Reply to post: Re: Secure Boot

Windows' Nemesis: Pre-boot malware pwns payment processors

dogged

Re: Secure Boot

> Couldn't you make it to the end of the first sentence in the article?

I did but the article was tripe. A bootkit doesn't care what OS you're running (SecureBoot and TPM aside). The specific malware in this instance may be a Win32 variant but it could just as easily be anything else - it's use of the vector that's important. In fact, the prevalence of SecureBoot and TPM is likely to make this vector more an issue for systems which do not make use of those.

Please note that most popular linux distros can be SecureBoot enabled very easily.

It would benefit most users if commentards ceased to scream about how "unfair" SecureBoot is and instead pointed people toward this helpful article.

(Many) Other articles are available.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon