493
submitted 2 weeks ago by sirico@feddit.uk to c/games@lemmy.world
you are viewing a single comment's thread
view the rest of the comments
[-] brezel@piefed.social 81 points 2 weeks ago

beautiful. fuck secureboot.

[-] 9tr6gyp3@lemmy.world 26 points 2 weeks ago
[-] brezel@piefed.social 111 points 2 weeks ago
  • some people run more than 1 OS
  • some people actually program and need to load unsigned shit all the time
  • some people have legacy hardware that doesn't run with secureboot
  • it is my decision and my decision alone how i boot my operating systems. not EA's.
[-] muusemuuse@sh.itjust.works 13 points 2 weeks ago
  1. You can run more than one OS with secure boot enabled. It’s just a pain in the ass.
  2. you can run unsigned code on a secure boot enabled system.
  3. its 2025, what the fuck do you have that can’t secure boot by now?
  4. THIS is your winning argument.
[-] Truscape 26 points 2 weeks ago* (last edited 2 weeks ago)

(1) Yeah, well the secure boot keys needed for Linux distributions expire in September (https://www.tomshardware.com/tech-industry/cyber-security/microsoft-signing-key-required-for-secure-boot-uefi-bootloader-expires-in-september-which-could-be-problematic-for-linux-users), so that seems like a sustainable solution, sure buddy.

(3) What's your income? What region of the world do you live in and what hardware is available to you? I'm still using an am4 platform PC as my daily driver because I can't burn money. One of my buddies has an AM3 PC. Many people use modified surplus office PCs (especially in developing nations like South America or SEA), which don't have secure boot as an option. Check your privilege, and maybe donate some of your spare hardware to those who need it, if you want to make this "a non issue" for everyone.

(4) Yeah. I own my hardware, I configure my software. I gut Windows like a fish and keep it on a leash for these games, and use Linux for my work and for the games that respect the ecosystem.

[-] muusemuuse@sh.itjust.works 8 points 2 weeks ago* (last edited 2 weeks ago)
  1. New keys have already been released and you can always just create and enroll your own damn keys. This is sensationalist nonsense.
  2. “Check my privilege” over secure boot? Calm down, Karen.
  3. I think gaming on PC is going to get interesting in the coming decade as Microsoft kicks third parties out of the kernel (thanks crowdstrike!) and more and more people just stop putting up with windows. Enterprise in the US is hooked but everyone else? Na, they are gonna drop it.

Edit: these are listed as 1,3,and 4 in my post in voyager but lemmy shows 123. Interesting.

[-] Truscape 13 points 2 weeks ago

On the list thing, it seems that adding numbers with periods in a list seems to auto configure it to ascending numbers. That's why I used (1) (3) (4). Weird, but I guess that's the work around.

Enrolling your keys doesn't work btw, because battlefield checks which keys you enroll, only accepting the default MS keys. Also on the hardware front, it is a big problem for gamers on a sub-300 USD budget these days - the best deals are on legacy hardware or surplus office equipment, mainly AM3-AM4 era.

[-] filcuk@lemmy.zip 3 points 2 weeks ago

The number list is how markdown works. You can enter all 1's and it will automatically create ordered list.
Handy when you may need to edit list items, as you dont need to renumber even in plain text.
Markdown spec should allow for explicit number by using a bracket ')' instead of a dot, but it may not work everywhere.
Let's give it a go

3) start from 3  
1. Then  
1. Continue  
  1. start from 3
  1. Then
  2. Continue
[-] filcuk@lemmy.zip 3 points 2 weeks ago

Hmm not quite what that should look like

[-] Alaik@lemmy.zip 18 points 2 weeks ago

I don't think he needs a winning argument. I think EA needs to justify this kernel level AC, not the other way around.

[-] muusemuuse@sh.itjust.works 3 points 2 weeks ago

I’m agreeing with point 4.

[-] Kazumara@discuss.tchncs.de 3 points 2 weeks ago* (last edited 2 weeks ago)

You can run more than one OS with secure boot enabled. It’s just a pain in the ass.

Weird, for me it was just flicking the switch in UEFI and now Grub and through it Windows 10 and Fedora 43 boot in Secure Boot.

