lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 3 Nov 2012 00:20:34 +0000 From: Matthew Garrett <mjg59@...f.ucam.org> To: "Eric W. Biederman" <ebiederm@...ssion.com> Cc: Alan Cox <alan@...rguk.ukuu.org.uk>, James Bottomley <James.Bottomley@...senPartnership.com>, Eric Paris <eparis@...isplace.org>, Jiri Kosina <jkosina@...e.cz>, Oliver Neukum <oneukum@...e.de>, Chris Friesen <chris.friesen@...band.com>, Josh Boyer <jwboyer@...il.com>, linux-kernel@...r.kernel.org, linux-security-module@...r.kernel.org, linux-efi@...r.kernel.org Subject: Re: [RFC] Second attempt at kernel secure boot support On Fri, Nov 02, 2012 at 03:03:02PM -0700, Eric W. Biederman wrote: > I don't want my system p0wned in the first place and I don't want to run > windows. Why should I trust Microsoft's signing key? There's no reason to. Systems that don't trust Microsoft's signing key have no reason to be concerned about Microsoft revocation. Unfortunately, that's not the only set of people we have to worry about. -- Matthew Garrett | mjg59@...f.ucam.org -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists