What’s your income? What region of the world do you live in and what hardware is available to you? I’m still using an am4 platform PC as my daily driver because I can’t burn money. One of my buddies has an AM3 PC. Many people use modified surplus office PCs (especially in developing nations like South America or SEA), which don’t have secure boot as an option. Check your privilege, and maybe donate some of your spare hardware to those who need it, if you want to make this “a non issue” for everyone.
Yeah. I own my hardware, I configure my software. I gut Windows like a fish and keep it on a leash for these games, and use Linux for my work and for the games that respect the ecosystem.
Needlessly intrusive. Can obviously be circumvented by cheaters anyway, so quite possibly superfluous. Apart from that it protects against the kinds of attacks that typically require physical access to the computer. If you have physical access you have full access anyway. Etc.
I get your pc, “tamper” it, then i install a fake bios that tells you all is well and that your tpm and secureboot and whatever else bullcrap they invent is still happy.
9tr6gyp3@lemmy.world 2 days ago
Why?
brezel@piefed.social 2 days ago
muusemuuse@sh.itjust.works 2 days ago
Alaik@lemmy.zip 1 day ago
I don’t think he needs a winning argument. I think EA needs to justify this kernel level AC, not the other way around.
Truscape@lemmy.blahaj.zone 2 days ago
Kazumara@discuss.tchncs.de 1 day ago
Weird, for me it was just flicking the switch in UEFI and now Grub and trough it Windows 10 and Fedora 43 boot in Secure Boot.
9tr6gyp3@lemmy.world 2 days ago
Im fairly certain any legacy hardware that doesn’t have secure boot as an option is going to struggle loading BF6 regardless.
The first two points are not related to secure boot at all.
brezel@piefed.social 2 days ago
you think loading my own kernel modules is not related to secure boot? i guess you don't work in IT then.
pathief@lemmy.world 2 days ago
You can’t install most linux distributions with secure boot enabled.
Kyrgizion@lemmy.world 2 days ago
Needlessly intrusive. Can obviously be circumvented by cheaters anyway, so quite possibly superfluous. Apart from that it protects against the kinds of attacks that typically require physical access to the computer. If you have physical access you have full access anyway. Etc.
9tr6gyp3@lemmy.world 2 days ago
You know secure boot was specifically made to protect users for this exact use case. Any tampering of the system will prevent the system from booting.
Eggymatrix@sh.itjust.works 2 days ago
I get your pc, “tamper” it, then i install a fake bios that tells you all is well and that your tpm and secureboot and whatever else bullcrap they invent is still happy.
See the problem?
Limonene@lemmy.world 2 days ago
A person with physical access can tamper with the OS, then tamper with the signing keys. Most secure boot systems allow you to install keys.
Secure boot can’t detect a USB keylogger. Nothing can.
Tanoh@lemmy.world 2 days ago
No, encrypt your drives.
SoupBrick@pawb.social 2 days ago
It fucks with Linux. I literally just disabled it to resolve a driver install issue before this announcement was made.
9tr6gyp3@lemmy.world 2 days ago
Linux can run with secure boot just fine though. Use your distros documentation to set it up.