[-] 9tr6gyp3@lemmy.world 12 points 2 weeks ago

Im fairly certain any legacy hardware that doesn't have secure boot as an option is going to struggle loading BF6 regardless.

The first two points are not related to secure boot at all.

[-] brezel@piefed.social 17 points 2 weeks ago

you think loading my own kernel modules is not related to secure boot? i guess you don't work in IT then.

[-] Miaou@jlai.lu 9 points 2 weeks ago

Most people who work IT don't even know what a kernel is, tbf

[-] tpyo@lemmy.world 3 points 2 weeks ago* (last edited 2 weeks ago)

I recently had an rfid scanner immediately rma-d back that had just been returned to us. The new issue was caused by a setting and not by a defect. I asked our IT/help desk if it WAS a setting that could be changed

"I don't know. I get the thing, I check these settings, I check those settings, that's all I know"

😑😑😑

So me and another person are out of our equipment for another couple weeks while the scanner is sent back for "repairs" and the repair people will go "😑 tap tap tap idiots"

(Edit: I know it's a setting because I talked with the other person who uses it and I explained the issue and he let me know it is something he changes)

[-] 9tr6gyp3@lemmy.world 7 points 2 weeks ago

It doesn't matter which kernel modules are used, as long as you have signed those changes before rebooting.

[-] pathief@lemmy.world 7 points 2 weeks ago

You can't install most linux distributions with secure boot enabled.

[-] muusemuuse@sh.itjust.works 10 points 2 weeks ago

This is outdated information. Linux has supported secure boot for quite a while now.

[-] _cryptagion@quokk.au 4 points 2 weeks ago

And Microsoft is shutting out most third parties in the near future because of Crowdstrike, so Linux likely won't be supporting Secure Boot in the future, even if someone did want to enable it for some odd reason.

[-] cole@lemdro.id 6 points 2 weeks ago

Microsoft can't stop you from signing images with your own keys.

That's what I do, and it's almost entirely automated on Linux these days.

[-] muusemuuse@sh.itjust.works 2 points 2 weeks ago

Microsoft’s kicking third parties out of the kernel because of crowdstrike. Secure boot is a completely different thing Microsoft can’t kick people out of.

load more comments (9 replies)
[-] troed@fedia.io 6 points 2 weeks ago

Really? Which would those be? So far I haven't come upon one.

load more comments (3 replies)
[-] Kyrgizion@lemmy.world 37 points 2 weeks ago

Needlessly intrusive. Can obviously be circumvented by cheaters anyway, so quite possibly superfluous. Apart from that it protects against the kinds of attacks that typically require physical access to the computer. If you have physical access you have full access anyway. Etc.

[-] 9tr6gyp3@lemmy.world 21 points 2 weeks ago

If you have physical access you have full access anyway. Etc.

You know secure boot was specifically made to protect users for this exact use case. Any tampering of the system will prevent the system from booting.

[-] Eggymatrix@sh.itjust.works 17 points 2 weeks ago

I get your pc, "tamper" it, then i install a fake bios that tells you all is well and that your tpm and secureboot and whatever else bullcrap they invent is still happy.

See the problem?

[-] Corngood@lemmy.ml 8 points 2 weeks ago

It won't boot though, because the keys to decrypt the system are stored in the TPM.

Sure you could replace the whole OS, but that's going to be very obvious and won't allow you access to the data.

[-] jjjalljs@ttrpg.network 11 points 2 weeks ago

If you have physical access you could go into the bios and turn off secure boot

[-] PHLAK@lemmy.world 7 points 2 weeks ago

If you enable Secure Boot you should also set a BIOS password for this very reason.

[-] Saleh@feddit.org 12 points 2 weeks ago

So, if you set a bios password either way, which benefit does secureboot give?

[-] jjjalljs@ttrpg.network 5 points 2 weeks ago

I think you can reset a bios password by taking the CMOS battery out or something?

[-] AlphaOmega@lemmy.world 4 points 2 weeks ago

Not sure if this works these days, but on older systems there was a reset bios config jumper and pulling the cmos battery.

load more comments (2 replies)
[-] atticus88th@lemmy.world 2 points 2 weeks ago

Isnt it possible to have a recovery key? Isnt that technically a backdoor? Maybe the terms are not correct but there is a way in physically.

