Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Without a verified boot chain, security would be greatly compromised.

Like I could just grab your thumb drive, and put a new system on there that looks the same, and steals your password.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: