Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Windows Microsoft Operating Systems BSD Linux

OEMs Allowed To Lock Secure Boot In Windows 10 Computers 362

jones_supa writes: Hardware that sports the "Designed for Windows 8" logo requires machines to support UEFI Secure Boot. When the feature is enabled, the core software components used to boot the machine are verified for correct cryptographic signatures, or the system refuses to boot. This is a desirable security feature, because it protects from malware sneaking into the boot process. However, it has an issue for alternative operating systems, because it's likely they won't have a signature that Secure Boot will authorize. No worries, because Microsoft also mandated that every system must have a UEFI configuration setting to turn the protection off, allowing booting other operating systems. This situation may now change. At its WinHEC hardware conference in Shenzhen, China, Microsoft said the setting to allow Secure Boot to be turned off will become optional when Windows 10 arrives. Hardware can be "Designed for Windows 10," and offer no way to opt out of the Secure Boot lock down. The choice to provide the setting (or not) will be up to the original equipment manufacturer.
This discussion has been archived. No new comments can be posted.

OEMs Allowed To Lock Secure Boot In Windows 10 Computers

Comments Filter:
  • by Anonymous Coward on Friday March 20, 2015 @04:17PM (#49305083)

    That's a descriptive word I know gsm phone manufacturers work hard to distance themselves from, even more where it's more true.

    I was nice of Microsoft to play along until the secure boot controversy was diffused and then stop backing openess. I'm not sure RMS would be completely surprised.

    Seriously though, we have the choice, and the only thing that will maintain that freedom is that we express it with our dollars. Manufacturers are at OUR mercy, not the other way around.

    If you can't get to the boot menu when you play with it in the store, don't buy it. Amazon will let you return nearly anything. This is a freedom we can defend.

    • by TechCurmudgeon ( 3904121 ) on Friday March 20, 2015 @04:28PM (#49305151)
      Unfortunately the vast majority of PC buyers are unaware and/or don't care and will buy that crap. They'll pay again when it comes time to have their computer serviced. I will only buy re-configurable and repairable hardware. I've built PCs before and I'll do it again. Not surprised to see that Microsoft's venture into openness was so fleeting.
      • What's more important is what the volume buyers (i.e., businesses) do. Many businesses bulk purchase hardware and re-image it. You can bet that 100+ machine purchase will generate a backlash when re-imaging it to Windows 7 so mission critical apps still work results in bricked machines.
    • by rahvin112 ( 446269 ) on Friday March 20, 2015 @04:34PM (#49305201)

      People predicted that this is exactly what would happen with Secure Boot. The initial support would be optional and after a time and the phasing out of older hardware the support would become mandatory. Microsoft moving to a mandatory secure boot would fall right in line with these predictions.

      The next gambit in secure boot is to disallow the user putting in their own signing keys. From that point forward the only way to get an OS on a computer is with Microsoft's signature. Secure boot could be a good thing if the user was allowed total control, but microsoft shows their true goal here, which is to take total control of the PC market. Many forget that secure boot was devised at a time when Microsoft was first facing a new Linux OS challenger that they couldn't defeat with their traditional tactics. Many people don't consider this timing to be coincidental.

      • by SuricouRaven ( 1897204 ) on Friday March 20, 2015 @05:09PM (#49305473)

        If I were an Evil Executive at Microsoft, my next gambit would be to apply some unofficial, off-the-record pressure to the OEMs to make sure they have no means of disabling secure boot. Requiring this outright would be legally risky, could come back to bite them in future antitrust cases, but nothing to stop them from some deniable hints that it might help get a cheaper license deal.

      • by Beck_Neard ( 3612467 ) on Friday March 20, 2015 @05:25PM (#49305595)

        No, no, no, you are paranoid and delusional to think that they will keep you from disabling secure boot. Microsoft only cares about your security and safety, and you're a conspiracy theorist if you think otherwise.

