That sounds awesome. I never understood how a TPM can figure out if an attacker can get the keys if the tpm is on the same machine. Does it check independently the signature of the application that asked for the keys?
That sounds awesome. I never understood how a TPM can figure out if an attacker can get the keys if the tpm is on the same machine. Does it check independently the signature of the application that asked for the keys?
I am curious as per the secure enclave part. Does it mean that they will be signing binaries? Does it mean that we will get secure boot support without self signing? Does it mean that there will be a signing system for the anticheats???
:")
Finally! Some competition with Steam OS! Hopefully only good things will come out of this!
I can reliably play wii on an x230. I am pretty sure you can go ahead and play unless it is ps2 or xbox og or anything newer (wii/gamecube excluded)
It should be safe, although for the future, I’d recommend installing the os to a completely separate drive and changing boot device by uefi.
I am using it for gaming on windows. I will dual boot with a different os on seperate drives. For linux, i want something stable that won’t crash on wayland.
I used to do this while using windows 10 and arch on my laptop. Didnt have any issues. It is just if windows 11 might have an issue. Afaik from the above, my guess is that it just disables the checks whilst disabling secure boot.
Looks interesting. A bit scary enrolling keys because i am scared of accidentaly deleting the default ones (unless i am being unreasonable)
To be more clear, the swap of the oses (not swap as in the swap partition) will be done from bios by changing the boot drive/efi executable and toggling secure boot accordingly. Do you think this will work?
I am asking because I am looking to dual-boot with windows 11 which requires secure-boot afaik. I could disable it whilst switching (each os will be in it’s own drive with the corresponding bootloader) so any os will be on a different drive.
I am mentioning the NVIDIA drivers. That is because there are new kernel modules that are open source. Maybe kernel signage is not needed with those ones. That is why I am asking.
By not necessarily, do you mean that I need to enroll keys?
Are the new kernel modules planned to be included in the kernel and if so, will that mean there will be secure boot support?
Congrats! : D
If you have time, maybe share the solution so future people can check and fix it themselves.
Hmmm… Can you type
systemctl --user status pipewire
Maybe try with kpipewire.
But also check audio in the kde settings maybe they got misconfigured.
try > sudo dnf reinstall pipewire-pulseaudio
For number 4 since it is very useful in such situations: press Ctrl + Alt + one of the F keys (usually one of 3,4,5) And to go back it is usually one of 1,2,7,8
It saved my ass many times.
Rip xeon servers (they will probably be fine but still)