mastouille.fr est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Mastouille est une instance Mastodon durable, ouverte, et hébergée en France.

Administré par :

Statistiques du serveur :

582
comptes actifs

#SecureBoot

4 messages4 participants0 message aujourd’hui
IT News<p>This Week in Security: Sharepoint, Initramfs, and More - There was a disturbance in the enterprise security world, and it started with a Pw... - <a href="https://hackaday.com/2025/07/25/this-week-in-security-sharepoint-initramfs-and-more/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/07/25/this-w</span><span class="invisible">eek-in-security-sharepoint-initramfs-and-more/</span></a> <a href="https://schleuss.online/tags/thisweekinsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>thisweekinsecurity</span></a> <a href="https://schleuss.online/tags/hackadaycolumns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackadaycolumns</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/secureboot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>secureboot</span></a> <a href="https://schleuss.online/tags/sharepoint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sharepoint</span></a> <a href="https://schleuss.online/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a></p>
#cryptohagen<p>Microsoft has a signing key that many <a href="https://social.data.coop/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> distributions use to support <a href="https://social.data.coop/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecureBoot</span></a>, and that key expire on September 11, 2025</p><p>A replacement key has existed since 2023, but apparently - many systems don’t support it yet</p><p>Fixing this problem requires firmware updates from original equipment manufacturers (OEM) but there is a risk that not all OEMs will issue updates - especially those for older, or less popular devices<br><a href="https://www.techradar.com/pro/security/linux-users-are-about-to-face-another-major-microsoft-secure-boot-issue" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">techradar.com/pro/security/lin</span><span class="invisible">ux-users-are-about-to-face-another-major-microsoft-secure-boot-issue</span></a></p>
Interventions Numériques<p>Gros soucis en perspective (11 septembre) pour toutes les distributions Linux qui utilisent la clé SecureBoot fournie par Microsoft. Son certificat va expirer. </p><p><a href="https://lwn.net/SubscriberLink/1029767/08f1d17c020e8292/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">lwn.net/SubscriberLink/1029767</span><span class="invisible">/08f1d17c020e8292/</span></a></p><p><a href="https://piaille.fr/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecureBoot</span></a> <a href="https://piaille.fr/tags/microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microsoft</span></a> <a href="https://piaille.fr/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://piaille.fr/tags/fedora" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fedora</span></a> <a href="https://piaille.fr/tags/ubuntu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ubuntu</span></a></p>
Larvitz :fedora: :redhat:<p>Some Linux users might be interested, reading about this (Subscriber link, that bypasses the Paywall, since I find this information important to spread for awareness): </p><p><a href="https://lwn.net/SubscriberLink/1029767/0a550f0972703141/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">lwn.net/SubscriberLink/1029767</span><span class="invisible">/0a550f0972703141/</span></a> </p><p>„Linux users who have Secure Boot enabled on their systems knowingly or unknowingly rely on a key from Microsoft that is set to expire in September. After that point, Microsoft will no longer use that key to sign the shim first-stage UEFI bootloader that is used by Linux distributions to boot the kernel with Secure Boot. But the replacement key, which has been available since 2023, may not be installed on many systems; worse yet, it may require the hardware vendor to issue an update for the system firmware, which may or may not happen.“</p><p><a href="https://burningboard.net/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://burningboard.net/tags/secureboot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>secureboot</span></a> <a href="https://burningboard.net/tags/microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microsoft</span></a> <a href="https://burningboard.net/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://burningboard.net/tags/servicetweet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>servicetweet</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Gigabyte" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Gigabyte</span></a> motherboards vulnerable to <a href="https://mastodon.thenewoil.org/tags/UEFI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UEFI</span></a> <a href="https://mastodon.thenewoil.org/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> bypassing <a href="https://mastodon.thenewoil.org/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecureBoot</span></a></p><p><a href="https://www.bleepingcomputer.com/news/security/gigabyte-motherboards-vulnerable-to-uefi-malware-bypassing-secure-boot/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/gigabyte-motherboards-vulnerable-to-uefi-malware-bypassing-secure-boot/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/mobo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mobo</span></a> <a href="https://mastodon.thenewoil.org/tags/motherboard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>motherboard</span></a></p>
Anarchadyksabled / Anarchodéglingouinax<p>Coucou,</p><p>j'ai récup à la poubelle un hp élite d'entreprise sous windows 11, que j'aimerais évidemment passer sur debian, sauf qu'il y a un mot de passe sur le bios qui m'empêche d'y accéder, et vu que j'ai récup l'ordi à la schlague je peux pas contacter le constructeur. Le bios est uniquement accessible via windows, c'est protégé via hp secure boot.</p><p>Quelles pistes pour virer le mot de passe et booter sur ma clé d'installation la linuxteam ?</p><p>J'ai vu la possibilité de démonter l'ordi et enlever la batterie de la carte mère mais j'ai vu des avis divergents sur cette technique.</p><p><a href="https://corneill.es/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://corneill.es/tags/Debian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Debian</span></a> <a href="https://corneill.es/tags/BIOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BIOS</span></a> <a href="https://corneill.es/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecureBoot</span></a> <a href="https://corneill.es/tags/LibreTips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LibreTips</span></a></p>
