bookmarks.sysop.cafeShaared links2022-07-31T21:23:14+02:00bookmarks.sysop.cafehttps://bookmarks.sysop.cafe/https://bookmarks.sysop.cafe/ShaarliDiscovery of New UEFI Rootkit Exposes an Ugly Truth: The Attacks Are Invisible to Ushttps://bookmarks.sysop.cafe/shaare/VT5k6g2022-07-31T21:23:13+02:002022-07-31T21:23:14+02:00— Permalink]]>mitnalhttps://bookmarks.sysop.cafe/shaare/mfyo4w2022-03-13T23:47:20+01:002022-03-13T23:47:20+01:00— Permalink]]>Producing a Trustworthy x86-Based Linux Appliancehttps://bookmarks.sysop.cafe/shaare/MYjD4w2021-06-06T23:20:50+02:002021-06-06T23:20:52+02:00
»Let's say you're building some form of appliance on top of general purpose x86 hardware. You want to be able to verify the software it's running hasn't been tampered with. What's the best approach with existing technology?«