Sounds like a misnomer to me.

  • dgdft@lemmy.world
    link
    fedilink
    English
    arrow-up
    4
    ·
    9 hours ago

    There’s also PXE boot, secure boot, carrying around a live image on a flash drive, etc.

    But any attacker advanced enough to tamper with your EFI partition in an evil-maid scenario has plenty of other options to log and steal your encryption passphrase, so it’s generally a moot point.

      • dgdft@lemmy.world
        link
        fedilink
        English
        arrow-up
        9
        ·
        9 hours ago

        Absolutely not — the skill level needed to tamper with a bashrc, pull credentials + keys, or generally hunt for sensitive info on an unencrypted disk is worlds apart from the skill level needed to modify an EFI binary.

      • spiffpitt@lemmy.world
        link
        fedilink
        English
        arrow-up
        6
        ·
        9 hours ago

        security isn’t real, just increasing deterrence for attackers.

        if you can access something, they can access it, it’s just a matter of effort needed to get there.