Sounds like a misnomer to me.

  • TwilightKiddy@programming.dev
    link
    fedilink
    English
    arrow-up
    1
    ·
    16 hours ago

    If you do this, be sure to make an image of your EFI partition and/or keys and keep it somewhere safe along with whatever is needed to restore the partition. Because if something tempers with it, your computer will stop booting because sighed hashes no longer match the ones calculated and you’ll be locked out of your own system without some sort of way to restore the partition to a safe state.

    @onlinepersona@programming.dev

    • Ooops@feddit.org
      link
      fedilink
      arrow-up
      2
      ·
      edit-2
      4 hours ago

      Yes, preventing the boot process when something tempers with the files is the whole point of secure boot.

      And beside the backups you should always have (remember: no backup, no pity for you…) the keys to sign your EFI files with are on the encrypted disk so the running system can get updated. So deactivating secure boot again, unlocking your encrypted disk from some live boot stick and fixing it is always an option (as is having a live system at hand signed by the same keys if you want to…).