• bitwolf@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    4
    ·
    15 hours ago

    On the bright side, hopefully this accelerates the UKI initiatives on the different distros.

    That would get us a pathway to a fully working secure boot and hibernation on encrypted volumes.

  • just_another_person@lemmy.world
    link
    fedilink
    arrow-up
    38
    arrow-down
    3
    ·
    1 day ago

    Attackers with physical access to a Linux system can access a debug shell simply by entering the wrong decryption password several times in a row.

    Yeah, no duh. This isn’t a critical security flaw unless you have the worst partition scheme on your encrypted volumes imaginable. It’s not even a process flaw at that point, just “possible”.

    This is essentially what the Israeli government did to Android a decade ago with Pegasus: if you can get in front of the bootloader, you can compromise disks once encrypted because everything is happening in an in-memory boot process.

    Same way you can hotwire cars. It’s not new.