Secure Boot is completely broken on 200+ models from 5 big device makers

Keys were labeled "DO NOT TRUST." Nearly 500 device models use them anyway.

https://arstechnica.com/security/2024/07/secure-boot-is-completely-compromised-on-200-models-from-5-big-device-makers/?utm_brand=arstechnica&utm_social-type=owned&utm_source=mastodon&utm_medium=social

Secure Boot is completely broken on 200+ models from 5 big device makers

Keys were labeled "DO NOT TRUST." Nearly 500 device models use them anyway.

Ars Technica
@arstechnica I would not be surprised (especially given their replies) if the device manufacturers were leaking keys for old systems to force sales of new systems
@arstechnica Secure Boot is sadly β€œtoo big to fail”. Nobody will ever blacklist the vulnerable models like they should be.

@arstechnica

> The encrypted file, however, was protected by a four-character password

It doesn't seem like you'd be giving much more away by reporting what the password was. Once an attacker knows it's only four characters, the search space is trivially tiny. And it might be amusing to know.

...

Was it "1234"?

(obSpaceballs That's amazing, I've got the same combination on my luggage.)

Or was it "love", given that "secret", "sex" and "god" are all the wrong length?

@arstechnica Secure Boot is more like a glorified speed bump for the determined. A digital 'Do Not Enter' sign that's about as effective as a cardboard cutout of a guard dog. To be honest, it's almost impressive how many ways Secure Boot can fail to be secure. Almost.

@arstechnica

"So, Lone Star, now you see that evil will always triumph because good is dumb." - Dark Helmet

@arstechnica
If anyone want to check whether they're affected by this Secure Boot failure on Linux, install mokutil, run
mokutil --pk and see if the Platform Key is issued by DO NOT TRUST - AMI Test PK.