Destide@feddit.uk to Games@lemmy.worldEnglish · 21 天前Battlefield 6 cheats day 1 of early access. Depite kernel level anti cheat, forced secure boot TPM 2.0youtu.beexternal-linkmessage-square208fedilinkarrow-up1471arrow-down19cross-posted to: gaming@beehaw.org
arrow-up1462arrow-down1external-linkBattlefield 6 cheats day 1 of early access. Depite kernel level anti cheat, forced secure boot TPM 2.0youtu.beDestide@feddit.uk to Games@lemmy.worldEnglish · 21 天前message-square208fedilinkcross-posted to: gaming@beehaw.org
minus-squareEggymatrix@sh.itjust.workslinkfedilinkEnglisharrow-up16arrow-down7·21 天前I get your pc, “tamper” it, then i install a fake bios that tells you all is well and that your tpm and secureboot and whatever else bullcrap they invent is still happy. See the problem?
minus-squareCorngood@lemmy.mllinkfedilinkEnglisharrow-up7arrow-down3·21 天前It won’t boot though, because the keys to decrypt the system are stored in the TPM. Sure you could replace the whole OS, but that’s going to be very obvious and won’t allow you access to the data.
minus-squarejjjalljs@ttrpg.networklinkfedilinkEnglisharrow-up10arrow-down1·21 天前If you have physical access you could go into the bios and turn off secure boot
minus-squarePHLAK@lemmy.worldlinkfedilinkEnglisharrow-up7arrow-down2·21 天前If you enable Secure Boot you should also set a BIOS password for this very reason.
minus-squareSaleh@feddit.orglinkfedilinkEnglisharrow-up12·21 天前So, if you set a bios password either way, which benefit does secureboot give?
minus-squarejjjalljs@ttrpg.networklinkfedilinkEnglisharrow-up5arrow-down1·21 天前I think you can reset a bios password by taking the CMOS battery out or something?
minus-squareAlphaOmega@lemmy.worldlinkfedilinkEnglisharrow-up4·21 天前Not sure if this works these days, but on older systems there was a reset bios config jumper and pulling the cmos battery.
minus-squareMiaou@jlai.lulinkfedilinkEnglisharrow-up1·21 天前Can’t access the bios with secure boot on (at least I could not on an old laptop I was refurbishing, thank god the owner could login into windows)
minus-squarejjjalljs@ttrpg.networklinkfedilinkEnglisharrow-up1·21 天前That’s unusual, I think. Every computer I’ve had that had it on, I was able to turn it off when I went to install Linux.
minus-squareatticus88th@lemmy.worldlinkfedilinkEnglisharrow-up2·21 天前Isnt it possible to have a recovery key? Isnt that technically a backdoor? Maybe the terms are not correct but there is a way in physically.
I get your pc, “tamper” it, then i install a fake bios that tells you all is well and that your tpm and secureboot and whatever else bullcrap they invent is still happy.
See the problem?
It won’t boot though, because the keys to decrypt the system are stored in the TPM.
Sure you could replace the whole OS, but that’s going to be very obvious and won’t allow you access to the data.
If you have physical access you could go into the bios and turn off secure boot
If you enable Secure Boot you should also set a BIOS password for this very reason.
So, if you set a bios password either way, which benefit does secureboot give?
I think you can reset a bios password by taking the CMOS battery out or something?
Not sure if this works these days, but on older systems there was a reset bios config jumper and pulling the cmos battery.
Can’t access the bios with secure boot on (at least I could not on an old laptop I was refurbishing, thank god the owner could login into windows)
That’s unusual, I think. Every computer I’ve had that had it on, I was able to turn it off when I went to install Linux.
Isnt it possible to have a recovery key? Isnt that technically a backdoor? Maybe the terms are not correct but there is a way in physically.