Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×
Security

+ - Will secure boot cripple linux compatability->

Submitted by MojoMax
MojoMax (2552486) writes "The advent of Windows 8 is drawing ever nearer and recently we have learned that ARM devices installed with Windows 8 will not be able to disable the UEFI secure boot feature that many of us a deeply concerned about. However, UEFI is still a very real danger to linux and the freedom to use whichever OS you chose. Regardless of information for OEMs to enable customers to install their own keys, such as that published by the linux foundation (http://www.linuxfoundation.org/publications/making-uefi-secure-boot-work-with-open-platforms), there are still very serious and as yet unresolved issues with using secure boot and linux. These issues are best summarised quoting Matthew Garrett's words in his article "Why UEFI secure boot is difficult for Linux":

"Signing the kernel isn't enough. Signed Linux kernels must refuse to load any unsigned kernel modules. Virtualbox on Linux? Dead. Nvidia binary driver on Linux? Dead. All out of tree kernel modules? Utterly, utterly dead. Building an updated driver locally? Not going to happen. That's going to make some people fairly unhappy.""

Link to Original Source
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

Will secure boot cripple linux compatability

Comments Filter:

One can't proceed from the informal to the formal by formal means.

Working...