Hydroph0bia – a fixed SecureBoot bypass for UEFI firmware based on Insyde H2O
https://coderush.me/hydroph0bia-part3/
#HackerNews #Hydroph0bia #SecureBoot #UEFI #InsydeH2O #Cybersecurity #Firmware
#Tag
Hydroph0bia – a fixed SecureBoot bypass for UEFI firmware based on Insyde H2O
https://coderush.me/hydroph0bia-part3/
#HackerNews #Hydroph0bia #SecureBoot #UEFI #InsydeH2O #Cybersecurity #Firmware
RE: https://mastodon.ml/@livefish/115954980412916539
Nice, maybe I'll switch to MacBook one time
There is an article from Habr.com (Russian analog of Reddit with IT posts) with detailed instructions about FreeBSD 14.3 (i386) installation to the MacBook with Intel Core 2 Duo
Огромеееный текст про установку freebsd на старый 64 битный мак с 32битным UEFI. Очень подробно разбирается процесс загрузки и все тонкости
CC @evgandr
RE: https://mastodon.ml/@livefish/115954980412916539
Nice, maybe I'll switch to MacBook one time
There is an article from Habr.com (Russian analog of Reddit with IT posts) with detailed instructions about FreeBSD 14.3 (i386) installation to the MacBook with Intel Core 2 Duo
Огромеееный текст про установку freebsd на старый 64 битный мак с 32битным UEFI. Очень подробно разбирается процесс загрузки и все тонкости
CC @evgandr
Okay, I'm ready to share my literal first published Rust crate: an Embedded-Graphics draw target for the UEFI Graphics Output Protocol! https://crates.io/crates/embedded-graphics-gop
It offers single- and double-buffered versions of draw targets for both the blitting routines and utilizing direct framebuffer access.
I've been reading about and by necessity mucking about with UEFI boot-related matters the past while as I get settled with Linux, reorganize partitions, etc., which led eventually to this – a sobering & still-topical read on the hardware/firmware-level erosion of your privacy and control of your own IT:
https://pluralistic.net/2024/01/18/descartes-delenda-est/#self-destruct-sequence-initiated
More here: https://en.wikipedia.org/wiki/UEFI#Secure_Boot_criticism
Okay, I'm ready to share my literal first published Rust crate: an Embedded-Graphics draw target for the UEFI Graphics Output Protocol! https://crates.io/crates/embedded-graphics-gop
It offers single- and double-buffered versions of draw targets for both the blitting routines and utilizing direct framebuffer access.
I've been reading about and by necessity mucking about with UEFI boot-related matters the past while as I get settled with Linux, reorganize partitions, etc., which led eventually to this – a sobering & still-topical read on the hardware/firmware-level erosion of your privacy and control of your own IT:
https://pluralistic.net/2024/01/18/descartes-delenda-est/#self-destruct-sequence-initiated
More here: https://en.wikipedia.org/wiki/UEFI#Secure_Boot_criticism
The #Linux Boot Process: From Power Button to #Kernel
https://www.0xkato.xyz/linux-boot/
0xkato writes: ""You press the power button. A second later a wall of text scrolls by, or a logo fades in, and eventually Linux appears. What happens in between is not magic. It is a careful handshake between tiny programs and a very literal CPU. This part follows that handshake until the very first line of C code inside the #LinuxKernel runs.""
The #Linux Boot Process: From Power Button to #Kernel
https://www.0xkato.xyz/linux-boot/
0xkato writes: ""You press the power button. A second later a wall of text scrolls by, or a logo fades in, and eventually Linux appears. What happens in between is not magic. It is a careful handshake between tiny programs and a very literal CPU. This part follows that handshake until the very first line of C code inside the #LinuxKernel runs.""