commander@lemmy.world to Technology@lemmy.worldEnglish · 1 day agoMicrosoft gave FBI a set of BitLocker encryption keys to unlock suspects' laptops: Reports | TechCrunchtechcrunch.comexternal-linkmessage-square194linkfedilinkarrow-up11.2Karrow-down15cross-posted to: privacy@lemmy.mltechnology@beehaw.orgtechnology@hexbear.net
arrow-up11.2Karrow-down1external-linkMicrosoft gave FBI a set of BitLocker encryption keys to unlock suspects' laptops: Reports | TechCrunchtechcrunch.comcommander@lemmy.world to Technology@lemmy.worldEnglish · 1 day agomessage-square194linkfedilinkcross-posted to: privacy@lemmy.mltechnology@beehaw.orgtechnology@hexbear.net
minus-squarekittenzrulz123@lemmy.dbzer0.comlinkfedilinkEnglisharrow-up2·5 hours agoSecure boot verifies the system is booting correct code, verified boot can ensure total system integrity and can protect against tampering. Furthermore the Linux implementation of secure boot is very often in the least secure method.
Secure boot verifies the system is booting correct code, verified boot can ensure total system integrity and can protect against tampering. Furthermore the Linux implementation of secure boot is very often in the least secure method.