      • Linux is not doomed. The OEMs will probably be open to other vendors. Red Hat and Ubuntu could probably get their keys recognized by the OEM and offer factory signed binaries. This would probably work just fine for the vast majority of Linux users.
        • by markdavis ( 642305 ) on Friday March 20, 2015 @06:16PM (#49305843)

          This is still the wrong approach. The owner of the hardware should have the right to turn it off if they so choose. It should not be up to Microsoft. And it should not be up to the OEM. And it should not be up to carriers. And it should not be up to the government, either (might as well keep extending out the doom-and-gloom possibilities).

          OEM's should listen to their customers and not Microsoft. Locking the bootloader is extremely anti-consumer and anti-competitive. The time to find out your machine is a paperweight should not be after you spent your hard-earned money buying a machine. When this whole fiasco started, there was ZERO transparency from the OEM's. You could not call Dell and ask if machine X had a locked secureboot, because the idiot support and sales people don't know. And it is not listed on the websites, the manuals, or the boxes.

          • This is like DRM for hardware, we don't own it but we can use it if the manufacturer gives us permission.

          • OEM's should listen to their customers and not Microsoft. Locking the bootloader is extremely anti-consumer and anti-competitive.

            What this means for the future of Linux and alternative OSes is unclear at best.

            Those who build their own desktops will retain the ability to disable Secure Boot, since Asus or MSI doesn't know what kind of operating system you're going to load on the board. But laptops are a different story. Some laptop vendors will undoubtedly continue to ship a ''Disable'' option on Secure Boot, but vendors like HP and Dell may simply decide that closing the attack vector is more important than user freedom, particularly when the margin on PCs is so low to begin with. When every support call is measured against the handful of dollars an OEM makes on each machine, eliminating the need for such interaction is extremely attractive.

            Psychological research has long confirmed the power of default settings --- ship something enabled (or disabled), and the vast majority of users will never change the option. Given that Windows machines were already required to enable Secure Boot by default, where's the security benefit in making the kill switch optional?

            As far as we can tell, there isn't one.

            Linux's worst-case scenario: Windows 10 makes Secure Boot mandatory, locks out other operating systems [extremetech.com]

            For the vendor of a mass-market Linux laptop ---- if there is such a thing --- choosing a signed Linux OS and closing an attack vector common to both Linux and Windows makes perfect sense as well.

            It is not anti-consumer and it is not anti-competitive.

            OEMs are listening to their mass market customers and what these customers are saying is "Lock it down.. We don't want to tool up and poke around under the

            • by 0123456 ( 636235 )

              OEMs are listening to their mass market customers and what these customers are saying is "Lock it down.. We don't want to tool up and poke around under the hood."

              Really? I've never heard a single mass market customer demand that they should be able to do less with their PC.

              Fortunately, desktop PCs are only really useful for games and a few other specialized uses these days, so I can always buy an ARM next time.

      • Secure boot could be a good thing if the user was allowed total control, but microsoft shows their true goal here, which is to take total control of the PC market.

        I know of at least one PC hardware OEM [apple.com] who won't likely play that game...

    • by MrBigInThePants ( 624986 ) on Friday March 20, 2015 @04:36PM (#49305219)
      Of course it will work.

      This is essentially another form of DRM and as you well know that was and is still highly successful and completely crushed all piracy. People still actively seek out products that say "DRM Included" just so they can have the safety and security of knowing that a large corporate is having its own best interests protected at the expense of your product's usability.

      Anyone with a marketing background will tell you this is a FANTASTIC idea guaranteed to succeed...if you pay them enough...

      But seriously now.

      The general livestock will buy the "coolest" and/or "cheapest" option and wont understand what the fuck is going on as per usual. It success or failure will be based on whether this affects the price point of the product (i.e. making it cheaper) or detrimentally effect its "coolness". (like DRM did)

      And DRM still exists and are some of the most profitable platforms around. e.g. Steam, Itunes, netflix, etc.
    • by Burz ( 138833 ) on Friday March 20, 2015 @06:02PM (#49305785) Homepage Journal

      There should be a permanent sh!tlist pinned to the top of Slashdot with any vendor that promotes this scheme for "PCs".

      Microsoft's long-time disruptive technology shark in the water was that they promoted a platform that was just open enough to let techies (and 3rd party vendors) on a budget customize the systems however they need. This is the essence of a "personal computer", for the MS camp at least. Now MS has jumped their own shark.

