eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

214
active users

#secureboot

4 posts3 participants1 post today
#cryptohagen<p>Microsoft has a signing key that many <a href="https://social.data.coop/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> distributions use to support <a href="https://social.data.coop/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureBoot</span></a>, and that key expire on September 11, 2025</p><p>A replacement key has existed since 2023, but apparently - many systems don’t support it yet</p><p>Fixing this problem requires firmware updates from original equipment manufacturers (OEM) but there is a risk that not all OEMs will issue updates - especially those for older, or less popular devices<br><a href="https://www.techradar.com/pro/security/linux-users-are-about-to-face-another-major-microsoft-secure-boot-issue" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">techradar.com/pro/security/lin</span><span class="invisible">ux-users-are-about-to-face-another-major-microsoft-secure-boot-issue</span></a></p>
Larvitz :fedora: :redhat:<p>System Security (ThinkPad T14s Gen4 AMD Ryzen)</p><p>- Untainted Kernel in Lockdown mode<br>- Secure boot active with modern signature<br>- All modern security features active<br>- Full-Disk-Encryption with key on physical SmartCard from <span class="h-card" translate="no"><a href="https://social.nitrokey.com/@nitrokey" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>nitrokey</span></a></span>)</p><p>(With modern UEFI CA, because of the upcoming key replacement: <a href="https://burningboard.net/@Larvitz/114884582215696742" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">burningboard.net/@Larvitz/1148</span><span class="invisible">84582215696742</span></a>)</p><p><a href="https://burningboard.net/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://burningboard.net/tags/fwupd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fwupd</span></a> <a href="https://burningboard.net/tags/thinkpad" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>thinkpad</span></a> <a href="https://burningboard.net/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://burningboard.net/tags/secureboot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>secureboot</span></a></p>
Christoph Schmees<p><span class="h-card" translate="no"><a href="https://burningboard.net/@Larvitz" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Larvitz</span></a></span> </p><p>So what? Switch SB off and you're done. SB was invented by M$ to mitigate design faults in UEFI and in Windows. Linux doesn't need it. </p><p><a href="https://social.tchncs.de/tags/secureboot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>secureboot</span></a> <a href="https://social.tchncs.de/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a> <a href="https://social.tchncs.de/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://social.tchncs.de/tags/uefi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>uefi</span></a></p>
Larvitz :fedora: :redhat:<p>Some Linux users might be interested, reading about this (Subscriber link, that bypasses the Paywall, since I find this information important to spread for awareness): </p><p><a href="https://lwn.net/SubscriberLink/1029767/0a550f0972703141/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">lwn.net/SubscriberLink/1029767</span><span class="invisible">/0a550f0972703141/</span></a> </p><p>„Linux users who have Secure Boot enabled on their systems knowingly or unknowingly rely on a key from Microsoft that is set to expire in September. After that point, Microsoft will no longer use that key to sign the shim first-stage UEFI bootloader that is used by Linux distributions to boot the kernel with Secure Boot. But the replacement key, which has been available since 2023, may not be installed on many systems; worse yet, it may require the hardware vendor to issue an update for the system firmware, which may or may not happen.“</p><p><a href="https://burningboard.net/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://burningboard.net/tags/secureboot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>secureboot</span></a> <a href="https://burningboard.net/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a> <a href="https://burningboard.net/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://burningboard.net/tags/servicetweet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>servicetweet</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Gigabyte" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Gigabyte</span></a> motherboards vulnerable to <a href="https://mastodon.thenewoil.org/tags/UEFI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UEFI</span></a> <a href="https://mastodon.thenewoil.org/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> bypassing <a href="https://mastodon.thenewoil.org/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureBoot</span></a></p><p><a href="https://www.bleepingcomputer.com/news/security/gigabyte-motherboards-vulnerable-to-uefi-malware-bypassing-secure-boot/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/gigabyte-motherboards-vulnerable-to-uefi-malware-bypassing-secure-boot/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/mobo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mobo</span></a> <a href="https://mastodon.thenewoil.org/tags/motherboard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>motherboard</span></a></p>
