Jump in the discussion.

No email address required.

why does everything microsoft and the glowies do to our computers FRICKING ALWAYS END LIKE THIS AAAAHHHHHHHHHHHHHHHHHHH

:#pepereegun:

Jump in the discussion.

No email address required.

you know why

Jump in the discussion.

No email address required.

i mean yeah. but maybe i just wanted to pretend for a second that it was something besides the glowies wanting to anally frick us until massive prolapse....

:#marseysulk:

Jump in the discussion.

No email address required.

!codecels

Turns out us BIOS chads were right again

jewish lives matter because you don't need too take the computer apart and jump some contacts everytime you fat finger a new OS install

Jump in the discussion.

No email address required.

Have you ever had two undersized psus and had to jumper green and black?

Jump in the discussion.

No email address required.

I just made a nice bench power supply from a spare and added a switch to the green to ground. It's pretty nice I've never had a bench supply just made due with phone chargers and shit to work on building my electronics

Jump in the discussion.

No email address required.

Almost but @iStillMissEd fear the magic smoke so @iStillMissEd just coughed up 300 bucks for a proper psu

jewish lives matter until @Aevann chuds me again

Jump in the discussion.

No email address required.

Wow, why would you have to do that?

:marseyexcited:

Jump in the discussion.

No email address required.

You can run multiple power supplies and that wire is what tells them to turn on. So if you are short on hardware its like making your own.

Jump in the discussion.

No email address required.

Of course, privileged access is required, but that's not a problem in many cases.

:#marseynothingburger:

The only real way to ensure your device's security is to ensure it's physical security first and foremost. Once someone has access to the hardware in person, it's over.

Jump in the discussion.

No email address required.

Ehhh, I could totally see this being used with malware and signing a malicious kernel extension.

Jump in the discussion.

No email address required.

The Key Exchange Key, or KEK: This is the key that establishes trust between the operating system and the platform firmware.

>Kek

This was doomed from the start.

Jump in the discussion.

No email address required.

As the strings suggest, the keys were never intended to be used in production systems. Instead, AMI provided them to customers or prospective customers for testing. For reasons that aren't clear, the test keys made their way into devices from a nearly inexhaustive roster of makers. In addition to the five makers mentioned earlier, they include Aopen, Foremelife, Fujitsu, HP, Lenovo, and Supermicro.

:#carplazy:

Man, we've spent weeks setting this all up, and I'm spent. Release into production.

:#marseyletsgo:

Cyber drama aside, I always disable secure boot because I don't have to worry about 100s of users with admin access to their own OS installing random shit.

:marseyangel:

!codecels,if you've any sysadmin stories about this, do tell. :marseyexcitedgif:

Jump in the discussion.

No email address required.

secure boot is the antichrist

Jump in the discussion.

No email address required.

I have secure boot turn off so i can use nvidia drivers cant wait for Microsoft to use this as an excuse to strong arm manufacturers into making bios even more locked down and harder to install other OSs on :marseyitsallsotiresome: !linuxchads

Jump in the discussion.

No email address required.

Your PC isn't likely on this list anyway

Jump in the discussion.

No email address required.

Yes of course you are right Microsoft is only going to try to lock down the computers on that list yep yep

Jump in the discussion.

No email address required.

Yeah some dude leaking a private key totally means we need double extraprivate keys

Jump in the discussion.

No email address required.

It's like posting your password publicly and declaring that the entire idea of a password is the problem

:#marseybrainlet:

Jump in the discussion.

No email address required.

I miss normal BIOS :marseyboomer:


https://i.rdrama.net/images/17187151446911044.webp https://i.rdrama.net/images/17093267613293715.webp https://i.rdrama.net/images/17177781034384797.webp

Jump in the discussion.

No email address required.

Yeah it was really cool manually programming the BIOS to avoid known-faulty sectors on your hard drive innit

Jump in the discussion.

No email address required.

I mostly miss just being able to plug shit in or insert a CD and have it work.


https://i.rdrama.net/images/17187151446911044.webp https://i.rdrama.net/images/17093267613293715.webp https://i.rdrama.net/images/17177781034384797.webp

Jump in the discussion.

No email address required.

Live cds still exist

Jump in the discussion.

No email address required.

I don't, I like my security

Jump in the discussion.

No email address required.

Why? What kind of shady shit are you installing on your system?

Jump in the discussion.

No email address required.

BBC pegging simulator 3

Jump in the discussion.

No email address required.

:#marseydildo:

Jump in the discussion.

No email address required.

bidenomics smh

Jump in the discussion.

No email address required.

Oof Gigabyte is like 300 of those 500 models

Also I was surprised to see Dell on the list and then

>alienware

>alienware

>alienware

lol

Jump in the discussion.

No email address required.

If it's Gigabyte, then it's likely all of the major OEMs in the Windows world.

Remember that the private key was leaked, and one way of "getting in" was using the test key on production. I'm sure other mobo manufacturers like Asus, MSI, ASRock, and so on are affected because they simply ship them the hardware. It's up to Dell, HP, Lenovo, ASUS, and so on to properly configure their BIOS/UEFI. You'd think the OEMs would test such hardware and configure it to their standards as they're supposed to, right?

Jump in the discussion.

No email address required.

>malware wasn't an issue until some cute twink made it to sell the prevention

Jump in the discussion.

No email address required.

It's really just one big house of cards, isn't it?

Jump in the discussion.

No email address required.

Did you guys know you can just make a usb off github scripts to destroy someone's computer when you plug it in? I definitely don't have one of these for my enemies btw.

Jump in the discussion.

No email address required.

Jump in the discussion.

No email address required.

Link copied to clipboard
Action successful!
Error, please refresh the page and try again.