On 07/18/2017 08:07 PM, pixel fairy wrote:
On Tuesday, July 18, 2017 at 10:52:05 PM UTC-7, yreb-qusw wrote:
So, If I haven't already, I should have secure boot enabled? ; I saw
after I posted that, all the steps, I'd probably end up breaking the
machine or locking myself out of it .....
you should definitely put a password on your bios and make a usb qube.
i would only do AEM if your comfortable with installation, backup and recovery,
or dont have anything important on that machine yet. preferably set aside a
couple days to work out any kinks.
I noticed a 'secure boot' doesn't require a user or admin pw, I
really can't imagine any physical security issues, unless , a USB
device remotely got infected somehow , though , I almost never use any
USB drives.
I have so many pw's between all my encrypted drives (on which I re-use
the same pw :) ), that I hesitate to add potential disaster level
pw's unless it really adds something .....
SO, for the purposes to this AMT or remote attacks on a Qubes system
, would enabling 'secure boot' without a admin pw make sense, and
you recommmeding a admin AND user pw with the 'secure boot' , I
thought there was some issue with Qubes booting with 'secure boot'
enabled ??
sorry, if this is too simple, or the paragraph rambles......
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit
https://groups.google.com/d/msgid/qubes-users/75c55aa4-1f98-f878-6e8a-a7ed1bf3cf6b%40riseup.net.
For more options, visit https://groups.google.com/d/optout.