HIGHLIGHTS Secure Boot policies are signed and validated by Microsoft The leaked golden key can bypass operating system checks Golden key allows attackers to boot any OS or self-signed binary A leak has gone horribly…

HIGHLIGHTS Secure Boot policies are signed and validated by Microsoft The leaked golden key can bypass operating system checks Golden key allows attackers to boot any OS or self-signed binary A leak has gone horribly…