> The user doesn't. If you want to be able to use technologies like that you'll have to disable secure boot on the system first. What if I want to use such tools, but in same time still want to make sure the kernel and bootloader I'm using is not modified by any trojans? There should be a way for user to use his own keys for signing kernel modules he build himself.
Re: What about tracing modules?
What if I want to use such tools, but in same time still want to make sure the kernel and bootloader I'm using is not modified by any trojans? There should be a way for user to use his own keys for signing kernel modules he build himself.