TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Windows 10 to make the Secure Boot alt-OS lock out a reality

41 点作者 doublextremevil大约 10 年前

8 条评论

abrodersen大约 10 年前
This is very concerning. I can imagine a future where only the "premium" hardware has the option to disable secure boot, ensuring lower grade consumer machines are permanently locked in to the Windows ecosystem.
评论 #9240635 未加载
评论 #9240958 未加载
tbrownaw大约 10 年前
The slide the have, also says that on mobile devices it <i>must not</i> be possible to turn off secure boot. Which on the one hand, can probably help make them less desirable to steal; but on the other hand, means no playing with non-MicroSoft OSes on those devices.
评论 #9240353 未加载
评论 #9241213 未加载
cesarb大约 10 年前
Hm...<p>First, the slide shown in this article says &quot;allow end user to turn off&quot;. It says nothing about &quot;allow end user to add his own keys&quot;. If the end user can add his own keys, the end user can still bypass this mechanism; it&#x27;s just a bit more complex and annoying.<p>Second, even if the firmware doesn&#x27;t allow the user to add his own keys, there are bootloaders like SUSE&#x27;s shim which are signed by Microsoft and allow the user to add his own keys for the next step (see <a href="https://www.suse.com/documentation/sles11/book_sle_admin/data/sec_uefi_secboot.html" rel="nofollow">https:&#x2F;&#x2F;www.suse.com&#x2F;documentation&#x2F;sles11&#x2F;book_sle_admin&#x2F;dat...</a> for instance).<p>Of course, I wonder how long until shim doesn&#x27;t work anymore (either by having its signature revoked or by Microsoft migrating to a new root key and not signing shim with it). Who knows, these Windows 10 requirements might already be using a new root key, instead of the one the shim bootloaders were signed with.<p>If end-users cannot disable secure boot (or add his own keys), they won&#x27;t be affected at first, since the most popular Linux distributions have a signed bootloader. But when in secure mode, you can&#x27;t boot your own self-compiled kernel, and often you can&#x27;t even load unsigned drivers. This makes it harder to debug kernel issues (since you can&#x27;t compile and install a modified kernel), and makes it hard to develop drivers for new hardware.
评论 #9241690 未加载
transfire大约 10 年前
The <i>WORST</i>. Imagine if MS had had the foresight to do this back in 91. No Linux.
UnoriginalGuy大约 10 年前
It is worth noting that Fedora, OpenSuse, and Ubuntu all support Secure Boot. However this would limit true &quot;indie&quot; distro&#x27;s and OSs who likely couldn&#x27;t get a signing key.<p>I will say the whole way Secure Boot was done (essentially only having a single signing authority: Microsoft) was highly flawed from the get go. There was some talk about allowing the free software foundation to sign keys, what happened to that?
M8大约 10 年前
I wonder whether bookies would accept a bet on Windows becoming open-source within 5 years?
mark_l_watson大约 10 年前
As a Linux user sine 1992 (Slackware), I have a probably unpopular opinion on this. I feel that security problems are getting so severe that I can live with Ubuntu and other distributions having to jump through some hoops to support secure boot. We need a way to get small distros also compatible.
shmerl大约 10 年前
Very annoying. Someone should sue MS with an antitrust case.