data1701d (He/Him)

“Life forms. You precious little lifeforms. You tiny little lifeforms. Where are you?”

- Lt. Cmdr Data, Star Trek: Generations

  • 36 Posts
  • 309 Comments
Joined 2 years ago
cake
Cake day: March 7th, 2024

help-circle

  • I mean, while the ownership of the franchise is legit concerning and I am worried about where it’s going with the end of LD and PRO, at least SNW has managed to get in some good ones, especially Ad Astra Per Aspera and Pelia bluntly calling Star Trek “the whole no-money, socialist utopia thing”.

    There’s certainly been some gaffes, and I’ve been driven a little nuts by the relationship stuff going on in S3, but there’s still strong stuff in that show for now (granted, I’ve only watched up to S3 E8 so far). At the very least, it got some last words in before we possibly hit a dark age for while.



  • Young man, I see profits are down, I said
    Young man, workers leaving the ground, I said
    Young man, 'cause you’re in hoo-man town, I said
    There’s no need to be un-Ferengi
    Young man, there’s a person in town, I said
    Young man, when you’re short on latinum you will
    See him and I’m sure you will find
    Miserable days and bad times

    It’s time to get probed by Brunt F.C.A.
    It’s time to get probed by Brunt F.C.A.
    He’ll do everything young entrepreneurs fear
    You can’t hang with other Ferengi boys
    It’s time to get probed by Brunt F.C.A.
    It’s time to get probed by Brunt F.C.A.
    You won’t have shirts to clean, you won’t have a good meal
    Your bank account is gonna reel.

    (These days, I normally wouldn’t want to reference Village People, but this parody just works so well that I had to forget my political rage for a second and just get it out of my mind.)













  • That’s precisely why secure boot and TPMs exist - the TPM can store the keys to decrypt the drives and won’t give them unless the signed shim executable can be verified; the shim executable then checks the kernel images, options, and DKMS drivers’ signatures as well. If the boot partition has been tampered with, the drive won’t decrypt except by manual override.

    The big problem is Microsoft controls the main secure boot certificate authority, rather than a standards body. This means that either a bad actor stealing the key or Microsoft itself could use a signed malicious binary used to exploit systems.

    Still, it’s at least useful against petty theft.

    TPM sniffing attacks seem possible, but it looks like the kernel uses parameter and session encryption by default to mitigate that: https://docs.kernel.org/security/tpm/tpm-security.html