GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Thursday, 12-Jun-2025 04:07:52 JST Lennart Poettering Lennart Poettering
    in reply to
    • Klaus Frank
    • Timothée Ravier

    @agowa338 @siosm not sure what you are going on about, but the way the trust chain concept works on modern computers is that you boot up in a trusted state, and then chain everything else from there. Hence of course, you reboot to reset the state, to get your trust chain into a clean state again?

    Note that all of systemd's factory reset work actually runs from the initrd, i.e. under the assumption of an UKI world in a fully vendor signed part of the OS with only minimal input from elsewhere.

    In conversation about 15 days ago from gnusocial.jp permalink
    • Embed this notice
      Klaus Frank (agowa338@chaos.social)'s status on Thursday, 12-Jun-2025 04:07:52 JST Klaus Frank Klaus Frank
      in reply to
      • Timothée Ravier

      @pid_eins @siosm

      But why should I need to break the trustchain as an attacker wanting to exfiltrate secrets? I can do most of that as regular user. Therefore we never turn compromised systems back on once we know they're compromised.
      That just gives attackers opportunities to have their scripts ran. Also there is still the risk of exploits.

      It is just bad security practice to boot from a compromised disk. At most you'd attach it to an air gapped offline system to do analysis and such...

      In conversation about 15 days ago permalink

      Attachments

      1. No result found on File_thumbnail lookup.
        http://exploits.It/
    • Embed this notice
      Klaus Frank (agowa338@chaos.social)'s status on Thursday, 12-Jun-2025 04:07:53 JST Klaus Frank Klaus Frank
      • Timothée Ravier

      @pid_eins @siosm

      Lol, so now we should boot the compromised system again? You know that normal security practice is to wipe it before it lays eggs right?

      Also if just rebooting was enough then we wouldn't literally need to do the factory reset...

      In conversation about 15 days ago permalink

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.