WinFuture.de<p>Microsoft warnt: UEFI Secure Boot-Zertifikate laufen 2026 ab. Betroffen sind alle Windows-Versionen seit 2012. Ohne Update könnte die Fähigkeit zum sicheren Booten beeinträchtigt werden. <a href="https://mastodon.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://mastodon.social/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureBoot</span></a> <a href="https://winfuture.de/news,152120.html?utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">winfuture.de/news,152120.html?</span><span class="invisible">utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia</span></a></p>
George E. 🇺🇸♥🇺🇦🇵🇸🏳️‍🌈🏳️‍⚧️<p>Huge <a href="https://bofh.social/tags/security" rel="nofollow noopener" target="_blank">#security</a> <a href="https://bofh.social/tags/vulnerability" rel="nofollow noopener" target="_blank">#vulnerability</a> in <a href="https://bofh.social/tags/Linux" rel="nofollow noopener" target="_blank">#Linux</a> systems allows an <a href="https://bofh.social/tags/attacker" rel="nofollow noopener" target="_blank">#attacker</a> with <a href="https://bofh.social/tags/PhysicalAccess" rel="nofollow noopener" target="_blank">#PhysicalAccess</a> to <a href="https://bofh.social/tags/bypass" rel="nofollow noopener" target="_blank">#bypass</a> <a href="https://bofh.social/tags/SecureBoot" rel="nofollow noopener" target="_blank">#SecureBoot</a> and inject <a href="https://bofh.social/tags/malware" rel="nofollow noopener" target="_blank">#malware</a> onto a system even with <a href="https://bofh.social/tags/LUKS" rel="nofollow noopener" target="_blank">#LUKS</a> <a href="https://bofh.social/tags/FDE" rel="nofollow noopener" target="_blank">#FDE</a><span>.<br><br>The mitigation is pretty straight-forward.<br><br>For </span><a href="https://bofh.social/tags/Ubuntu" rel="nofollow noopener" target="_blank">#Ubuntu</a><span> at-least (I don't run RedHat/ Fedora):<br><br>Edit </span><code>/etc/default/grub</code> as <code>root</code><span>.<br><br>In the line that says </span><code>GRUB_CMDLINE_LINUX="..."</code>, add (or append) <code>panic=0</code><span>.<br><br>Followed by: </span><code>sudo update-grub</code><span>. (Takes effect on reboot).<br><br>This will prevent your Linux system from launching a </span><a href="https://bofh.social/tags/DebugShell" rel="nofollow noopener" target="_blank">#DebugShell</a> if an attacker repeatedly enters a wrong passphrase for decrypting your Luks <a href="https://bofh.social/tags/boot" rel="nofollow noopener" target="_blank">#boot</a> <a href="https://bofh.social/tags/volume" rel="nofollow noopener" target="_blank">#volume</a><span>.<br><br>The linked article has more information.<br><br></span><a href="https://cybernews.com/security/hackers-can-bypass-linux-secure-boot/" rel="nofollow noopener" target="_blank">https://cybernews.com/security/hackers-can-bypass-linux-secure-boot/</a></p>
heise online English<p>Prepare for an impact: Microsoft warns of secure boot certificate update</p><p>"Prepare for the first global, large-scale secure boot certificate update," warns Microsoft. Not only Windows is affected.</p><p><a href="https://www.heise.de/en/news/Prepare-for-an-impact-Microsoft-warns-of-secure-boot-certificate-update-10462433.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Prepare-for-a</span><span class="invisible">n-impact-Microsoft-warns-of-secure-boot-certificate-update-10462433.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://social.heise.de/tags/macOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macOS</span></a> <a href="https://social.heise.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.heise.de/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureBoot</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