      Their tepid claims of being FOSS-friendly are being shown as ultimately false. Like Apple, they still won't incorporate open A/V formats into their products and their OSes will tell you an inserted Linux-formatted volume "must be formatted before use". Heaven forbid if I ever give an EXT3 formatted flash drive to an Android user, and they decide someday to look at it with Windows. They are similarly hostile when it comes to Linux multiboot setups. Its wilful negligence that still reigns in Redmond and must be fought with tooth and nail to gain any concession.

      And how necessary for security are these firmware-level lockouts?? They are not! Qubes OS employs a scheme that, in combination with a TPM, prevents a computer from being able to reproduce a chosen passphrase if its been tampered-with. No doubt, the MS excuse will be that the consumer or administrator can't be bothered to remember a sentence to verify system integrity.

      I suggest rallying around vendors like this: https://www.crowdsupply.com/pu... [crowdsupply.com]
      Eventually, we should pressure the market to open up the whole damn stack; We will probably be forced to.

    • The masses don't know and don't care. Maybe Slashdotters do, but we are going against the tide of lemmings stampeding for the cliff. Maybe we need two 'puters now. One 'puter where we do stuff for the man another for everything else.
    • Yeah, yeah. The sky is falling.... Except that it isn't. With signed bootloaders like shim [ubuntu.com], you can install or run any operating system yourself without changing the BIOS to disable Secure Boot at all.

      Not being able to run a 3rd party OS was a concern with Windows 8. But the open source community have solved that problem. So being able to disable Secure Boot is no longer required.

    • Freedom is, in all aspects, "pining for the fjords." With regards to the manufactures of gadgets, it isn't in their interest to allow even the slightest bit of freedom. You can't install your own OS on the device you paid for, you can't install software that wasn't blessed by the prevailing curator of the local app store. We're moving towards a society in which you (as a consumer) don't own anything, it's leased or rented or provided "gratis", so long as you remain in accordance with whatever contractual terms they wish to impose. And before the Desktop centric crowd chimes in with "I own my box!", sure, you do now. But the current business practice is to retain ownership of everything and dole out access with as many restrictions as possible. It isn't that big of a leap to presume that sometime in the future you'll only be renting your motherboard, and may even have to pay extra to enable more memory access or "Premium CPU interconnects". Hell, you might be already! Have you read through the entirety of the terms of use provided with every component present in your machine? Do you really think Intel has your best interest at heart? These corporate scumbags can stuff end user agreements with whatever they want, knowing full well that practically no one is either going to read it, or have the financial means to fight it out in court.

      Once the BIOS is locked down, why wouldn't manufacturers require extra payments for increased CPU throughput or maximum available RAM? Sure, your new mobo comes with slots for 64 GB, but it's only licensed for 16GB, any more requires an extra payment. These components are getting so sophisticated that bits and pieces of what used to be considered standard functionality, parts which were once hardwired, will be doled out as premium add-ons and DLC-like upgrades. There's nothing stopping them, it's only a matter of time before each and every aspect of the computing environment is held ransom by one company or another.

  • by Jax Omen ( 1248086 ) on Friday March 20, 2015 @04:23PM (#49305129)

    Nah, couldn't be.

    I don't buy prebuilts but any manufacturer that locks secureboot will no longer be recommended to any of my non-tech-savvy friends.

    • Re: (Score:3, Informative)

      Microsoft afraid of the YOTLD?

      Nah, couldn't be.

      Maybe in some alternate universe, but certainly not in this one.

      I don't buy prebuilts but any manufacturer that locks secureboot will no longer be recommended to any of my non-tech-savvy friends.

      So they'll lose what? 2 whole sales out of 10s of millions?

    • you mean you dont build your friends machines??? pfft
      • Unfortunately most of my friends demand laptops.

        I build desktops for the few family members who see the value in them.

    • Everyone else is forgetting that plenty of off-the-shelf components get used for Linux servers, desktops, and research systems all the time. If motherboard producers don't want the last of their sales to fly away to the mobile market, they're obviously not going to toss away alternative operating systems.

