Would Linux have the same issue if secure boot is enabled and the certificate expire?
Secure boot is a useful security measure. But users should have the ability to install and update certs. If hardware (vendors) don’t allow this, it’s going to cause trouble for both Windows and Linux users.
Gives the illusion of security without being secure. Get the drive in a separate machine and, unless encrypted, secure boot is security theatre. Windows login password is similarly useless when the drive can be accessed when attached elsewhere.
Get rid of secure boot, install a granny-safe Linux distribution like Mint and get your drive LUKS encrypted.
You’re talking of an attacker with physical access. This can indeed defeats secure boot, but physical access defeat most computer security. In an evil maid scenario even LUKS can be defeated. An attacker with physical access can clone the drive, install a keylogger (hardware or software) and capture the passphrase the next time the machine boots.
Secure Boot can be useful to prevent malware from inserting themselves into the boot process, preventing them from elevating privilege or gaining persistence https://www.xda-developers.com/secure-boot/
Secure Boot isn’t perfect but it’s widely available and is an useful extra layer of protection, on top of disk encryption (eg LUKS).
I can’t take any Microsoft attempt at security seriously. One of the most important elements to improve security is to delete windows. Secure boot is lots of things but not secure.
These are all basically “if your machine is already compromised, they can also get around these other security measures” type exploits though, which are irrelevant.
Would Linux have the same issue if secure boot is enabled and the certificate expire?
Secure boot is a useful security measure. But users should have the ability to install and update certs. If hardware (vendors) don’t allow this, it’s going to cause trouble for both Windows and Linux users.
Gives the illusion of security without being secure. Get the drive in a separate machine and, unless encrypted, secure boot is security theatre. Windows login password is similarly useless when the drive can be accessed when attached elsewhere.
Get rid of secure boot, install a granny-safe Linux distribution like Mint and get your drive LUKS encrypted.
Good thing windows encrypts your disk too.
Also if someone has physical access to your machine to do nefarious things tor you’re already fucked.
You’re talking of an attacker with physical access. This can indeed defeats secure boot, but physical access defeat most computer security. In an evil maid scenario even LUKS can be defeated. An attacker with physical access can clone the drive, install a keylogger (hardware or software) and capture the passphrase the next time the machine boots.
Secure Boot can be useful to prevent malware from inserting themselves into the boot process, preventing them from elevating privilege or gaining persistence https://www.xda-developers.com/secure-boot/
Secure Boot isn’t perfect but it’s widely available and is an useful extra layer of protection, on top of disk encryption (eg LUKS).
I can’t take any Microsoft attempt at security seriously. One of the most important elements to improve security is to delete windows. Secure boot is lots of things but not secure.
These are all basically “if your machine is already compromised, they can also get around these other security measures” type exploits though, which are irrelevant.