Or a free OS.
So sign your own kernel with your own keys and enroll them to your UEFI and you have 0 problem with installing "a free OS" (it can also just be regular EFI binaries).
Also, by the way, I am an ex Microsoft employee, bet you wouldn't guess that from these comments.
I do personally consider secure boot and TPM to have been pushed in bad faith, not for serious security concerns.
It is, and it isn't something I like, I'd prefer if no keys were enrolled by default.
> I am an ex Microsoft employee, bet you wouldn't guess that from these comments.
No I wouldn't have guessed, but MS is so big that just saying your were a MS employee could mean in any one of the thousands of departments not even remotely related to Windows. But that is neither here nor there as it doesn't change anything about my statement.
> I do personally consider secure boot and TPM to have been pushed in bad faith, not for serious security concerns.
Sure, but I still prefer to have this now that I can use it, even if its introduction was in bad faith (which it was consdering IIRC there were e-mail floating around talking about if they could get away with making it only work with Windows or maybe it was some other security mechanism).
That may be true on x86, but on ARM, Microsoft specifically requires that you not be able to do either of those things:
> 13. On ARM platforms Secure Boot Custom Mode is not allowed. A physically present user cannot override Secure Boot authenticated variables (for example: PK, KEK, db, dbx).
> 18. Enable/Disable Secure Boot. On non-ARM systems, it is required to implement the ability to disable Secure Boot via firmware setup. A physically present user must be allowed to disable Secure Boot via firmware setup without possession of PKpriv. A Windows Server may also disable Secure Boot remotely using a strongly authenticated (preferably public-key based) out-of-band management connection, such as to a baseboard management controller or service processor. Programmatic disabling of Secure Boot either during Boot Services or after exiting EFI Boot Services MUST NOT be possible. Disabling Secure Boot must not be possible on ARM systems.
And until this requirement on ARM is changed (or there are options I can buy which allow it) I don't consider it a secure platform.
No, it's really not.
Currently Microsoft requires enrolling keys and disabling SB to be available to qualify for "Designed for Windows" branding on x86 PCs. No such requirement holds for ARM PCs, and Microsoft may remove this requirement at any time.