This page permanently redirects to gemini://gemini.techrights.org/2011/11/18/uefi-or-nothing-again/.

● 11.18.11

●● Microsoft ‘Secure Boot’ Cracked

Posted in GNU/Linux, Microsoft at 10:43 am by Dr. Roy Schestowitz

Summary: The mechanism which secures Microsoft from Linux growth is not delivering whatever ‘features’ Microsoft alleged that it would

MICROSOFT has been marketing as “security” a mechanism that complicates or blocks GNU/Linux [1, 2, 3, 4, 5, 6, 7] . Well, via Slashdot we found this report which defeats Microsoft’s excuse:

=> 1 | 2 | 3 | 4 | 5 | 6 | 7 | ↺ via Slashdot | ↺ this report

At the upcoming MalCon security conference in Mumbai, Austrian independent developer and security analyst Peter Kleissner is scheduled to release the first known “bootkit” for Windows 8—an exploit that is able to load from a hard drive’s master boot record and reside in memory all the way through the startup of the operating system, providing root access to the system. The exploit allegedly defeats the security features of Windows 8′s new Boot Loader. However, Kleissner said in a message exchange with Ars Technica that the exploit did not currently target the Unified Extensible Firmware Interface (UEFI), but instead went after legacy BIOS. Kleissner said he has shared his research and paper and the paper he plans to present, “The Art of Bootkit Development,” with Microsoft.

So, what’s the point of it then? People have predicted this all along. █

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.

Permalink  Send this to a friend

=> Permalink | ↺ Send this to a friend


=> Techrights

➮ Sharing is caring. Content is available under CC-BY-SA.

Proxy Information
Original URL
gemini://gemini.techrights.org/2011/11/18/uefi-or-nothing-again
Status Code
Success (20)
Meta
text/gemini;lang=en-GB
Capsule Response Time
279.962078 milliseconds
Gemini-to-HTML Time
1.042471 milliseconds

This content has been proxied by September (ba2dc).