Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You forget to mention that secure boot can be disabled. And that there are Linux distributions that can handle secure boot.

To quote the Linux Foundation: "Linux and other open operating systems will be able to take advantage of secure boot if it is implemented properly in the hardware. This document is intended to describe how the UEFI secure boot specification can be implemented to interoperate well with open systems and to avoid adversely affecting the rights of the owners of those systems while providing compliance with proprietary software vendors' requirements." http://www.linuxfoundation.org/publications/making-uefi-secu...



> "You forget to mention that secure boot can be disabled."

Correct. But the steps to do so vary wildly from motherboard to motherboard and are not documented anywhere.

In fact, one of the things HispaLinux requested is that OEMs provide clear documentation of the technical steps required to disable SecureBoot.


Yes, I agree (although you cannot really blame Microsoft for this). But, to be honest, someone who is able to install Linux should also be able to roam through the Bios (which he/she should do anyway to check the settings, e.g. confirm the boot sequence). Plus, as far as I understand it, Linux can actually profit from secure boot, right?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: