I was helping a friend replacing the battery and thermal paste on his System 76 laptop. Never own one before but I notice it runs a special BIOS version, Coreboot. It turns out there are Coreboot and Lireboot. .These help to boot really fast though.

Anyway, I notice there are no password BIOS lock like on Lenovo. How would this protect against someone plug a USB in and just wipe my drive? On Lenovo you can set a supervisor / boot passwords, and you can remove USB drives from the boot list.

  • AudaciousArmadillo@piefed.blahaj.zone
    link
    fedilink
    English
    arrow-up
    6
    ·
    9 hours ago

    Maybe from another perspective, BIOS passwords are a weak defense. The BIOS settings storage are powered by a small battery and can be reset by removing the battery. As others have mentioned, protecting the data is the priority and done through encryption. Protecting the device itself is not really possible in most cases anyways.

  • over_clox@lemmy.world
    link
    fedilink
    arrow-up
    27
    ·
    13 hours ago

    Good question. But if someone unauthorized has physical access to your system, you already have worse problems to worry about…

    • NotSteve_@lemmy.ca
      link
      fedilink
      arrow-up
      11
      ·
      11 hours ago

      Yeah, I’ve never even thought about using PW BIOS protection since someone could always just pop out the drive and do whatever with it. I guess if it’s a soldered drive it makes slightly more sense but still easily overcome by anyone who’s determined enough

      Full disk encryption is what you want really

  • fuckwit_mcbumcrumble@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    16
    ·
    13 hours ago

    It’s apparently not at all a priority for the devs. They don’t seem to care if your laptop is stolen and the drive is wiped.

    Data exfiltration was their only concern and drive encryption solves that.

    • redsand@infosec.pub
      link
      fedilink
      arrow-up
      1
      ·
      10 minutes ago

      I can pull and wipe the drive in any laptop in 1-10min. Even in high end corporate almost no one sets a BIOS password, the few that do are doing it more to keep users out of those settings than as security. And even if you set it the on a lenovo, dell, hp, etc… There’s usually a manufactur password or pins you can short to reset it.

    • kkj@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      3
      ·
      4 hours ago

      They don’t seem to care if your laptop is stolen and the drive is wiped.

      Even if they did care, what could they do about it? The thief could remove the drive and wipe it with their own computer, or even just physically destroy the thing. The only point of a BIOS password is to make the laptop a pain for a thief to resell.

    • Ada@lemmy.blahaj.zone
      link
      fedilink
      arrow-up
      4
      ·
      12 hours ago

      What am I missing? If someone steals your laptop they can just mountb the drive in their own hardware irrelevant of your bios.

      • sbeak@sopuli.xyz
        link
        fedilink
        English
        arrow-up
        4
        ·
        11 hours ago

        When the drive in encrypted, you need a (very very long) encryption key to read it. Otherwise, the data is obfuscated and can’t be read by bad actors. This encryption key is essentially impossible for (non-quantum) computers to crack as it would take too long

        • slazer2au@lemmy.world
          link
          fedilink
          English
          arrow-up
          6
          ·
          9 hours ago

          Ironically it’s also the best way to make sure your data isn’t leaked when selling drives second hand.

          Full encrypt it, roll the key, and now you have a drive with no readable content for sale.

          When the next person come along they will likely ignore the password and do their own thing.

            • slazer2au@lemmy.world
              link
              fedilink
              English
              arrow-up
              2
              ·
              6 hours ago

              For spinning rust drives, yes. But for SSD no. Because of how the SSD store data it isn’t guaranteed to be overwritten.

  • village604@adultswim.fan
    link
    fedilink
    English
    arrow-up
    5
    ·
    edit-2
    12 hours ago

    Coreboot isn’t the same thing as the BIOS. It’s the motherboard chipset firmware and all it does is initialize the hardware, which is only part of what BIOS/UEFI do.

  • Default Username@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    2
    ·
    10 hours ago

    Check out something like Heads.

    Anyway, wiping your drive is the least of your worries when it comes to software attacks. You should be keeping regular backups of your data anyway. You want to prevent malicious actors from accessing your data, which, if they have physical access to your hardware, increases the risk a great deal. Heads will help prevent against evil maid attacks, although the bad actor can still reflash the BIOS chip physically. Full disk encryption (assuming your computer is off at the time that your computer gets stolen/hijacked) is the goto method of securing the data on your SSD.