this post was submitted on 29 Jun 2025
-52 points (12.9% liked)
Linux
8249 readers
321 users here now
A community for everything relating to the GNU/Linux operating system
Also check out:
Original icon base courtesy of lewing@isc.tamu.edu and The GIMP
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
The default GRUB setup basically provides no security, even with UEFI secure boot enabled. On my default Debian install I can just edit the Kernel command line and get root without any password required. But beyond that, check out design goal 2 in this article https://0pointer.net/blog/fitting-everything-together.html
Honestly I simply found the statement to give very little to discuss.
Regarding editing the Kernel command line; that would require that you already have access to your Debian install and have the rights to edit the Kernel command line.
Regarding your link in general I find myself at odds with development practices that removes my own agency. I can see how for many end-users it's good, just like how most car owners shouldn't try to fix their car troubles themselves, but I would start looking for another OS if it starts pulling auto-updating á la Windows.
No. You can edit the Kernel command line directly from GRUB before booting into anything else. That is the default behavior (with Debian).
Yes, it is more aimed towards "casual" users that want something that just works. But auto-updating policy is not really the point of the blog. Every distro is deciding that by themselves and will always be able to.
Could be an idea to make it easier to set a grub password during distro installation, that I can agree on.