Join Nostr
2025-12-23 01:26:10 UTC
in reply to

ity [unit X-69] - VIOLENT FUCK on Nostr: the main purpose of boot integrity is ensuring that a reboot deletes even malware ...

the main purpose of boot integrity is ensuring that a reboot deletes even malware that exploited the kernel and got full r/w disk access

Secure boot on ARM devices is more secure than non-Intel TXT x86, and the firmware is usually written more competently. It can be replaced by measured boot since most SoC vendors (like qcom) do not provide proper secure boot, and Intel TXT is not widely available on x86.

Stars, I'm sounding really silly here, I should stop trying to simplify it.

TL;DR, UEFI secure boot established a chain of trust from the firmware to the OS. Intel TXT establishes a chain of trust from the IME to the firmware. Measured boot establishes a chain of trust from the IME to the OS on x86, or from the bootrom to the OS on ARM. ARM secure boot also establishes a full chain of trust from the bootrom to the OS, but it tends to be unavailable on most devices.

Bwrap is a joke compared to Android sandboxing. Android relies on well-tested Unix UID/GID permissions and very restrictive SELinux on top (I'm unsure if they also 3employ seccomp), with binder providing an easy and obvious security boundary. FD.O is botched together using relatively untested code paths and relies on confusing design with unclear security boundaries