      In other words, Microsoft can say whatever the hell they like. Hardware manufactures want money. They don't give two shits whether it comes from Windows or Potato-OS.
    • by Anonymous Coward

      I just purchased four Dells with Windows 8.1 from NewEgg along with 8.1 Professional for each to use in a business. I swapped out the HDDs for SSDs and installed using OEM licensed, legitimate 8.1 Pro media. None of them will run Professional, instead defaulting to fully registered 8.1 Basic.

      They wont accept the Windows Product keys at all. Instead, they show completely different keys that must have been installed into the hardware. This occurs whether secure boot is turned on or off. I have a case num

  • by Anonymous Coward on Friday March 20, 2015 @04:27PM (#49305149)

    Grabs popcorn.

    You can currently cryptographically sign a Linux kernel to secure boot, You can install them alongside, or overwrite the windows signature (keep in mind, these keys are your new keys to the windows os. It's not truly keyless, so I would suggest add them alongside.) but most I.T. guys aren't even smart enough to know how it's done. It's no easy task even for Linux people. I currently make 6 figures in a support job and it was difficult for me. I've attempted it only once and was successful, but it is so not user friendly even to smart tech people. I would go as far as to say that even less than 1% of people will ever do it. The other hassle is, if you ever update your kernel in Linux which happens way more than in Windows, you have to re-sign against the new one and re-add the keys all over again alongside or overwrite.

    However, I still have the ability to do it, and that's what's important. Make no mistake. This is a literal and direct attack on Linux. OEM's will not care about the few people who use Linux and will omit this ability essentially killing Linux off. This is Microsoft's attempt at the final nail in the coffin of Linux.

    • Quite. This was forseen. This is just another whack of the mallet driving the thin end of the wedge a bit deeper.

      First you had to turn off a feature that said "Secure Boot". How many standard users are going to turn that off?

      Now there will probably be "considerations" for those who make their hardware less easy to boot Linux on.

      "Oh, yes, fewer config options make things more reliable - less to misconfigure, less to go wrong - we prefer that kind of device, gives Windows a good name by being more reliable...

      • Re: (Score:3, Insightful)

        How many standard users are going to turn that off?

        How many "standard" users are going to install Linux, or even know what Linux is?

        Once a user learns enough about Linux to want to install it they will undoubtedly know how to turn this feature off or install the correct keys.

    • by Dutch Gun ( 899105 ) on Friday March 20, 2015 @05:42PM (#49305675)

      Microsoft is now saying that OEM hardware that doesn't allow disabling secure boot would still be "Windows 10 certified". What's in it for the OEM to do this? Why would they purposefully lock their customers out of a choice of OSes? I have a hard time seeing this happening for PCs. It seems more likely that this is actually intended for smaller-form-factor hardware like phones or tablets, similar to how Apple attempts to lock down the devices they sell. It's hard to say since all versions of the new OS are simply called "Windows 10".

      Regarding PCs though, I can think of nothing that would generate a new anti-trust lawsuit faster than this. MS had better walk damn carefully here if they do ANYTHING that could be perceived as unfairly locking Linux and other OSes from PC hardware. Frankly, I think the first OEM to try this is going to generate a shitstorm of controversy the moment an unsuspecting user tries to install Linux in a secondary partition or to replace Windows altogether. While it's good to be aware of this and watch to see how things go, I don't think the sky is falling quite yet.

      So, that being said... Can anyone explain to me why Microsoft can use the Secure Boot feature but Linux can't offer the same as an "out of the box" experience? Or why Windows can apparently be patched and continue to work, while Linux somehow can't? Is this true for Linux in general, or just for people who modify and compile their own kernel (which I'm guessing probably isn't that many)?

      • What's in it for the OEM to do this? Why would they purposefully lock their customers out of a choice of OSes?

        Rightly or wronly, perhaps they fear that their help lines will be tied up with people who have installed Linux (or are trying to) asking for help. Perhaps this happens - I do not know, but can imagine it can in some cases.

