>The researchers, Hector Marco and Ismael Ripoll from the Cybersecurity Group at Polytechnic University of Valencia, found that it’s possible to bypass all security of a locked-down Linux machine by exploiting a bug in the Grub2 bootloader. Essentially, hitting backspace 28 times when the machine asks for your username accesses the “Grub rescue shell,” and once there, you can access the computer’s data or install malware.
>use linux they said
Grub isn't linux, friend
>>51904632
it's not, its a boat loader
However, a large number of linux installations use grub 2. This is still a major security flaw
>>51904604
And if you go into grub you can boot into single user sp00ky
>>51904681
and if you boot a live USB, you can read and modify everything :O
WAKE UP SHEEPLE!
>>51904604
So? From the looks of it, you can only exploit it by being in front of the system. Considering /g/ probably doesn't share their computer I don't think it will matter. I'm not even going to bother patching this.
also
>using grub
>2015
>>51904721
which is why you use full disk encryption.
>>51904604
Once you have physical access to hardware, all bets are off.
>>51904604
>>51904344
sage this shit
>>51904783
is the luks stuff secure enough or should i switch to veracrypt?
>>51904604
Please bitch, if your disk isn't fully encrypted everyone can just mount it and remove your shitty password (read: bypassing your password).
Anyone tried this on their own machine? I'm gonna try it later today when I get home.
>>51904604
Still need to bypass encrypted disc lockout, also os x has verbose mode exploit to bypass admin password, and windows has ophcrack vulnerability
>>51904604
MFW I use lilo as my boot loader
>mfw I use Windows master race
Well i guess its a good thing i use sys linux