this post was submitted on 12 Mar 2024
348 points (98.1% liked)

Technology

58150 readers
4154 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] RavuAlHemio@lemmy.world 64 points 6 months ago (13 children)

Doesn’t having admin privileges mean you can load any driver into the kernel anyway, including blatantly malicious drivers?

[–] henfredemars@infosec.pub 25 points 6 months ago* (last edited 6 months ago) (8 children)

I'm not sure that's necessarily true with enforcement of driver signing.

The latest OS kernels typically make some effort to resist arbitrary code injection even by the system administrator and sometimes goes even further against an attacker with a read/write primitive on the kernel. Linux with secure boot will refuse to load unsigned kernel modules for example.

[–] hddsx@lemmy.ca 15 points 6 months ago (7 children)

Why’s that? I thought admin could override that

[–] runefehay@kbin.social 14 points 6 months ago

It is part of the SSSCA / CBDTPA / "Trusted" computing initiative. The large corporations want to control what you are allowed to do with your computer. This is where the phrase "digital rights management" comes from.

load more comments (6 replies)
load more comments (6 replies)
load more comments (10 replies)