Secure Boot - /g/ (#106173044) [Archived: 88 hours ago]

Anonymous
8/7/2025, 11:05:41 AM No.106173044
maxresdefault_98e8eb14-0fec-4083-a404-6f27c3779e9d
maxresdefault_98e8eb14-0fec-4083-a404-6f27c3779e9d
md5: 7a05eb734c009e107c966ba9386e1fdb🔍
It seems like there's been a massive push to get everyone to enable this recently. Can someone redpill me on the privacy implications of this?
Replies: >>106173113 >>106173125 >>106173174 >>106173291 >>106173375 >>106173402 >>106173457
Anonymous
8/7/2025, 11:07:31 AM No.106173057
It's more secure cause you can be sure no one modified your bootloader or kernel.
Replies: >>106173324 >>106174625
Anonymous
8/7/2025, 11:13:46 AM No.106173094
it stops you from running programs your jewish slave masters don't want you to run
Replies: >>106173242
Anonymous
8/7/2025, 11:14:47 AM No.106173107
FB_IMG_1754379846597
FB_IMG_1754379846597
md5: 195f16ef82736180037cb04119ef915a🔍
It's been a security standard for quite some time

What the fuck do you mean by "recently"?
Anonymous
8/7/2025, 11:15:49 AM No.106173113
>>106173044 (OP)
Javelin made me enable this so I did and it fucked my motherboard. Googling it later, it’s a known issue. Thanks Gigabyte.
Replies: >>106173390 >>106173403
Anonymous
8/7/2025, 11:17:13 AM No.106173125
>>106173044 (OP)
it's a prerequisite to creating a "trusted mode" for PCs
soon you won't be able to do anything meaningful online (like a rooted android phone) without secure boot and TPM
Replies: >>106173172
Anonymous
8/7/2025, 11:18:16 AM No.106173132
It's on by default for all prebuilts since last decade. It prevents malware from loading during the boot process because all malware is unsigned or masquerading.
Replies: >>106173141
Anonymous
8/7/2025, 11:20:12 AM No.106173141
>>106173132
>because all malware is unsigned or masquerading
not even true, private keys leak all the time
the only thing secure boot does is prevent legitimate users from running software that isn't signed by microsoft
Replies: >>106173157 >>106173175 >>106173188 >>106173222
Anonymous
8/7/2025, 11:23:28 AM No.106173157
>>106173141
You never heard of WHQL? Spoofing WHQL doesn't do shit. You're still flagged by anticheat and 3Dmark that your driver isn't legit.
Anonymous
8/7/2025, 11:25:00 AM No.106173172
>>106173125
Christ. Fuck that. This whole "internet security arc" getting kinda ridiculous.
Replies: >>106173178
Anonymous
8/7/2025, 11:25:19 AM No.106173174
>>106173044 (OP)
Good: bad people can no longer modify core parts of your OS or load custom drivers because every step from your firmware, the bootloader, the later stages of booting and every part of your OS is cryptographically signed.
Bad: you can't do any of these modifications anymore either.
Anonymous
8/7/2025, 11:26:05 AM No.106173175
>>106173141
>I don't know how driver signatures work
Replies: >>106173200
Anonymous
8/7/2025, 11:26:37 AM No.106173178
>>106173172
Why do you want children being raped?!
*starts hyperventilating and fake crying*
Anonymous
8/7/2025, 11:28:34 AM No.106173188
>>106173141
>the only thing secure boot does is prevent legitimate users from running software that isn't signed by microsoft
but it doesn't? Otherwise beta GPU drivers don't work. Check GPU-Z next time.
Anonymous
8/7/2025, 11:30:04 AM No.106173200
>>106173175
NVIDIA's code signing certificate leaked 3 years ago
MSI's code signing certificate leaked 2 years ago
etc etc
Replies: >>106173229
Anonymous
8/7/2025, 11:32:59 AM No.106173222
>>106173141
>I don’t know what Machine Owned Keys are
inb4 winsoy user, just rope already if you’re complaining about this because the main issue is the OS, not the boot protection measures
Replies: >>106173249
Anonymous
8/7/2025, 11:34:16 AM No.106173229
>>106173200
>implying it isn’t possible for manufacturers to bring out UEFI updates with new keys and also blacklist the old leaked keys
>implying they didn’t do this
Replies: >>106173249 >>106173417
Anonymous
8/7/2025, 11:35:42 AM No.106173242
>>106173094
https://wiki.archlinux.org/title/Unified_Extensible_Firmware_Interface/Secure_Boot
Anonymous
8/7/2025, 11:36:12 AM No.106173249
>>106173222
that feature is being deprecated soon, many laptops don't even allow you to add custom keys anymore
>>106173229
>implying they didn’t do this
of course they did, eventually
but private keys leak all the time

