That sounds awesome. I never understood how a TPM can figure out if an attacker can get the keys if the tpm is on the same machine. Does it check independently the signature of the application that asked for the keys?
That sounds awesome. I never understood how a TPM can figure out if an attacker can get the keys if the tpm is on the same machine. Does it check independently the signature of the application that asked for the keys?
I am curious as per the secure enclave part. Does it mean that they will be signing binaries? Does it mean that we will get secure boot support without self signing? Does it mean that there will be a signing system for the anticheats???
I object for the greek one.
We call it
Αμόγκους
Or
Αναμεσάμας
Follow up:
Ok so aparently 7z compression is the culprit. If I extract the file. There is a setup-stub.exe file that shows clear in there.
I got it from the official website.
I have read on the firefox forum that this particular anti-malware engine flags these like that. I just want to know to be sure. Is there somewhere where I can check if it was officially generated by firefox (other than the signature which seems legit)
:")
Finally! Some competition with Steam OS! Hopefully only good things will come out of this!
I can reliably play wii on an x230. I am pretty sure you can go ahead and play unless it is ps2 or xbox og or anything newer (wii/gamecube excluded)
It should be safe, although for the future, I’d recommend installing the os to a completely separate drive and changing boot device by uefi.
I am using it for gaming on windows. I will dual boot with a different os on seperate drives. For linux, i want something stable that won’t crash on wayland.
I used to do this while using windows 10 and arch on my laptop. Didnt have any issues. It is just if windows 11 might have an issue. Afaik from the above, my guess is that it just disables the checks whilst disabling secure boot.
Looks interesting. A bit scary enrolling keys because i am scared of accidentaly deleting the default ones (unless i am being unreasonable)
To be more clear, the swap of the oses (not swap as in the swap partition) will be done from bios by changing the boot drive/efi executable and toggling secure boot accordingly. Do you think this will work?
It is a condition where you are completely paralized and you can only observe things as they happen. No control of almost any muscles so no way to communicate with the outside world.
I am asking because I am looking to dual-boot with windows 11 which requires secure-boot afaik. I could disable it whilst switching (each os will be in it’s own drive with the corresponding bootloader) so any os will be on a different drive.
I am mentioning the NVIDIA drivers. That is because there are new kernel modules that are open source. Maybe kernel signage is not needed with those ones. That is why I am asking.
By not necessarily, do you mean that I need to enroll keys?
Are the new kernel modules planned to be included in the kernel and if so, will that mean there will be secure boot support?
Rip xeon servers (they will probably be fine but still)