> The user doesn't. If you want to be able to use technologies like that you'll have to disable secure boot on the system first. What if I want to use such tools, but in same time still want to make sure the kernel and bootloader I'm using is not modified by any trojans? There should be a way for user to use his own keys for signing kernel modules he build himself.
Power management, mobile and firmware developer on Linux. Security developer at Aurora. Ex-biologist. mjg59 on Twitter. Content here should not be interpreted as the opinion of my employer. Also on Mastodon.
Re: What about tracing modules?
Date: 2012-06-01 01:19 pm (UTC)What if I want to use such tools, but in same time still want to make sure the kernel and bootloader I'm using is not modified by any trojans? There should be a way for user to use his own keys for signing kernel modules he build himself.