        Now they will be able to say : "It can't be done, end of story, have a nice day." [Click]

    • Or Red Hat and Ubuntu establish relations with OEMs and see that factory signed Linux binaries work just fine. Would suck for kernel devs but would probably work just fine for most Linux users. Linux is not doomed.
    • Uhhh, last I checked, Linus has no problems with secureboot. https://www.youtube.com/watch?... [youtube.com]
  • No boot? (Score:3, Interesting)

    by Anonymous Coward on Friday March 20, 2015 @04:29PM (#49305161)

    "the core software components used to boot the machine are verified for correct cryptographic signatures, or the system refuses to boot"

    Does that mean that IF malware infects the bootloader, the OS will not boot, BRICKING IT? Seems like an easy way for grandmothers to lose their whole computer with a click of the mouse.

    • Re:No boot? (Score:5, Funny)

      by sjames ( 1099 ) on Friday March 20, 2015 @04:37PM (#49305221) Homepage Journal

      You got it! We had to destroy the laptop in order to save it...

    • Presumably that's better than having silent spyware like a key logger, which can cause significant financial harm far in excess just buying a new laptop.

      • Re:No boot? (Score:4, Insightful)

        by Dr_Barnowl ( 709838 ) on Friday March 20, 2015 @05:10PM (#49305481)

        True - the problem is not the security, the problem is who it's working for.

        If this comes to pass, you'll have to beg Microsoft's permission to run any software at all on hardware locked down like this.

        First, you had to switch off SecureBoot. This probably discouraged a bunch of users who may have tried Linux out. Who wants to turn off a feature that sounds all... secure.

        Now, you'll have to obtain and install special signed binaries. That will be a stumbling block for a few more.

        Then eventually, they'll stop signing binaries, and the only operating system that will be bootable will be Windows.

        And finally, they'll change the OS not to load anything that isn't signed with an MS key. Only MS approved and certified developers (with valid Visual Studio Cloud accounts!) will be able to produce software for Windows, and sell it through the Windows App Store only.

      • If that were the reason, it would be easy to fix:
        1. Have firmware sha256sum the EFI loader. Does loader match stored key? If not, do not load it.
        2. Include an option in setup for 'I just installed a new OS, update stored key on next boot.'

      • by Thraxy ( 1782662 )

        Meh.. My PC is worth more than my bank account and I'm not allowed credit. I'll take the spyware over the brick xD

    • I guess you'd be able to boot from a recovery USB stick/CD/etc.

      Presumably the idea is malware will not be designed to infect such systems. After all being rendered unbootable is a sure way to get your victim PC taken into a repair shop, which then might submit the malware sample they find to AV vendors ...

    • Almost. If malware infects the bootloader, the OS will not boot - but that doesn't quite brick it. You can still boot off of removable media, providing the removable media contains a signed loader. This means that if you insert a Windows 8 or 10 installation CD/USBstick, or the manufacturer-supplied recovery disc (Well, the disc they make you burn to save five cents), you can boot off that and reinstall the OS. However, if you insert a linux* or Windows 7 disc, the firmware will not find a valid signature a

    • If something has compromised your system at the boot sector level, your entire machine is now completely compromised as well. What other option is there? Give the user a warning that they'll just ignore and click through?

      One would assume these computers have some sort of "rescue disc" to boot from external media, recover data, and then reinstall the OS and core software.

    • by Kjella ( 173770 )

      "the core software components used to boot the machine are verified for correct cryptographic signatures, or the system refuses to boot"

      Does that mean that IF malware infects the bootloader, the OS will not boot, BRICKING IT? Seems like an easy way for grandmothers to lose their whole computer with a click of the mouse.