heise Security<p>Vorbereiten auf Einschlag: Microsoft warnt vor Secure-Boot-Zertifikat-Update</p><p>"Bereite dich auf das erste globale, großflächige Secure-Boot-Zertifikat-Update vor", warnt Microsoft. Nicht nur Windows ist betroffen.</p><p><a href="https://www.heise.de/news/Vorbereiten-auf-Einschlag-Microsoft-warnt-vor-Secure-Boot-Zertifikat-Update-10461866.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Vorbereiten-auf-</span><span class="invisible">Einschlag-Microsoft-warnt-vor-Secure-Boot-Zertifikat-Update-10461866.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://social.heise.de/tags/macOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macOS</span></a> <a href="https://social.heise.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.heise.de/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureBoot</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a> <span class="h-card" translate="no"><a href="https://feddit.org/c/de_edv" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>de_edv</span></a></span></p>
Mac<p>Juni-Patchday: <a href="https://mastodon.social/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a>-Update macht <a href="https://mastodon.social/tags/Fujitsu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fujitsu</span></a>-Rechner kaputt</p><p><a href="https://www.golem.de/news/juni-patchday-windows-update-macht-fujitsu-rechner-kaputt-2506-197156.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">golem.de/news/juni-patchday-wi</span><span class="invisible">ndows-update-macht-fujitsu-rechner-kaputt-2506-197156.html</span></a></p><p><a href="https://mastodon.social/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureBoot</span></a> <a href="https://mastodon.social/tags/UEFI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UEFI</span></a> <a href="https://mastodon.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a></p>
The New Oil<p>Found in the wild: 2 <a href="https://mastodon.thenewoil.org/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureBoot</span></a> exploits. <a href="https://mastodon.thenewoil.org/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> is patching only 1 of them.</p><p><a href="https://arstechnica.com/security/2025/06/unearthed-in-the-wild-2-secure-boot-exploits-microsoft-patches-only-1-of-them/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">06/unearthed-in-the-wild-2-secure-boot-exploits-microsoft-patches-only-1-of-them/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
openSUSE Linux<p>Unified <a href="https://fosstodon.org/tags/Kernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kernel</span></a> Images in <a href="https://fosstodon.org/tags/openSUSE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openSUSE</span></a>: stronger boot, simplified structure. 🔐 Register for the <a href="https://fosstodon.org/tags/openSUSE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openSUSE</span></a> Conference and <a href="https://fosstodon.org/tags/learn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>learn</span></a> more. <a href="https://fosstodon.org/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureBoot</span></a> <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://events.opensuse.org/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">events.opensuse.org/</span><span class="invisible"></span></a></p>
Marcus "MajorLinux" Summers<p>That's one way of going about that.</p><p>Found in the wild: 2 Secure Boot exploits. Microsoft is patching only 1 of them. </p><p><a href="https://arstechnica.com/security/2025/06/unearthed-in-the-wild-2-secure-boot-exploits-microsoft-patches-only-1-of-them/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">06/unearthed-in-the-wild-2-secure-boot-exploits-microsoft-patches-only-1-of-them/</span></a></p><p><a href="https://toot.majorshouse.com/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureBoot</span></a> <a href="https://toot.majorshouse.com/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://toot.majorshouse.com/tags/Patching" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patching</span></a> <a href="https://toot.majorshouse.com/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://toot.majorshouse.com/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a> <a href="https://toot.majorshouse.com/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://toot.majorshouse.com/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a></p>
WinFuture.de<p>Schwerwiegende Sicherheitslücken: Zwei Exploits können <a href="https://mastodon.social/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureBoot</span></a> komplett umgehen. <a href="https://mastodon.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> hat bislang nur eine davon geschlossen - die zweite bleibt weiterhin ausnutzbar. <a href="https://winfuture.de/news,151480.html?utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">winfuture.de/news,151480.html?</span><span class="invisible">utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia</span></a></p>
