#Secureboot

Mr T-BoneMrTbone_se
2026-01-10

🥩🥩New Blog from Mr T-Bone: Update Secure Boot Certificate by using Intune Remediation
Don’t let Secure Boot catch you off guard! Learn to update certificates with Intune – easy & secure! MrTbone_se


👉👉 tbone.se/2026/01/09/update-sec

LΞX/NØVΛ 🇪🇺 :lesbian_flag:lexinova@toot.community
2026-01-09

Cachy os server ... coool i will never install this crap on my server without secureboot, server are one of the most critical infrastructure, exposed extensively to attack no secureboot = no installation.

Any amount of BS will not change this simple and easy to understand fact.

Server must be protected, not exposed to malware that where made a nightmare to develop with the help of secureboot.

#secureboot #security #linux #cachyos @CachyOS

Shadowcloud ΘΔ - 🇩🇪🐲🐾🔞shadowcloud169.bsky.social@bsky.brid.gy
2026-01-08

Yup, definitely spicy... It works with just power connected, but since the BIOS battery is dead and I can't replace it, it always restores the default settings, which enables secure boot again, which is dumb. Perhaps I can find a #Linux Distro that works with #SecureBoot, but not sure yet.

RE: https://bsky.app/profile/did:plc:4nz4j7p3icydlttmfvbgff2o/post/3mbwbaav7z22x

A photo of a bloated batteryA photo of a bloated battery with a laptop on the left side with stickers on it.A photo of a bloated battery inside the laptopA photo of a bloated battery inside a laptop
2026-01-05

I unknowingly lied about having finished my Fedora setup on my work laptop. I forgot about OBS and the DroidCam plugin for it. It was a pain in the butt until I figured out that the v4l2loopback module wasn’t loaded due to secure boot being enabled (which is weird to me since it didn’t make any problems on my desktop)

#linux #fedora #obs #droidcam #secureboot

2026-01-05

Ubuntu boot manager does not open Windows 11 #boot #dualboot #secureboot #windows11

askubuntu.com/q/1562507/612

2026-01-05
Renewable Sexcellencediffrentcolours@tech.lgbt
2026-01-03

OK so apart from breaking things when I converted the partition table from MBR to GPT, switching my #Debian laptop over to #UEFI booting went pretty well.

I shaved 200MB off the 1GB /boot partition to create space for an EFI partition, and installed grub-efi-amd64-signed, then ran grub-install. Now I have UEFI and #SecureBoot working!

$ sudo mokutil --sb-state
SecureBoot enabled

On its own it's not much but it feels like an achievement.

Must remember that SystemRescueCD isn't good at networking...

Hacker Newsh4ckernews
2026-01-03
@testeraphy@fedi.my.id akibat dahulu pernah dengar dari orang yang dahulu pernah baca (zaman awal ketika distro2 belum punya #secureboot key). Padahal itu era sudah lama sekali.
Mastodon Trends South AfricatrendsZA@mastodon.africa
2025-12-28

The following hashtags are trending across South African Mastodon instances:

#battlestargalactica
#merrychristmas
#bios
#secureboot
#diy

Based on recent posts made by non-automated accounts. Posts with more boosts, favourites, and replies are weighted higher.

Mastodon Trends South AfricatrendsZA@mastodon.africa
2025-12-28

The following hashtags are trending across South African Mastodon instances:

#books
#amreading
#christmas
#Wordle
#wordle1653
#merrychristmas
#bios
#secureboot
#quotes
#forgiveness

Based on recent posts made by non-automated accounts. Posts with more boosts, favourites, and replies are weighted higher.

2025-12-28

Due to my setting Secure Boot mode in my BIOS to "Windows" rather than "Other OS," Windows encrypted both my boot drive and my RAID without my asking, and it broke the "Windows Activation," too. I could not switch Secure Boot back to "Other OS" without losing access to my hard disks. "Turn off BitLocker" on the RAID drive has been running for a couple of hours so far, with no indication of when it will finish.

