lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20251118170104.01dba6bf.michal.pecio@gmail.com>
Date: Tue, 18 Nov 2025 17:01:04 +0100
From: Michal Pecio <michal.pecio@...il.com>
To: Mauro Carvalho Chehab <mchehab+huawei@...nel.org>
Cc: Ricardo Ribalda <ribalda@...omium.org>, Laurent Pinchart
 <laurent.pinchart@...asonboard.com>, Hans de Goede <hansg@...nel.org>,
 Mauro Carvalho Chehab <mchehab@...nel.org>, linux-media@...r.kernel.org,
 linux-kernel@...r.kernel.org, linux-usb@...r.kernel.org, Greg Kroah-Hartman
 <gregkh@...uxfoundation.org>
Subject: Re: [PATCH 4/4] media: uvcvideo: Introduce allow_privacy_override

On Tue, 18 Nov 2025 15:09:16 +0100, Mauro Carvalho Chehab wrote:
> On other words, if someone has secure boot enabled, he can be more
> confident that a distro-vendor signed Kernel will honour the privacy
> LED, and not even the root can tamper with - as BIOS access to
> disable secure boot would be needed to change it - plus, booting a
> non-signed kernel.

IMHO users are better off trusting duct tape than any chain of trust,
and those with tinfoil hats already do.

Rational people with any clue will simply assume their computer broke
and put duct tape over the LED, carefully not to cover the lens ;)

Regards,
Michal

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