Hacker News new | past | comments | ask | show | jobs | submit login

Interesting... but I find it really amusing that my propositions are to reverse-engineer the secure boot system in order to take advantage of it, and also the fact that the reverse-engineering process won't be that hard. For what I assume is a security-by-obscurity design... reverse-engineering should by definition be really hard I would think, at least at face value.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: