Speaking from my background, it prevents someone from trying to boot using an external device to access your system, assuming you have a BIOS password in place.
Of course encrypting your drive works just as well, but security in depth demands a “why not both?” Approach
It’s supposed to prevent unsigned files from being loaded by the UEFI (AFAIK) which could possibly help with rootkits, if it doesn’t somehow sign itself. However, these are pretty rare if you don’t allow sketchy software to access your boot partition, and will often cause issues with non major Linux distros.
Well of course, thats the setup. Disabling secure boot. If it didn’t stop you from booting a third party OS without you toggling that BIOS option, then the security feature would be pointless.
What is Secure Boot actually good for? Serious question.
Speaking from my background, it prevents someone from trying to boot using an external device to access your system, assuming you have a BIOS password in place.
Of course encrypting your drive works just as well, but security in depth demands a “why not both?” Approach
It’s supposed to prevent unsigned files from being loaded by the UEFI (AFAIK) which could possibly help with rootkits, if it doesn’t somehow sign itself. However, these are pretty rare if you don’t allow sketchy software to access your boot partition, and will often cause issues with non major Linux distros.
I had dell pc refuse to boot Linux mint because of secure boot
Then you haven’t set it up right
Nah man, it didn’t even allowed to boot iso from ventoy until i disabled secure boot
deleted by creator
Well of course, thats the setup. Disabling secure boot. If it didn’t stop you from booting a third party OS without you toggling that BIOS option, then the security feature would be pointless.
Imagine if in the future that option becomes untouchable
I’ve been wary of secure boot and pluton chips for this reason.