That's present already. The obvious attack vector is then to boot an untrusted bootloader, fake up a trusted UEFI environment and launch Windows in the belief that it's secure.
Power management, mobile and firmware developer on Linux. Security developer at Aurora. Ex-biologist. mjg59 on Twitter. Content here should not be interpreted as the opinion of my employer. Also on Mastodon.
no subject
Date: 2011-09-21 06:08 pm (UTC)