On Thu, Mar 05, 2026 at 09:31:16PM +0100, Thomas Schmitt wrote:
> Hi,
> 
> [email protected] wrote:
> > Ouch.
> 
> Habits of proprietary software. They decide what's on your USB stick.
> Not because of malice but because of sound economic interest (at our
> expense, usually).

That's why we love them, right? Now, as they realised they can't stamp
us out, they decided to colonize us (resp. our brains). I must admit,
they seem to be succeeding :-(

> > Is there any more systematic account for that?
> > Or a list of bad firmwares?
> 
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056998
> reveiled that Lenovo's EFI and Microsoft's Windows operating system
> placed files into the EFI partition's filesystem.

Oh, thanks a million.

> There is no indication that these files hamper booting or using the
> Debian ISO on the USB stick.

OK, so in "my" cases, the pilot error hypothesis is the most likely
(as often).

> > A way to find out (post mortem, perhaps?)
> 
> In case that the overall checksum of the image on USB stick does not
> match, you need to compare image file and USB stick content.
> 
> In order to verify that it's not a manipulation outside the EFI
> partition, consider to do something like this:
> Ask a partition editor or xorriso for the partition table of the
> image. Identify the block range of the EFI partition.
> Compute the checksum for the range from block 0 up to the start of the
> EFI partition. Compute the checksum for the range from first block
> after the EFI partition up to the image file end.
> Do the same two checksum computations with the USB stick base device
> (e.g. /dev/sdc) and compare the results.
> If these checksums match, then the alteration is only in the EFI
> partition.

[...]

Thanks for the very detailed (as always) recipe. I'll keep it close
to my heart and perhaps dry-run it before the next install party
(these days, luckily, this kind of party seems to be taking off
again!)

Cheers
-- 
t

Attachment: signature.asc
Description: PGP signature

Reply via email to