Windows Secure Boot Compromised! What You Need to Know by a Retired Microsoft Engineer

preview_player
Показать описание
Dave explains how the secure boot process works, why it's there, how it's been compromised, and the risk of UEFI rootkits and similar attacks following the secure boot compromise.

Follow me for updates!
Twitter: @davepl1968 davepl1968

Рекомендации по теме
Комментарии
Автор

This month has sure been interesting for security processes.

Baronvaile
Автор

I'm In awe how clearly Dave can explain a technology like secure boot in only a couple of minutes when some courses and books cant explain it in hours.

akcarlos
Автор

I was involved in discovering a 'bug' in a chip's microcode. It was very obscure and allowed any process to promote itself to kernel mode. It was never totally clear whether it was a genuine oversight or a backdoor left by the chip designers.

_Mentat
Автор

dave... your shirts, as of late, are freakin awesome!

chrisgarner
Автор

In my years as a cybersecurity practitioner, I’ve come to realize that it’s almost never the cryptographic algorithm that’s at fault, but its implementation.

Dave’s Garage is rapidly becoming my favorite cybersecurity channel.

bernarrcoletta
Автор

You're giving me flash backs to the XP days, when rootkits thrived.

ganlet
Автор

Dave is a better presenter of information than more than three quarters of the legacy media's talking clones.

miinyoo
Автор

Hi Dave. I'm a 60yr old retiring fart that started on 5-1/4" floppies in the early 80s. Your explanation of this event was very timely and helpful. I needed to understand this better as a Crowdstrike shareholder, thank you much.

danrio
Автор

Hey dave, remember making "registry cleaners"? You should also make "DVD rewinders"

uniqueprogressive
Автор

This is fast becoming one of my favourite channels. Thanks for this explanation!

garymcc
Автор

That was a fantastic presentation. The pace, content and delivery were all spot-on. Thanks

johnx
Автор

since the CrowdStrike vids, this is my fav channel. Thanks for the engaging content!

Cracktune
Автор

Chinese motherboard manufactures were caught shipping boards in China with UEFI rootkits pre-installed. Just remember who made your mobo and don't think for a second your data is anywhere close to safe.

thom
Автор

Very informative and entertaining. AND, I love your shirt. Great video Dave!

martyb
Автор

Your videos are excellent Dave. Thanks for making them.

dagadgetman
Автор

the EUFI from about 2:38 to 2:56 hit really hard in the context of good trust and fidelity. i love your thoughtful humor!

imadomyrdin
Автор

My knowledge increases every time I watch your channel. And I love your shirt!!

robertleemeyer
Автор

Just found your channel Dave and I’lm loving it. I’m a 58 year old, greying and probably somewhat on the spectrum Technical Architect (whatever that means) over here in the UK. Learned to program on a TRS-80 model 1 aged about 11, studied computer science at university and started my working career in 1989 writing device drivers for a UK PC manufacturer (Apricot Computers??). Working in their operating system group and your content about your early days with Microsoft really resonates with me. I’m sure we were probably at the same PDCs on your side of the pond on numerous occasions over the years. Keep up the great content 👍

karlburkes
Автор

It's UEFI rootkit, not EUFI rootkit. We EU citizens have nothing to do with this mess. I think. 😂

henryd
Автор

Thanks again Dave for the great information on Secure boot process. Given the date on those certificates, it seems like in our responsibility as a Government contractor Job I retired from 2 years ago. I remember having to delete some temporary certificates in the secure boot process using a Powershell command on our Dell servers. As always good video.

JohnWallace