3 Oct 2024 |
raitobezarius | which is achieved ironically by making the manifest an executable | 21:01:35 |
ElvishJerricco | yes :P | 21:01:44 |
raitobezarius | someday, secureboot 2.0 will happen | 21:01:59 |
ElvishJerricco | other than SBAT by default, what would you change? | 21:02:38 |
raitobezarius | well | 21:02:45 |
raitobezarius | secureboot 2.0 is already a thing | 21:02:48 |
ElvishJerricco | oh? | 21:02:53 |
ElvishJerricco | didn't know that | 21:02:55 |
raitobezarius | ~6 months ago, there was a presentation / discussions among the secureboot folks | 21:03:06 |
ElvishJerricco | is there a link? | 21:03:14 |
raitobezarius | i think they want to fix things like the fact that's it very non-democratic / non user owned | 21:03:16 |
raitobezarius | In reply to @elvishjerricco:matrix.org is there a link? not that i'm aware of | 21:03:29 |
raitobezarius | probably if you infiltrate the UEFI forum | 21:03:37 |
raitobezarius | you can find the informations | 21:03:39 |
ElvishJerricco | heh bummer | 21:03:50 |
raitobezarius | classical :) | 21:03:57 |
emily | any chance of per-OS keys/security levels like Apple Silicon has? | 21:13:21 |
ElvishJerricco | TPM | 21:13:55 |
ElvishJerricco | just bind keys and stuff to measurements for your OS | 21:14:15 |
emily | that's not quite the same, but sure | 21:14:32 |
ElvishJerricco | what's different? | 21:14:40 |