Key compromises

Date: 2011-09-24 02:49 pm (UTC)
From: (Anonymous)
Of course the argument about compromised code reaches to the heart of the argument: the integrity of the keys.

Sooner or later sombody will leak, steal or break the signing keys. The malware authors have a strong economic incentive to try this, whether by technical means or social engineering.

Once the signing keys are compromised (and it is an absolute certainty that they will be at some point) then we are all worse off, as the malware author can now craft a trusted bootloader that we cannot reject.
If you don't have an account you can create one now.
HTML doesn't work in the subject.
More info about formatting

If you are unable to use this captcha for any reason, please contact us by email at support@dreamwidth.org

Profile

Matthew Garrett

About Matthew

Power management, mobile and firmware developer on Linux. Security developer at Aurora. Ex-biologist. [personal profile] mjg59 on Twitter. Content here should not be interpreted as the opinion of my employer. Also on Mastodon.

Expand Cut Tags

No cut tags