this post was submitted on 07 Feb 2024
103 points (88.7% liked)

Technology

58063 readers
3052 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
top 12 comments
sorted by: hot top controversial new old
[–] [email protected] 6 points 7 months ago

Can I use it to root my unlockable boot loader android 9 phone ?

[–] [email protected] 14 points 7 months ago (1 children)

Just uninstall it and install Windows instead.

[–] [email protected] 10 points 7 months ago

I for one appreciate the switcheroo, and can only imagine “being butthurt” as the reason you got downvoted.

[–] [email protected] 23 points 7 months ago

clickbait title. basically, if your machine is already compromised in a severe way, here is another way how to compromise it further (for whatever reason)

[–] [email protected] 87 points 7 months ago* (last edited 7 months ago) (1 children)

The most useful quote to those familiar with the linux boot process:

“An attacker would need to be able to coerce a system into booting from HTTP if it's not already doing so, and either be in a position to run the HTTP server in question or MITM traffic to it,” Matthew Garrett, a security developer and one of the original shim authors, wrote in an online interview. “An attacker (physically present or who has already compromised root on the system) could use this to subvert secure boot (add a new boot entry to a server they control, compromise shim, execute arbitrary code).”

If an attack needs root then it doesn't matter. Your box is toast anyway. If you're using http boot without verification then you should have seen a MITM attack coming.

[–] [email protected] 53 points 7 months ago

I only let attackers with root privileges execute arbitrary code on my guest WiFi so I’m good.