commander@lemmy.world to Technology@lemmy.worldEnglish · 2 months agoMicrosoft gave FBI a set of BitLocker encryption keys to unlock suspects' laptops: Reports | TechCrunchtechcrunch.comexternal-linkmessage-square213linkfedilinkarrow-up11.31Karrow-down16
arrow-up11.3Karrow-down1external-linkMicrosoft gave FBI a set of BitLocker encryption keys to unlock suspects' laptops: Reports | TechCrunchtechcrunch.comcommander@lemmy.world to Technology@lemmy.worldEnglish · 2 months agomessage-square213linkfedilink
minus-square「黃家駒 Wong Ka Kui」 | (aka: 鳳凰院 凶真 Hououin Kyouma)@sh.itjust.workslinkfedilinkEnglisharrow-up3arrow-down4·2 months agoSame thing? You can add custom keys to secure boot.
minus-squarekittenzrulz123@lemmy.dbzer0.comlinkfedilinkEnglisharrow-up4·2 months agoThat doesn’t make it the same thing
minus-square「黃家駒 Wong Ka Kui」 | (aka: 鳳凰院 凶真 Hououin Kyouma)@sh.itjust.workslinkfedilinkEnglisharrow-up1·1 month agoBoth are different names for a process that ensures the boot process is loading the correct non-malicious code.
minus-squarekittenzrulz123@lemmy.dbzer0.comlinkfedilinkEnglisharrow-up2·1 month agoSecure boot verifies the system is booting correct code, verified boot can ensure total system integrity and can protect against tampering. Furthermore the Linux implementation of secure boot is very often in the least secure method.
Same thing?
You can add custom keys to secure boot.
That doesn’t make it the same thing
Both are different names for a process that ensures the boot process is loading the correct non-malicious code.
Secure boot verifies the system is booting correct code, verified boot can ensure total system integrity and can protect against tampering. Furthermore the Linux implementation of secure boot is very often in the least secure method.