[-] Limonene@lemmy.world 4 points 2 weeks ago

A person with physical access can tamper with the OS, then tamper with the signing keys. Most secure boot systems allow you to install keys.

Secure boot can't detect a USB keylogger. Nothing can.

[-] 9tr6gyp3@lemmy.world 1 points 2 weeks ago

The signature checks will immediately fail if ANY tampering has occurred.

Adding a USB keylogger that has not been signed will cause a signature verification failure during boot.

[-] Limonene@lemmy.world 2 points 2 weeks ago

A USB keylogger is not detectable by the computer, not in firmware nor operating system. It passively sniffs the traffic between the USB keyboard and the computer, to be dumped out later.

[-] 9tr6gyp3@lemmy.world 1 points 2 weeks ago

If your keys are stored in the TPM for use during the secure boot phase, there will be nothing for it to log.

[-] Tanoh@lemmy.world 3 points 2 weeks ago

If you have physical access you have full access anyway

No, encrypt your drives.

[-] SoupBrick@pawb.social 17 points 2 weeks ago

It fucks with Linux. I literally just disabled it to resolve a driver install issue before this announcement was made.

[-] 9tr6gyp3@lemmy.world 10 points 2 weeks ago

Linux can run with secure boot just fine though. Use your distros documentation to set it up.

[-] troed@fedia.io 8 points 2 weeks ago

Secureboot doesn't "fuck with Linux". It does protect you from malware trying to install unsigned kernel modules.

Apparently that driver is unsigned, which is not the normal case nowadays.

[-] SoupBrick@pawb.social 7 points 2 weeks ago* (last edited 2 weeks ago)

Good to know, thanks

I was trying to install an Nvidia driver on Linux Mint, so I think I am safe.

[-] SkavarSharraddas@gehirneimer.de 2 points 2 weeks ago

Is that a realistic attack scenario that end users need to be concerned about?

[-] troed@fedia.io 6 points 2 weeks ago

Yes. That's how you get undetectable rootkits.

load more comments (1 replies)
load more comments (1 replies)
this post was submitted on 08 Aug 2025
493 points (100.0% liked)

Games

41847 readers
1067 users here now

Welcome to the largest gaming community on Lemmy! Discussion for all kinds of games. Video games, tabletop games, card games etc.

Rules

1. Submissions have to be related to games

Video games, tabletop, or otherwise. Posts not related to games will be deleted.

This community is focused on games, of all kinds. Any news item or discussion should be related to gaming in some way.

2. No bigotry or harassment, be civil

No bigotry, hardline stance. Try not to get too heated when entering into a discussion or debate.

We are here to talk and discuss about one of our passions, not fight or be exposed to hate. Posts or responses that are hateful will be deleted to keep the atmosphere good. If repeatedly violated, not only will the comment be deleted but a ban will be handed out as well. We judge each case individually.

3. No excessive self-promotion

Try to keep it to 10% self-promotion / 90% other stuff in your post history.

This is to prevent people from posting for the sole purpose of promoting their own website or social media account.

4. Stay on-topic; no memes, funny videos, giveaways, reposts, or low-effort posts

This community is mostly for discussion and news. Remember to search for the thing you're submitting before posting to see if it's already been posted.

We want to keep the quality of posts high. Therefore, memes, funny videos, low-effort posts and reposts are not allowed. We prohibit giveaways because we cannot be sure that the person holding the giveaway will actually do what they promise.

5. Mark Spoilers and NSFW

Make sure to mark your stuff or it may be removed.

No one wants to be spoiled. Therefore, always mark spoilers. Similarly mark NSFW, in case anyone is browsing in a public space or at work.

6. No linking to piracy

Don't share it here, there are other places to find it. Discussion of piracy is fine.

We don't want us moderators or the admins of lemmy.world to get in trouble for linking to piracy. Therefore, any link to piracy will be removed. Discussion of it is of course allowed.

Authorized Regular Threads

Related communities

PM a mod to add your own

Video games

Generic

Help and suggestions

By platform

By type

By games

Language specific

founded 2 years ago
MODERATORS