Skip to main content

All Questions

Tagged with
0votes
0answers
117views

The Boot Process - Sequence of Events, Boot Integrity Checks, and BitLocker OS Volume Encryption

Apologies if any of these questions have been answered previously. Also, apologies for the sheer number of questions asked here. I've done some digging, and have been unable to find a good resource ...
user309532's user avatar
2votes
1answer
744views

In a secure boot bootloader chain, does a bootloader image contain the RootCA certificate of the next bootloader?

This is coming from Qualcomm's Secure Boot explanation. https://www.qualcomm.com/content/dam/qcomm-martech/dm-assets/documents/secure-boot-image-authentication_11.30.16.pdf Within it, it explains that ...
itsmarziparzi's user avatar
2votes
1answer
274views

How do you boot from the network using https?

How do you boot a Linux live image from a CDN using Https as boot protocol? The reason for netbooting using a CDN would be to start fresh with a non persistent operating system image. Booting fresh ...
Christian's user avatar
1vote
1answer
217views

Is it possible to allow only a certain secure USB boot media to boot an UEFI system?

I want to restrict all USB boot media from my system, except for a certain USB boot drive that I declare secure via a certain key. Is this possible using UEFI/Secure Boot/TPM? Maybe via TPM? TPM gets ...
JohnnyFromBF's user avatar
1vote
0answers
250views

Is grub implementation of secure boot inherently flawed?

Definitions Grub is the second stage bootloader often found in Linux distributions. shim is the first bootloader ran by the ROM firmware. It is signed by Microsoft. ROM firmware is the code embedded ...
TheMeaningfulEngineer's user avatar
15votes
6answers
9kviews

What's stopping someone from copying my HDD/SSD?

Let's say I have to leave my computer unattended and turned off for a while with some strangers, is it possible for someone to clone my HDD and SSD data?
Gem's user avatar
  • 275
2votes
1answer
872views

Understanding Secure Boot

I'm trying to understand the secure boot process of an OS but there are few points I can't wrap my head around. At a high level, afaik, secure boot ensures that the loaded OS is authenticated by its ...
SpiderRico's user avatar
2votes
1answer
3kviews

Why authenticated boot not Secure boot?

Context: Secure boot is one of the important elements of Trusted Computing in computer system. One variety of the Secure boot is authenticated boot. While secure boot prevent the boot of a non trusted ...
Lavender's user avatar

close