On Tue, 4 Sep 2012 11:55:06 -0400 Matthew Garrett <mjg@xxxxxxxxxx> wrote: > The UEFI Secure Boot trust model is based on it not being possible for a > user to cause a signed OS to boot an unsigned OS Unfortunately you can't fix this at kernel level because an untrusted application can at GUI level fake a system crash, reboot cycle and phish any basic credentials such as passwords for the windows partition. Alan -- To unsubscribe from this list: send the line "unsubscribe linux-efi" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html