j
k
j a
j l
Michael Verrenkamp writes:
Things like secure boot are brilliant ideas so long as the user controls the keys.
ITYM the keyring. Microsoft (& other vendors, maybe) control the signing keys. cf. "who controls the CA private keys" used for HTTPS.
Back to the thread
Back to the list