Re: @HMB - let me get this straight
"Not quite straight! Microsoft will allow (but not require!) computer OEM to allow users to disable secure boot on non-ARM platforms and we all know how independent manufacturers are from Microsoft"
If you're going to correct someone, you should be correct. HMB has it right. It is a requirement that PC providers allow users to disable Secure Boot. The Reg. article or Linux Foundation are spreading FUD. Here is the relevant document:
MS Hardware Certification Requirements. Because it's a long document, the part to skip to is the section on UEFI Secure Boot (begins page 118). The relevant paragraphs I have quoted below:
"17. Mandatory. On non-ARM systems, the platform MUST implement the ability for a physically present user to select between two Secure Boot modes in firmware setup: "Custom" and "Standard". Custom Mode allows for more flexibility as specified in the following:
a. It shall be possible for a physically present user to use the Custom Mode firmware setup option to modify the contents of the Secure Boot signature databases and the PK. This may be implemented by simply providing the option to clear all Secure Boot databases (PK, KEK, db, dbx), which puts the system into setup mode.
b. If the user ends up deleting the PK then, upon exiting the Custom Mode firmware setup, the system is operating in Setup Mode with SecureBoot turned off.
c. The firmware setup shall indicate if Secure Boot is turned on, and if it is operated in Standard or Custom Mode. The firmware setup must provide an option to return from Custom to Standard Mode which restores the factory defaults.On an ARM system, it is forbidden to enable Custom Mode. Only Standard Mode may be enabled.
18. Mandatory. Enable/Disable Secure Boot. On non-ARM systems, it is required to implement the ability to disable Secure Boot via firmware setup. A physically present user must be allowed to disable Secure Boot via firmware setup without possession of PKpriv. A Windows Server may also disable Secure Boot remotely using a strongly authenticated (preferably public-key based) out-of-band management connection, such as to a baseboard management controller or service processor. Programmatic disabling of Secure Boot either during Boot Services or after exiting EFI Boot Services MUST NOT be possible. Disabling Secure Boot must not be possible on ARM systems."
!--End Quote.
Now, let's see who downvotes a post for putting factual information with a source.