On 07/18/2017 08:07 PM, pixel fairy wrote:
On Tuesday, July 18, 2017 at 10:52:05 PM UTC-7, yreb-qusw wrote:

So, If I haven't already, I should have secure boot enabled? ;   I saw
after I posted that, all the steps, I'd probably end up breaking the
machine or locking myself out of it .....

you should definitely put a password on your bios and make a usb qube.

i would only do AEM if your comfortable with installation, backup and recovery, 
or dont have anything important on that machine yet. preferably set aside a 
couple days to work out any kinks.



I noticed a 'secure boot' doesn't require a user or admin pw, I really can't imagine any physical security issues, unless , a USB device remotely got infected somehow , though , I almost never use any USB drives.

I have so many pw's between all my encrypted drives (on which I re-use the same pw :) ), that I hesitate to add potential disaster level pw's unless it really adds something .....

SO, for the purposes to this AMT or remote attacks on a Qubes system , would enabling 'secure boot' without a admin pw make sense, and you recommmeding a admin AND user pw with the 'secure boot' , I thought there was some issue with Qubes booting with 'secure boot' enabled ??

sorry, if this is too simple, or the paragraph rambles......

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/75c55aa4-1f98-f878-6e8a-a7ed1bf3cf6b%40riseup.net.
For more options, visit https://groups.google.com/d/optout.

Reply via email to