mirror of
https://github.com/PrivSec-dev/privsec.dev
synced 2024-11-09 16:21:34 -05:00
Typo fixes
Signed-off-by: Tommy <contact@tommytran.io>
This commit is contained in:
parent
82939616b7
commit
f38445be42
@ -147,11 +147,11 @@ Let's go through some of their claims and contrast that agains reality.
|
|||||||
|
|
||||||
> PureBoot can protect against firmware tampering.
|
> PureBoot can protect against firmware tampering.
|
||||||
|
|
||||||
It cannot protect against firmware tampering as discussed in the [Heads](/#heads) section.
|
It cannot protect against firmware tampering as discussed in the [Heads](#heads) section.
|
||||||
|
|
||||||
> [The ME is disabled (HAP set to 1), and mostly wiped with `me_cleaner`](https://puri.sm/learn/intel-me/).
|
> [The ME is disabled (HAP set to 1), and mostly wiped with `me_cleaner`](https://puri.sm/learn/intel-me/).
|
||||||
|
|
||||||
They only set the HAP field now, but you have to find that out through a [forum post](https://forums.puri.sm/t/librem-14s-me-disabled-but-not-neutralized/12238). Regardless, they crippled critical security features including the ones described in the [Intel CSME and AMD PSP](/#intel-csme-and-amd-psp) section.
|
They only set the HAP field now, but you have to find that out through a [forum post](https://forums.puri.sm/t/librem-14s-me-disabled-but-not-neutralized/12238). Regardless, they crippled critical security features including the ones described in the [Intel CSME and AMD PSP](#intel-csme-and-amd-psp) section.
|
||||||
|
|
||||||
> PureBoot is [not vulnerable](https://puri.sm/posts/pureboot-not-vulnerable-to-uefi-exploits-again/) to UEFI firmware vulnerabilities which lead to Boot Guard bypasses.
|
> PureBoot is [not vulnerable](https://puri.sm/posts/pureboot-not-vulnerable-to-uefi-exploits-again/) to UEFI firmware vulnerabilities which lead to Boot Guard bypasses.
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user