this topic always gets a lot of organic engagement on 4chan
Replies: >>106173307
Anonymous
8/7/2025, 11:37:22 AM No.106173255
I perform original bios boots, only downside is no resizeable bar but I don't know how practical that really is
Anonymous
8/7/2025, 11:43:57 AM No.106173291
>>106173044 (OP)
My motherboard does not support this feature.
Anonymous
8/7/2025, 11:45:55 AM No.106173307
>>106173249
>that feature is being deprecated soon, many laptops don't even allow you to add custom keys anymore
Source?
Replies: >>106173336
Anonymous
8/7/2025, 11:48:42 AM No.106173324
>>106173057
*nobody except microsoft, glowfags, redhat and anybody they gave keys to
Replies: >>106173343
Anonymous
8/7/2025, 11:49:46 AM No.106173336
>>106173307
Indeed, source?
Anonymous
8/7/2025, 11:50:37 AM No.106173343
>>106173324
I enrolled my own keys doe.
Anonymous
8/7/2025, 12:00:10 PM No.106173375
>>106173044 (OP)
you need this this to run VMs?
Anonymous
8/7/2025, 12:02:21 PM No.106173390
>>106173113
you know, my gigabyte mobo bricked shortly after enabling secureboot...
Replies: >>106173403 >>106175143
Anonymous
8/7/2025, 12:04:21 PM No.106173402
>>106173044 (OP)
there is no impact on privacy, it's just an attempt to downgrade the PC from turing completeness to corporate policy completeness
Anonymous
8/7/2025, 12:04:24 PM No.106173403
>>106173113
>>106173390
Yeah you have to be careful. Arch wiki mentions you can brick your computer if you try to remove Microsoft keys.
Anonymous
8/7/2025, 12:07:21 PM No.106173417
>>106173229
>implying they wont leak again, and again, and again
Replies: >>106173505
Anonymous
8/7/2025, 12:12:57 PM No.106173457
IftnEMR
IftnEMR
md5: b82ca213a73f33f53970b2185e9c1d78🔍
>>106173044 (OP)
>Turn on secure boot
>Computer won't boot anymore
>MFW

Took me hours to fix, had to remove the CMOS battery and re-seat EVERYTHING, never touching that fucking shit again.
Replies: >>106173468 >>106173499
Anonymous
8/7/2025, 12:15:30 PM No.106173468
>>106173457
Probably depends on the computer. I never had any trouble at all except Arch installation media doesn't boot with secure boot on so I had to turn it off to install Arch. Kind of weird that it would stop you from booting completely though, it should at least let you into bios/uefi settings.
Replies: >>106173499
Anonymous
8/7/2025, 12:18:26 PM No.106173499
>>106173457
>>106173468
The point is in having a signed bootloader. the keys won't be freely tossed around because that defeats the purpose.
Anonymous
8/7/2025, 12:19:07 PM No.106173505
>>106173417
It's still more work for hackers anyway.
>No secure boot: just put the backdoored boot images in. User won't even know it's malware unless they store and check hashes and you can still exfiltrate data by the time they realize (if they ever do)
>Secure boot: find leaked keys somewhere (if they exist) and sign your malware with it. And if the person uses their own keys then hacker can't do anything
Anonymous
8/7/2025, 3:07:29 PM No.106174625
>>106173057
It's a joke, UEFIs are bug riddled messes shipped by indifferent vendors, there's probably a billion exploits around.
Replies: >>106175193
Anonymous
8/7/2025, 3:58:41 PM No.106175143
>>106173390
Your gigabyte mobo can brick by just being gigabyte. I had 3 gigabyte boards die on me.
Anonymous
8/7/2025, 4:04:14 PM No.106175193
>>106174625
Maybe I should just install coreboot
Anonymous
8/7/2025, 4:14:00 PM No.106175284
Anyone who DOESN'T use Secure Boot and BitLocker is a complete fucking faggot

Goes triple for any Troonix distro (so, ALL of them except Ubuntu) that can't even fucking figure dual booting in secure boot

Troonix lovers are brain dead
Replies: >>106175339
Anonymous
8/7/2025, 4:20:32 PM No.106175339
>>106175284
Microjeet fuck off