On Wed, Aug 19, 2009 at 10:57 PM, Duboucher Thomas<tho...@duboucher.eu> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Michal Suchanek a écrit :
>>>> Without threat model we're speaking placebo.
>>>>
>>> Stoned Bootkit?
>>
>> Coreboot can prevent that as well as TPM can.
>>
>
> Coreboot can be "stoned" as easily as your MBR since you can easily
> rewrite the MBR from the software. On MB that does not support online
> overwriting, you may require physical access (but since you already have
> to do some dirt work to replace your RO BIOS, that is not really difficult).
You can remove TPM too
>
>> Any threat model which shows the advantage of TPM?
>>
>> Thanks
>>
>> Michal
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.9 (MingW32)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
>
> iEYEARECAAYFAkqMZ04ACgkQBV7eXqefhqheswCgmq2li5PD64osiSJROj9Db1iI
> ZYAAoK4bgTrOivSSjzHufIWvDlCzO/OF
> =Smrd
> -----END PGP SIGNATURE-----
>
>
> _______________________________________________
> Grub-devel mailing list
> Grub-devel@gnu.org
> http://lists.gnu.org/mailman/listinfo/grub-devel
>



-- 
Regards
Vladimir 'phcoder' Serbinenko

Personal git repository: http://repo.or.cz/w/grub2/phcoder.git


_______________________________________________
Grub-devel mailing list
Grub-devel@gnu.org
http://lists.gnu.org/mailman/listinfo/grub-devel

Reply via email to