A key on an encrypted disk can still prevent evil maid attacks, though an attacker with local access can still compromise the system. In the current system, an attacker with permissions required to read kernel memory can just ask the shim to boot their modified kernel. _______________________________________________ devel mailing list -- [email protected] To unsubscribe send an email to [email protected] Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/[email protected] Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure
- Suggestion: Use a unified kernel image by defaul... Sharpened Blade via devel
- Re: Suggestion: Use a unified kernel image ... Vitaly Zaitsev via devel
- Re: Suggestion: Use a unified kernel im... Sharpened Blade via devel
- Re: Suggestion: Use a unified kerne... Vitaly Zaitsev via devel
- Re: Suggestion: Use a unified k... Sharpened Blade via devel
- Re: Suggestion: Use a unified k... David Howells
- Re: Suggestion: Use a unif... Sharpened Blade via devel
- Re: Suggestion: Use a unif... Petr Pisar
- Re: Suggestion: Use a unified kernel image ... Roberto Ragusa
- Re: Suggestion: Use a unified kernel im... Demi Marie Obenour
- Re: Suggestion: Use a unified kerne... Neal Gompa
- Re: Suggestion: Use a unified k... Florian Weimer
- Re: Suggestion: Use a unif... Chris Murphy
- Re: Suggestion: Use a ... Sharpened Blade via devel
- Re: Suggestion: Use a ... Demi Marie Obenour
- Re: Suggestion: Use a ... Florian Weimer
- Re: Suggestion: Us... Demi Marie Obenour