      You make it sound like running a corrupt/compromised system is a good thing. The system isn't supposed to let you alter the system files, but it might happen anyway for example by an exploit or mounting the drive in another computer. If it's just random bit flips I think Windows keeps backup copies anyway. If all the copies fail verification, it'll tell you the system is corrupt and insert a repair disc/USB stick with good copies. It's broken, not bricked. And whatever broke it, you probably want to fix. It

  • Don't buy from any vendor that sells locked up shitware... Why anyone would buy a pre-built machines these days is beyond me. The service is terrible from every vendor, even for coporate contratcs. They install tons of crapware, and they pick the cheapest parts possible (you ever look at the PSU in a Dell or HP, etc.? It is the smallest one that could possibly do the job, made by the lowest bidder) to then charge you MORE for it. No thanks.
    • by dissy ( 172727 )

      Replacing the Microsoft SecureBoot key with my own PKI key is perhaps #3 on the list of things I do when configuring a new computer before ever installing a hard drive or OS - following enabling vPro AMT and then the BMC manager if present.

      If I am unable to replace the master SecureBoot key with my own, that machine is getting packed up and sent right back to the OEM as defective.

      I only buy OEM systems for work and build systems for home use. But the HP account for work sees a couple hundred computers a ye

    • Because for those who want laptops, build-your-own is not an option.

    • by gtall ( 79522 )

      "Why anyone would buy a pre-built machines these days is beyond me." So, we can count you in the 1% who find a problem with this. MS knows they can get away with it. The only thing that will screw MS is for computing to move on from the PC. But business is still in MS's pocket, wants PCs, and wants someone to return the box to or get service on, so the HPs, Dells, etc. of the world will continue to support MS, they lost their souls long ago.

  • Slippery slope (Score:5, Insightful)

    by amorsen ( 7485 ) <benny+slashdot@amorsen.dk> on Friday March 20, 2015 @04:34PM (#49305195)

    First they invented SecureBoot, but that was OK, because you could turn it off.

    Then they prevented disabling it, but that was OK, because several non-Windows bootloaders are signed.

    Next up will be refusing to sign the boot loaders which simply disable SecureBoot and load Linux/*BSD. That will be OK, because Ubuntu is properly signed including the kernel (I think).

    After that it will only be certain commercial vendors who can get a certificate, but that will be OK, because Red Hat Enterprise Linux 8 will run, only allowing signed kernel modules.

    Yes I hate slippery slope arguments too.

    • by DRJlaw ( 946416 )

      First they invented SecureBoot, but that was OK, because you could turn it off.

      Then they prevented disabling it, but that was OK...

      Because they didn't. "No worries, because Microsoft also mandated that every system must have a UEFI configuration setting to turn the protection off, allowing booting other operating systems. This situation may now change. At its WinHEC hardware conference in Shenzhen, China, Microsoft said the setting to allow Secure Boot to be turned off will become optional when Windows 10 a

    • Re:Slippery slope (Score:4, Interesting)

      by IamTheRealMike ( 537420 ) on Friday March 20, 2015 @05:12PM (#49305503)

      Unfortunately, it's not really Microsoft pushing us down this slippery slope. If anything it's the NSA.

      The problem is boot sector or BIOS malware is now a real thing that needs real defences. It's not some obscure academic attack any more. Securing the boot chain is the only known way to fix this.

      The real issues start once malware begins using Linux to install itself. That is, "I cannot infect or modify Windows because of the secure boot check. But I can install Linux and then load a special kernel module and then make the kernel chain into the Windows boot process after modifying it". So then you start needing signed kernels to check for signed kernel modules, etc. Eventually you end up with hardware that only runs signed code, and it's not because of some evil DRM conspiracy but because the openness of the PC platform has caused it to be so thoroughly bum-fucked by malware developers. I mean what are the manufacturers meant to do? Leave their 99% Windows userbase vulnerable to spying and horrible un-removable viruses because Team Linux has never managed to get OEMs on board to make Linux laptops? Doesn't make any sense, regardless of where your software sympathies may lie.

      • Re:Slippery slope (Score:5, Informative)

        by TapeCutter ( 624760 ) on Friday March 20, 2015 @05:58PM (#49305769) Journal

        The problem is boot sector or BIOS malware is now a real thing that needs real defences. It's not some obscure academic attack any more.

        Boot sector attacks have been a malware vector since..well...forever, back in the DOS3.x days we had Norton disk doctor to remove them manually.

    • by Burz ( 138833 )

      Also if an alternative to SecureBoot were offered by a small security firm or FOSS project, how would they get their boot code signed??

