Re: Secure Boot bypass in EDK2 based Virtual Machine firmware

Re: Secure Boot bypass in EDK2 based Virtual Machine firmware

Open Source Security [[{„value“:“

Posted by Yves-Alexis Perez on Feb 14

Hi Mate,

I’m not sure if I understand everything correctly, but if UEFI Secure
Boot is enabled, shouldn’t the shell.efi binary need to be explicitely
signed in order for it to be correctly loaded? It doesnt look like a
good idea to sign shell.efi on a production platform, but for test
purposes it might be relevant.

Regards,
„}]] Read More 

Schreibe einen Kommentar

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert