baatliwala@lemmy.world to Android@lemdro.idEnglish · 4 days agoThe days of custom Android ROMs are numbered, and Google is to blamewww.androidauthority.comexternal-linkmessage-square170fedilinkarrow-up1514arrow-down114cross-posted to: [email protected]
arrow-up1500arrow-down1external-linkThe days of custom Android ROMs are numbered, and Google is to blamewww.androidauthority.combaatliwala@lemmy.world to Android@lemdro.idEnglish · 4 days agomessage-square170fedilinkcross-posted to: [email protected]
minus-squaretroed@fedia.iolinkfedilinkarrow-up2arrow-down3·3 days agoYes, that’s how a normal bootchain works in every system ever - like the IoT device running Linux I’m right now working with.
minus-squarePossibly linux@lemmy.ziplinkfedilinkEnglisharrow-up3·3 days agoIt doesn’t though Standard Linux doesn’t check for tampering since that requires hardware and firmware support.
minus-squaretroed@fedia.iolinkfedilinkarrow-up2arrow-down2·3 days agoI’m sorry but you really have no idea what you’re talking about. Several distros ship with SELinux and Secure Boot by default.
Yes, that’s how a normal bootchain works in every system ever - like the IoT device running Linux I’m right now working with.
It doesn’t though
Standard Linux doesn’t check for tampering since that requires hardware and firmware support.
I’m sorry but you really have no idea what you’re talking about. Several distros ship with SELinux and Secure Boot by default.