On 05/31/2012 01:19 PM, Jon Ciesla wrote:
> On Thu, May 31, 2012 at 12:16 PM, Gerry Reno <gr...@verizon.net> wrote:
>> On 05/31/2012 01:10 PM, Gregory Maxwell wrote:
>>> On Thu, May 31, 2012 at 1:07 PM, Gerry Reno <gr...@verizon.net> wrote:
>>>> Could be any of a thousand ways to implement this.
>>>> Maybe it checks the BIOS to determine whether some SecureBoot flag is set.
>>> While it pains me to argue with someone on my side— you're incorrect.
>>> The compromised system would just intercept and emulate or patch out that 
>>> test.
>> Then what's missing here is a way for booted OS's to test themselves for 
>> integrity.
> Maybe some sort of cryptographic signature stored in the hardware?
>
> <ducks>
>
> -J
>
> </sarcasm>
>

Just not dictated by one monopoly.

.
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel

Reply via email to