#MerryChristmas #BIOS #SecureBoot

2025-12-28

Local Attack: A local attacker with sufficient privileges can modify EFI Variables or the EFI partition using a live Linux USB to alter the boot order and load a compromised shim, executing privileged code without disabling Secure Boot."
#secureboot #ossec #netboot
reddit.com/r/linux/comments/1a

Moved the workstation CPU/RAM/disk/GPU to the motherboard previously used for the #proxmox server. Now it’s in a (nice) case instead of a bench 😅

Manage to do all the changes without breaking #SecureBoot once 🙂

I was a bit scared because after the change I had some instabilities (lockups, failure to boot), turns out, I can’t use XMP with the RAM and motherboard combination 🤷‍♂️

Unfortunately, I can’t yet bring the proxmox machine back up, as the PSU does not fit in the (new) case I have for it 🤦‍♂️

#computing #weekend

2025-12-24

Dual boot Windows11/Ubuntu 25.10 Desktop or Ubuntu 24.04 Desktop with Secure Boot #dualboot #systeminstallation #secureboot

askubuntu.com/q/1562191/612

2025-12-19

Is your team interested in #UEFI Secure Boot and Intel Root of Trust? Do you want to understand how they actually work in real systems, and how they are attacked and defended in practice? Join our advanced hands-on training based on workshops already delivered to engineering and security teams, covering UEFI #SecureBoot internals, UEFI variables, and real-world vulnerabilities such as #BootHole, #BitPixie, recent #GRUB2 CVEs, and Intel Root of Trust weaknesses.

2025-12-19

FreeBSD, Debian и Secure Boot

В этом руководстве описывается процесс настройки FreeBSD 15 для работы в режиме Secure Boot. Создадим Machine Owner Key, установим его в UEFI, подпишем загрузчик. Secure Boot: [ ON ]

habr.com/ru/articles/978240/

#FreeBSD #secureboot #загрузчик #efi

Steffen Mutterghul@nerdculture.de
2025-12-18

@duxsco Für alle, die nach Quellen gefragt haben, wohin die Reise bei Secure Boot / TPM / Pluton geht – hier eine kleine, gut belegte Auswahl:

Microsoft Pluton Sicherheitsprozessor (offizielle Doku)
learn.microsoft.com/de-de/wind

Heise: Microsofts Sicherheitscontroller Pluton kommt auch in Intel-CPUs
heise.de/news/Microsoft-Sicher

UEFI / Secure Boot – Kritik und Geschichte
en.wikipedia.org/wiki/UEFI#Cri

Secure Boot – Hintergrund (Wikipedia)
en.wikipedia.org/wiki/UEFI

TPM & Secure Boot – Ängste, Zweifel und Kritik (deutsch)
curius.de/2022/02/kollektive-v

Niemand behauptet, Secure Boot sei per se böse.
Die Frage ist, wer langfristig die Root-Keys und die Policy kontrolliert.

Sicherheit ohne Nutzersouveränität ist Policy Enforcement.

#SecureBoot #TPM #Pluton #DigitaleSouveränität #OpenSource #Linux #VendorLockIn #ITSecurity

Steffen Mutterghul@nerdculture.de
2025-12-18

@IncredibleLaser The #TLS analogy doesn’t hold:

TLS is a #protocol where I can run my own #CA, replace trust anchors, or opt out entirely.
#SecureBoot is part of a platform-wide chain of trust.

The problem isn’t Secure Boot per se. It’s that the root of trust is moving away from the user!!!

With Secured-Core PCs, Pluton, OEM firmware policies and enforced updates, the “platform owner” increasingly becomes the vendor, not the person managing the device.

Once Secure Boot is no longer fully disable-able and keys are fused or policy-enforced, custom keys stop being a right and become an exception :blobcatangery:

Apple already shows where this leads: security as control, not choice 😩

Steffen Mutterghul@nerdculture.de
2025-12-18

🧵 Follow-post: Why Secure Boot / Secured-Core ≠ Security

Why Secure Boot / “Secured-Core PCs” are not real security

Secure Boot only verifies who signed the bootloader — not whether the system is secure.
It protects the boot path, not the running system.

Malware, rootkits and exploits are injected after boot:
via browsers, drivers, kernel bugs, supply-chain attacks.
Secure Boot does nothing against that.

With TPM / Pluton, trust is anchored in hardware controlled by vendors, not users.
If you don’t control the root keys, you don’t control the system.

Keys can be revoked. Firmware can be updated remotely.
Suddenly, software that used to run on your own hardware no longer does.

That’s not security — that’s policy enforcement.

#SecureBoot #SecuredCore #TPM #Pluton #OpenSource #Linux
#DigitalSovereignty #VendorLockIn #ITSecurity #Firmware

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst