315
Secure Boot is completely broken on 200+ models from 5 big device makers
(arstechnica.com)
This is a most excellent place for technology news and articles.
i heard that linux users dont rlly like secure boot
I don't speak for all Linux users, but it's not like we don't like the tech or the concept... We don't like it because a lot of the time it's just another way for Microsoft to throw around their weight, you need a valid key to sign your kernel images with to be able to boot another OS instead of Windows, and some motherboards don't support installing your own keys as trusted keys. But usually there are ways around that issue nowadays.
And also it's not an easy process if you're not an advanced user of sorts. You have to know what is entailed, what to use, where to store your keys safely, have a script to re-sign the kernel image every kernel update(which happens every week on something like Arch), etc.
ngl i got fedora secure boot working with microsoft uefi keys it required some tinkering
They don't like it because it's mostly implemented in microsofts favor. It's shipped with microsoft keys by default and needs to be disabled to boot a lot of linux distros. If there was a more unbiased way to load a new os like a default key setup routine at first boot or a preinstalled key for major linux distros they wouldn't be so hostile towards secure boot. The technology isn't bad and it's the only way to not have somebody temper with your system at rest without TPM.
i agree and makes sense
Which is dumb. Secure Boot does make sense (if handled correctly, unlike here).
agree???