“Whether a proof of concept or not, Bootkitty marks an interesting move forward in the UEFI threat landscape, breaking the belief about modern UEFI bootkits being Windows-exclusive threats,” ESET researchers wrote. “Even though the current version from VirusTotal does not, at the moment, represent a real threat to the majority of Linux systems, it emphasizes the necessity of being prepared for potential future threats.”

  • Illecors@lemmy.cafe
    link
    fedilink
    English
    arrow-up
    5
    ·
    3 days ago

    It is a system one has to understand fully, i.e. not like ssh, where you can understand connecting to a remote host without bothering about key pairs, x11 forwading, etc.

    I was lucky enough to have figured out Gentoo enough where plugging in secure boot was just extending my own system update script. Admittedly, I don’t know how much other distros fight back.

    • Shdwdrgn@mander.xyz
      link
      fedilink
      English
      arrow-up
      7
      ·
      3 days ago

      I’m on Debian, they’ve been providing UEFI images for a number of years so everything should “just work”. In fact I have one server where things did just work and that’s the only system using UEFI. Two other servers of the same model and BIOS version completely failed after numerous attempts so I finally said screw it and just did a normal install.

      • Illecors@lemmy.cafe
        link
        fedilink
        English
        arrow-up
        2
        ·
        3 days ago

        Do you know how that works? Is it something like Ubuntu where Canonical uses some sort of chain from Microsoft or do you have to embed the cert they provide into UEFI yourself?

        • Shdwdrgn@mander.xyz
          link
          fedilink
          English
          arrow-up
          2
          ·
          2 days ago

          Sorry, I really haven’t a clue. I just know once in awhile it does work, but usually it fails for me.