🧵 Follow-post: Why Secure Boot / Secured-Core ≠Security
Why Secure Boot / “Secured-Core PCs” are not real security
Secure Boot only verifies who signed the bootloader — not whether the system is secure.
It protects the boot path, not the running system.
Malware, rootkits and exploits are injected after boot:
via browsers, drivers, kernel bugs, supply-chain attacks.
Secure Boot does nothing against that.
With TPM / Pluton, trust is anchored in hardware controlled by vendors, not users.
If you don’t control the root keys, you don’t control the system.
Keys can be revoked. Firmware can be updated remotely.
Suddenly, software that used to run on your own hardware no longer does.
That’s not security — that’s policy enforcement.
#SecureBoot #SecuredCore #TPM #Pluton #OpenSource #Linux
#DigitalSovereignty #VendorLockIn #ITSecurity #Firmware