  • Secure Boot is clearly a clumsy means to lock out alternative OSs, and this announcement is the next step toward the untlimate in vendor lock-in.

    Any OEM who doesn't implement the secure boot option (even on a single model) will face a wall of rage. I'm sure MS is offering the OEMs some type of poisoned candy to not implement it, though.

    • by Dr_Barnowl ( 709838 ) on Friday March 20, 2015 @05:16PM (#49305537)

      SecureBoot is a reasonable thing. It's when it's under the control of Microsoft, rather than the owner of the hardware, that it becomes a problem.

      Make sure the OS is composed of files that are cryptographically signed and entirely legit? Fine.

      Define "legit" as being "only those things signed with Microsoft keys"? Not so fine.

      The current solution of a Linux bootloader signed by Microsoft is a stupid, half-baked compromise. I wouldn't have settled for it - nothing less than the ability to load my own signing keys into the BIOS being mandatory for all SecureBoot installations. And of course, disabling it.

  • Toooold Youuu! (Score:3, Interesting)

    by linebackn ( 131821 ) on Friday March 20, 2015 @05:11PM (#49305489)

    Yep, told you so.

    I'd hope somebody keeps a public list of machines that are locked down. Although that probably won't keep the masses from buying.

    This is "optional" for OEMs in the same way as they have the option to have MS break their legs or not.

  • by msobkow ( 48369 ) on Friday March 20, 2015 @05:18PM (#49305549) Homepage Journal

    When I tried to update the graphics drivers for my Lenovo laptop, I got undocumented errors and a rollback. Later, on a whim, I disabled UEFI, and the drivers installed with no problem. I re-enabled UEFI afterwards, and the system still runs fine.

    So unless you trust your vendor to deliver absolutely PERFECT drivers that will NEVER need updating, you wouldn't want a system that prevents you from disabling UEFI.

  • Comment removed based on user account deletion
  • by ArcadeMan ( 2766669 ) on Friday March 20, 2015 @05:26PM (#49305607)

    Want to install Linux? Buy a Mac!

  • by redback ( 15527 ) on Friday March 20, 2015 @05:41PM (#49305667)

    For most people, its not about alternative operating systems.

    Its about when they break the thing and bring it to me, and I cant fix it because I cant run any boot disks on it.

  • Trade-in value (Score:3, Insightful)

    by PPH ( 736903 ) on Friday March 20, 2015 @05:47PM (#49305713)

    What will a locked secure boot loader (as opposed to one where UEFI can be switched off) do to the trade-in value for a used system?

    Microsoft prohibited disabling UEFI Secure Boot on ARM devices back when Windows 8 support for them came out. And from what I have heard, this is one reason that old ARM hardware has a near zero value on the used equipment market. Meanwhile, x86 stuff still has a second life and some value.

    Something to think about when selecting a Windows 10 system.

  • So those systems that are Windows 10 locked will be unable to run Linux. This is great for those suppliers that support Linux as they will effectively have less competition.

  • I'm not buying a crippled system. Are you?

  • by tech10171968 ( 955149 ) on Friday March 20, 2015 @08:17PM (#49306399)

    This is the precise reason my next laptop is probably going to be ordered from someone like System76 or Zareason. I shouldn't have to do this silly UEFI dance with offerings from major "Big-Box" OEM's just to install my choice of OS on what is supposed to be MY system. So why not avoid all the BS and buy a portable from a manufacturer which actually specializes in building Linux machines?

  • by ikhider ( 2837593 ) on Friday March 20, 2015 @08:19PM (#49306415)
    Are there any more companies that offer GNU/Linux out of box on lappies? Somehow, I do not trust the Dell's and HP's of this world.... What about desktops? Do you have to have Windows by default too when you buy a new motherboard? Anyone?
  • Can't happen (Score:5, Informative)

    by 0123456 ( 636235 ) on Friday March 20, 2015 @10:26PM (#49306869)

    When we pointed this out years ago, the Microsoft trolls told us to stop being silly, because it was optional and Microsoft would never, ever think of changing that. Why, the very idea!

To thine own self be true. (If not that, at least make some money.)

Working...