bootkitty wasn’t implemented ever and if you use GUID Partition Table and your bios is set to uefi without csm, it can’t affect you, since Bootkitty embeds itself into the Master Boot Record and there exploits the LogoFail vulrenability (this was already patched btw) with as far as i remember, a self-extracting steganographical bitmap image for arbritary code execution to bypass Secure Boot with injecting face certifications to Moklist. Also, it only runs on select devices, far from all Linux systems are vulrenabe.
Bootkitty?
However,
you can already patch your BIOS to become secure again! :)
All in all, Windows security is a joke compared to Linux’s.
Yeah, Linux has SELinux, that thing everyone turns off!
And AppArmor
I want a Linux system that is entirely rootless by leveraging containers and service accounts.
Think about it. Instead of having root you could just have a utility that connects to a daemon that is in a sandboxed environment.
bootkitty wasn’t implemented ever and if you use GUID Partition Table and your bios is set to uefi without csm, it can’t affect you, since Bootkitty embeds itself into the Master Boot Record and there exploits the LogoFail vulrenability (this was already patched btw) with as far as i remember, a self-extracting steganographical bitmap image for arbritary code execution to bypass Secure Boot with injecting face certifications to Moklist. Also, it only runs on select devices, far from all Linux systems are vulrenabe.