Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Exactly, every stage of the boot is supposed to validate the next stage before continuing.

The recently discovered bootrom exploits break that chain of trust, allowing unsigned code to execute.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: