What other "trustable" things are "untrustable"?
Only all of them ...
@theruran @thegibson @yojimbo And now people know why I don't / won't support things like secure boot and such on the Kestrel. The only security possible is utter transparency and the willingness to periodically check your code. Impractical? Maybe. But, so is 6 MIPS performance these days, so who cares?
Not that I will prevent others from forking and/or porting their own implementations. But me? Nope. Not gonna happen.
@freakazoid @theruran @thegibson @yojimbo In practice, however, it doesn't protect anyone from ransomware (as evidence by the number of people still getting hit by it), and in my first-hand experience, only results in bricking the machine when trying to upgrade to a newer version of Linux when using ASUS motherboards.
Let's just agree to disagree on this matter. I don't foresee any of us coming to an agreement here.
@vertigo @theruran @thegibson @yojimbo I think the main threats secure boot is supposed to handle involve getting "underneath" the OS. Ransomware usually doesn't need to do that because of discretionary access control; it gets access to everything the user who executed it could access. The use case with ROM is for when you chain to some piece of software in mutable storage, which you almost always need to do.
Server run by the main developers of the project It is not focused on any particular niche interest - everyone is welcome as long as you follow our code of conduct!