Does Microsoft's take on Secure Boot contemplate anti-modchip provisions? Some enthusiast boards have A/B switches for the BIOS which presumably go away. But current practice for non-socketed Flash BIOS is often to put a SPI header/pogopin target nearby (easier than JTAG).
There are a couple motivations for non-vendor BIOS reflashing; fixing the damn ACPI tables is surprisingly popular, as is removing miniPCIe blacklists. There seems to be a lot demand for inclusion of "I have a windows license" OEM blobs though. Putting a tiny hardware stumbling block in front of a prize (like free Windows or BD access) will industrialize the circumvention hardware. The PS3 hack made it very difficult to acquire Atmel USB microcontroller boards briefly.
Power management, mobile and firmware developer on Linux. Security developer at Aurora. Ex-biologist. mjg59 on Twitter. Content here should not be interpreted as the opinion of my employer. Also on Mastodon.
no subject
Date: 2012-02-16 12:55 am (UTC)There are a couple motivations for non-vendor BIOS reflashing; fixing the damn ACPI tables is surprisingly popular, as is removing miniPCIe blacklists. There seems to be a lot demand for inclusion of "I have a windows license" OEM blobs though. Putting a tiny hardware stumbling block in front of a prize (like free Windows or BD access) will industrialize the circumvention hardware. The PS3 hack made it very difficult to acquire Atmel USB microcontroller boards briefly.