-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Michal Suchanek a écrit : >>> Without threat model we're speaking placebo. >>> >> Stoned Bootkit? > > Coreboot can prevent that as well as TPM can. >
Coreboot can be "stoned" as easily as your MBR since you can easily rewrite the MBR from the software. On MB that does not support online overwriting, you may require physical access (but since you already have to do some dirt work to replace your RO BIOS, that is not really difficult). > Any threat model which shows the advantage of TPM? > > Thanks > > Michal -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAkqMZ04ACgkQBV7eXqefhqheswCgmq2li5PD64osiSJROj9Db1iI ZYAAoK4bgTrOivSSjzHufIWvDlCzO/OF =Smrd -----END PGP SIGNATURE----- _______________________________________________ Grub-devel mailing list Grub-devel@gnu.org http://lists.gnu.org/mailman/listinfo/grub-devel