commander@lemmy.world to Technology@lemmy.worldEnglish · 1 个月前Microsoft gave FBI a set of BitLocker encryption keys to unlock suspects' laptops: Reports | TechCrunchtechcrunch.comexternal-linkmessage-square207linkfedilinkarrow-up11.27Karrow-down15cross-posted to: politics@lemmy.worldtechnology@beehaw.orghackernews@lemmy.bestiver.se
arrow-up11.27Karrow-down1external-linkMicrosoft gave FBI a set of BitLocker encryption keys to unlock suspects' laptops: Reports | TechCrunchtechcrunch.comcommander@lemmy.world to Technology@lemmy.worldEnglish · 1 个月前message-square207linkfedilinkcross-posted to: politics@lemmy.worldtechnology@beehaw.orghackernews@lemmy.bestiver.se
minus-square「黃家駒 Wong Ka Kui」 | (aka: 鳳凰院 凶真 Hououin Kyouma)@sh.itjust.workslinkfedilinkEnglisharrow-up1·1 个月前Both are different names for a process that ensures the boot process is loading the correct non-malicious code.
minus-squarekittenzrulz123@lemmy.dbzer0.comlinkfedilinkEnglisharrow-up2·1 个月前Secure boot verifies the system is booting correct code, verified boot can ensure total system integrity and can protect against tampering. Furthermore the Linux implementation of secure boot is very often in the least secure method.
Both are different names for a process that ensures the boot process is loading the correct non-malicious code.
Secure boot verifies the system is booting correct code, verified boot can ensure total system integrity and can protect against tampering. Furthermore the Linux implementation of secure boot is very often in the least secure method.