putting it out there that SOME UEFIs do that
I'd argue any solution necessitates secure boot, not just the efistub. If someone is determined enough to modify your kernel they'll be determined enough to modify your bootloader
Yes, honestly this situation reminds me a lot of the LTT trying Linux and destroying his system by installing steam despite apt warning him in the best way it really could that he probably didn't want to do that. Sure the package shouldn't have been in that state in a stable distro but shit happens. It goes to that point of, users will go through great lengths to achieve the end goal blindly jumping past warnings on the way no matter how dire they might be.
It's not a bug, it's intentional. They consider changes to be any change since the last commit including in untracked files. They did update it to make this behavior a lot more obvious though.
Huh, weird. The rest of these are pretty closely related technologies but I'm not sure I'd consider a web framework and a pre boxed website builder all that similar
What is the ruby on rails supposed to be?...looks like ruby on rails with off colors to me, I can't place that logo. The rest of these are truly cursed tho
He said they're not going to change it, just make the dialog a lot more clear and add a second button to it that will only do a reset without the clean.
I wonder the same especially because it won't do anything for the game itself. Yeah, all the system components the game uses might be a touch faster but the game itself won't be compiled with any of these optimizations.
He says it was unexpected but it's been being talked about on the GitHub for quite some time now. It was really just a matter of when they decided to do it.
-_-...8 needs to die already. Most of my projects heavily depend on modern features, I even have one that straight up requires JPMS
I am aware secure boot doesn't require a TPM, but I've always been confused by its purpose since it's trivial to disable. Makes sense if you use it in conjunction with TPM measurements. I personally encrypt all my filesystems except my /boot which is also my ESP, I use the efistub and that's good enough for loss of device. For a physical attacker with actual skills I'm SOL, it's not that I don't want to protect against it, I just couldn't figure out a reliable way to.