pimterry@lemmy.world to Android@lemmy.worldEnglish · 1 year agoAndroid 14 blocks all modification of system certificates, even as roothttptoolkit.comexternal-linkmessage-square35fedilinkarrow-up1133arrow-down17cross-posted to: hackernews@lemmy.smeargle.fanshackernews@derp.fooprogramming@programming.dev
arrow-up1126arrow-down1external-linkAndroid 14 blocks all modification of system certificates, even as roothttptoolkit.compimterry@lemmy.world to Android@lemmy.worldEnglish · 1 year agomessage-square35fedilinkcross-posted to: hackernews@lemmy.smeargle.fanshackernews@derp.fooprogramming@programming.dev
minus-squarej4k3@lemmy.worldlinkfedilinkEnglisharrow-up4arrow-down1·1 year agoThis guide, in the third section at the bottom talks about using KeyTool to boot into UEFI and is how you get around this issue: https://wiki.gentoo.org/wiki/User:Sakaki/Sakaki's_EFI_Install_Guide/Configuring_Secure_Boot Firmware bootkit vulnerabilities are one of the largest attack surfaces available right now. There are ways to deal with this, it is just added complexity. The intellectual barrier is becoming harder. Secure boot is important though.
This guide, in the third section at the bottom talks about using KeyTool to boot into UEFI and is how you get around this issue: https://wiki.gentoo.org/wiki/User:Sakaki/Sakaki's_EFI_Install_Guide/Configuring_Secure_Boot
Firmware bootkit vulnerabilities are one of the largest attack surfaces available right now. There are ways to deal with this, it is just added complexity. The intellectual barrier is becoming harder. Secure boot is important though.