Marco Ivaldi<p><a href="https://infosec.exchange/tags/Hydroph0bia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hydroph0bia</span></a> (CVE-2025-4275) - a trivial <a href="https://infosec.exchange/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureBoot</span></a> bypass for UEFI-compatible firmware based on Insyde <a href="https://infosec.exchange/tags/H2O" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>H2O</span></a>, part 1</p><p><a href="https://coderush.me/hydroph0bia-part1/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">coderush.me/hydroph0bia-part1/</span><span class="invisible"></span></a></p>
Marco Ivaldi<p>Another Crack in the Chain of Trust: Uncovering (Yet Another) <a href="https://infosec.exchange/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureBoot</span></a> Bypass </p><p><a href="https://www.binarly.io/blog/another-crack-in-the-chain-of-trust" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">binarly.io/blog/another-crack-</span><span class="invisible">in-the-chain-of-trust</span></a></p>
PrivacyDigest<p>Found in the wild: 2 <a href="https://mas.to/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureBoot</span></a> <a href="https://mas.to/tags/exploits" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploits</span></a>. <a href="https://mas.to/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> is patching only 1 of them. <br><a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p><p><a href="https://arstechnica.com/security/2025/06/unearthed-in-the-wild-2-secure-boot-exploits-microsoft-patches-only-1-of-them/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">06/unearthed-in-the-wild-2-secure-boot-exploits-microsoft-patches-only-1-of-them/</span></a></p>
iX Magazin<p>iX-Workshop: Sicherer Betrieb von Windows 11 in Unternehmen</p><p>Lernen Sie an praktischen Beispielen, wie Sie Windows 11 Pro und Enterprise in Ihrem Unternehmen sicher und effektiv einsetzen.</p><p><a href="https://www.heise.de/news/iX-Workshop-Sicherer-Betrieb-von-Windows-11-in-Unternehmen-10407547.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/iX-Workshop-Sich</span><span class="invisible">erer-Betrieb-von-Windows-11-in-Unternehmen-10407547.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/iXWorkshops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iXWorkshops</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureBoot</span></a> <a href="https://social.heise.de/tags/Verschl%C3%BCsselung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Verschlüsselung</span></a> <a href="https://social.heise.de/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
knoppix<p><a href="https://mastodon.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> has fixed the dual-booting bug affecting Windows and Linux with patch KB5058385, released nine months after the issue was reported.</p><p>This update prevents legitimate Linux bootloaders from being blocked.</p><p>However, the long delay raises concerns about Microsoft's commitment to niche user needs.</p><p>Will they prioritize core features over essential fixes for dual-boot users?</p><p><a href="https://news.itsfoss.com/microsoft-fixes-linux-dual-boot/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.itsfoss.com/microsoft-fix</span><span class="invisible">es-linux-dual-boot/</span></a></p><p><a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://mastodon.social/tags/Freedom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Freedom</span></a> <a href="https://mastodon.social/tags/FreeSoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeSoftware</span></a> <a href="https://mastodon.social/tags/Boot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Boot</span></a> <a href="https://mastodon.social/tags/DualBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DualBoot</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureBoot</span></a> <a href="https://mastodon.social/tags/TechNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechNews</span></a></p>
iX Magazin<p>iX-Workshop: Sicherer Betrieb von Windows 11 in Unternehmen</p><p>Lernen Sie an praktischen Beispielen, wie Sie Windows 11 Pro und Enterprise in Ihrem Unternehmen sicher und effektiv einsetzen.</p><p><a href="https://www.heise.de/news/iX-Workshop-Sicherer-Betrieb-von-Windows-11-in-Unternehmen-10373769.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/iX-Workshop-Sich</span><span class="invisible">erer-Betrieb-von-Windows-11-in-Unternehmen-10373769.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/iXWorkshops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iXWorkshops</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureBoot</span></a> <a href="https://social.heise.de/tags/Verschl%C3%BCsselung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Verschlüsselung</span></a> <a href="https://social.heise.de/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>