Linux Guides<p>Wollt Ihr euren Rechner vor unerlaubtem Zugriff schützen, ist die Festplattenverschlüsselung um einiges effektiver.<br>Solange Ihr bspw. kein Journalist in einem falschen Land/etc. seid, ist SecureBoot meines Erachtens sowieso nicht nützlich. Und wenn doch, dann seid Ihr mit Tails-Linux besser dran :)</p><p><a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://mastodon.social/tags/secureboot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>secureboot</span></a> </p><p>(2/2)</p>
Geekland<p>Ubuntu Security ‘Oversight’ Lets Attackers Access Encrypted Systems <a href="https://mastodon.social/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <a href="https://mastodon.social/tags/dracut" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dracut</span></a> <a href="https://mastodon.social/tags/secureboot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>secureboot</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/zfs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zfs</span></a><br><a href="https://www.omgubuntu.co.uk/2025/07/ubuntu-security-initramfs-bypass-encryption" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">omgubuntu.co.uk/2025/07/ubuntu</span><span class="invisible">-security-initramfs-bypass-encryption</span></a></p>
Laurent Cheylus<p>A good Introduction to Secure Boot and Shim in Linux: what they are, why they matter, and how they affect your Linux system’s boot process <a href="https://bsd.network/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://bsd.network/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecureBoot</span></a> <a href="https://itsfoss.com/secure-boot-shim-file/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">itsfoss.com/secure-boot-shim-f</span><span class="invisible">ile/</span></a></p>
heise Security<p>Vorbereiten auf Einschlag: Microsoft warnt vor Secure-Boot-Zertifikat-Update</p><p>"Bereite dich auf das erste globale, großflächige Secure-Boot-Zertifikat-Update vor", warnt Microsoft. Nicht nur Windows ist betroffen.</p><p><a href="https://www.heise.de/news/Vorbereiten-auf-Einschlag-Microsoft-warnt-vor-Secure-Boot-Zertifikat-Update-10461866.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Vorbereiten-auf-</span><span class="invisible">Einschlag-Microsoft-warnt-vor-Secure-Boot-Zertifikat-Update-10461866.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://social.heise.de/tags/macOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macOS</span></a> <a href="https://social.heise.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://social.heise.de/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecureBoot</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a> <span class="h-card" translate="no"><a href="https://feddit.org/c/de_edv" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>de_edv</span></a></span></p>
The New Oil<p>Found in the wild: 2 <a href="https://mastodon.thenewoil.org/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecureBoot</span></a> exploits. <a href="https://mastodon.thenewoil.org/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> is patching only 1 of them.</p><p><a href="https://arstechnica.com/security/2025/06/unearthed-in-the-wild-2-secure-boot-exploits-microsoft-patches-only-1-of-them/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">06/unearthed-in-the-wild-2-secure-boot-exploits-microsoft-patches-only-1-of-them/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
openSUSE Linux<p>Unified <a href="https://fosstodon.org/tags/Kernel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kernel</span></a> Images in <a href="https://fosstodon.org/tags/openSUSE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openSUSE</span></a>: stronger boot, simplified structure. 🔐 Register for the <a href="https://fosstodon.org/tags/openSUSE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openSUSE</span></a> Conference and <a href="https://fosstodon.org/tags/learn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>learn</span></a> more. <a href="https://fosstodon.org/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecureBoot</span></a> <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://events.opensuse.org/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">events.opensuse.org/</span><span class="invisible"></span></a></p>
Marcus "MajorLinux" Summers<p>That's one way of going about that.</p><p>Found in the wild: 2 Secure Boot exploits. Microsoft is patching only 1 of them. </p><p><a href="https://arstechnica.com/security/2025/06/unearthed-in-the-wild-2-secure-boot-exploits-microsoft-patches-only-1-of-them/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">06/unearthed-in-the-wild-2-secure-boot-exploits-microsoft-patches-only-1-of-them/</span></a></p><p><a href="https://toot.majorshouse.com/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecureBoot</span></a> <a href="https://toot.majorshouse.com/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://toot.majorshouse.com/tags/Patching" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patching</span></a> <a href="https://toot.majorshouse.com/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://toot.majorshouse.com/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://toot.majorshouse.com/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://toot.majorshouse.com/tags/Tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tech</span></a></p>
DansLeRuSH ᴱᶰ<p>« Not-So-Secure <a href="https://floss.social/tags/Boot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Boot</span></a> : 2 <a href="https://floss.social/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecureBoot</span></a> Exploits Discovered » 🚨</p><p>› <a href="https://linuxsecurity.com/features/2-secure-boot-exploits-discovered" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">linuxsecurity.com/features/2-s</span><span class="invisible">ecure-boot-exploits-discovered</span></a></p><p><a href="https://floss.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://floss.social/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://floss.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a></p>
