From 56c1821716a93571b8950297422fe587a2351a0b Mon Sep 17 00:00:00 2001 From: ItsDrike Date: Sun, 31 Dec 2023 04:55:27 +0100 Subject: [PATCH] Fix typo --- guides/secure_boot.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/guides/secure_boot.md b/guides/secure_boot.md index 6ea7ef4..8d6307e 100644 --- a/guides/secure_boot.md +++ b/guides/secure_boot.md @@ -335,7 +335,7 @@ For our purposes, we will choose these: > From there, the attacker could simply add a kernel argument like `init=/bin/bash`, which would bypass systemd as the > init system and instead make the kernel run bash executable as the PID=1 (init) program. This would mean you would > get directly into bash console that is running as root, without any need to enter a password. - +> > However, with PCR12, this is prevented, as it detects that the kernel cmdline was overridden, and so the TPM module > wouldn't release the key.