• 0 Posts
  • 31 Comments
Joined 2 years ago
cake
Cake day: June 22nd, 2023

help-circle




  • ARM isn’t plug-and-play like x86 (n.b. it could be, but no one does it outside of servers)

    You have to write a big JSON like file, called a DeviceTree, that describes exactly what is in the computer

    Unless Apple decides to support Hackintoshes, their OS won’t have devicetrees for other devices.

    You might be able to make your own and get the OS to read it, but it still has to be for a specific machine rather than generic like before


  • Microsoft seems to have deleted all their old blog posts around it (at least all the links to their responses 404 now), but…

    In 2011, they were going to require it to be enabled for all products if they wanted to announce Windows 8 support.

    After huge backlash, they changed it to allow motherboard companies to disable it for X years (since I can’t find the original, I can’t say the exact length of time)

    But their original goal was for it to never be allowed to be disabled













  • Their statement is that Alpine is designed to be friendly to corporations who want to lock down their devices and prevent you from modifying them.

    You cannot use coreutils and have a DRM locked down device.

    You can use Alpine w/ musl + busybox and make a DRM locked down device

    Alpine’s licensing favors large corporation’s rights in preventing the user from modifying their device

    Operating systems using coreutils favor the end user’s rights


  • If they can take my unlocked device by force, they can probably also break my fingers to coerce me to unlock it See also: https://xkcd.com/538/

    Randall is right in pointing out you need to consider your attack vectors, but this doesn’t mean you shouldn’t take reasonable precautions

    Most people are more likely to run into the type of attack OP references than someone who can break LUKS encryption stealing their device