Marco Ivaldi<p><a href="https://infosec.exchange/tags/Hydroph0bia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hydroph0bia</span></a> (CVE-2025-4275) - a trivial <a href="https://infosec.exchange/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecureBoot</span></a> bypass for UEFI-compatible firmware based on Insyde <a href="https://infosec.exchange/tags/H2O" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>H2O</span></a>, part 1</p><p><a href="https://coderush.me/hydroph0bia-part1/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">coderush.me/hydroph0bia-part1/</span><span class="invisible"></span></a></p>
ADMIN magazine<p>With a focus on usability, <span class="h-card" translate="no"><a href="https://fosstodon.org/@almalinux" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>almalinux</span></a></span> OS 10 has been released<br><a href="https://www.admin-magazine.com/News/AlmaLinux-OS-10-Released?utm_source=mam" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">admin-magazine.com/News/AlmaLi</span><span class="invisible">nux-OS-10-Released?utm_source=mam</span></a><br><a href="https://hachyderm.io/tags/EnterpriseLinux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EnterpriseLinux</span></a> <a href="https://hachyderm.io/tags/AlmaLinux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AlmaLinux</span></a> <a href="https://hachyderm.io/tags/RHEL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RHEL</span></a> <a href="https://hachyderm.io/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://hachyderm.io/tags/OpenSSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSSH</span></a> <a href="https://hachyderm.io/tags/sudo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sudo</span></a> <a href="https://hachyderm.io/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecureBoot</span></a></p>
iX Magazin<p>iX-Workshop: Sicherer Betrieb von Windows 11 in Unternehmen</p><p>Lernen Sie an praktischen Beispielen, wie Sie Windows 11 Pro und Enterprise in Ihrem Unternehmen sicher und effektiv einsetzen.</p><p><a href="https://www.heise.de/news/iX-Workshop-Sicherer-Betrieb-von-Windows-11-in-Unternehmen-10407547.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/iX-Workshop-Sich</span><span class="invisible">erer-Betrieb-von-Windows-11-in-Unternehmen-10407547.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/iXWorkshops" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iXWorkshops</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecureBoot</span></a> <a href="https://social.heise.de/tags/Verschl%C3%BCsselung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Verschlüsselung</span></a> <a href="https://social.heise.de/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://cloudisland.nz/@aurynn" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>aurynn</span></a></span> the problem is that <a href="https://infosec.space/tags/vendors" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vendors</span></a> have neither interest nor incentive to work with 3rd party <a href="https://infosec.space/tags/ROMs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ROMs</span></a> like <span class="h-card" translate="no"><a href="https://fosstodon.org/@LineageOS" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>LineageOS</span></a></span> nor <span class="h-card" translate="no"><a href="https://grapheneos.social/@GrapheneOS" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>GrapheneOS</span></a></span>.</p><ul><li>If it was my decision there would be a legal <a href="https://infosec.space/tags/mandate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mandate</span></a> to <a href="https://infosec.space/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://infosec.space/tags/Firmware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firmware</span></a>, <a href="https://infosec.space/tags/Hardware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hardware</span></a> and release the <a href="https://infosec.space/tags/keys" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>keys</span></a> for any <em>"<a href="https://infosec.space/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecureBoot</span></a>"</em> mechanism once a <a href="https://infosec.space/tags/device" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>device</span></a> doesn't get first party updates that are less than a week old, but that would require <span class="h-card" translate="no"><a href="https://ec.social-network.europa.eu/@EUCommission" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>EUCommission</span></a></span>, <span class="h-card" translate="no"><a href="https://respublicae.eu/@europarl_en" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>europarl_en</span></a></span> and/or <span class="h-card" translate="no"><a href="https://social.bund.de/@Bundesregierung" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Bundesregierung</span></a></span> to care and be willing to enforce that!</li></ul>
iX Magazin<p>iX-Workshop: Sicherer Betrieb von Windows 11 in Unternehmen</p><p>Lernen Sie an praktischen Beispielen, wie Sie Windows 11 Pro und Enterprise in Ihrem Unternehmen sicher und effektiv einsetzen.</p><p><a href="https://www.heise.de/news/iX-Workshop-Sicherer-Betrieb-von-Windows-11-in-Unternehmen-10373769.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/iX-Workshop-Sich</span><span class="invisible">erer-Betrieb-von-Windows-11-in-Unternehmen-10373769.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/iXWorkshops" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iXWorkshops</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecureBoot</span></a> <a href="https://social.heise.de/tags/Verschl%C3%BCsselung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Verschlüsselung</span></a> <a href="https://social.heise.de/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
⊥ᵒᵚ⁄Cᵸᵎᶺᵋᶫ∸ᵒᵘ ☑️<p><a href="https://fwupd.github.io/libfwupdplugin/uefi-db.html" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">fwupd.github.io/libfwupdplugin</span><span class="invisible">/uefi-db.html</span></a></p><p>" it may be impossible to install existing Linux releases on newer machines "</p><p>More anticompetitive shit from your favourite neighbourhood convicted abuser, <a href="https://qoto.org/tags/microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microsoft</span></a></p><p><a href="https://qoto.org/tags/efi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>efi</span></a> <a href="https://qoto.org/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://qoto.org/tags/secureBoot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>secureBoot</span></a></p>