> So, hypothetically speaking, say a laptop firmware has an SMM backdoor, how does using Linux bypass it in any way?
Aside from that, good point.
> So, hypothetically speaking, say a laptop firmware has an SMM backdoor, how does using Linux bypass it in any way?
Aside from that, good point.