Yes, shell access allows compromising various secure boot assumptions. It's also an app that takes untrusted user input and interprets it, and which has never been subject to any kind of security review, so not the best plan.
Power management, mobile and firmware developer on Linux. Security developer at Aurora. Ex-biologist. mjg59 on Twitter. Content here should not be interpreted as the opinion of my employer. Also on Mastodon.
no subject
Date: 2013-09-22 08:35 pm (UTC)