Bootstrappin' Boogie: Why Your Secure Boot Might Not Be So Secure
Listen now
Description
Ned and Chris explore a newly discovered flaw in UEFI Secure Boot that’s led to a critical OEM blunder that allows rootkit attacks, and the only fix is a potentially daunting firmware update. Secure Boot’s Achilles’ Heel Ned and Chris dive into a freshly uncovered flaw in the Secure Boot process of PCs using UEFI firmware. They trace the evolution of boot processes from ENIAC’s manual grind to today’s automated systems, highlighting the crucial role of cryptographic keys in blocking unauthorized code. Along the way, they expose a serious blunder where some OEMs carelessly included untrusted platform keys in their UEFI firmware, opening the door to rootkit attacks. The fix? A firmware update—if you’re brave enough to handle it. Links Binarly postKeys in the Intel Boot ProcessHow Bootguard worksSecuring the Boot ProcessBootstrappingX86 Boot Process with BIOSBlackLotus UEFI Bootkit
More Episodes
 Step into the Wild World of Telephones! 🛠️📞In this episode of Chaos Lever, we’re dialing up a fascinating exploration of telephony with special guest Sarah Autumn! Sarah, a volunteer engineer at the Connections Museum in Seattle, takes us on a journey through the evolution of telephone systems,...
Published 11/21/24
Published 11/21/24
 From AI's stumbling progress to groundbreaking tools and cyber threats, here’s what you need to know for this week: All The Major AI Models Continue To Lose Money AND Stop Advancing: Is the golden age of AI innovation already behind us? Reports from OpenAI, Google, and Anthropic suggest that we...
Published 11/18/24