> Of course, privileged access is required, but that’s not a problem in many cases.”
Doesn't that make it an "already past the air lock" kind of attack?
Like, a privileged user would have to knowingly execute a link or file while ignoring all the anti-malware warnings thrown up by the o/s. Windows UAC would stop this, assuming the user is paying attention, right?
What am I missing?
@ralfmaximus
You're missing the fact that the sole reason for Secure Boot is to protect against post-exploit attacks that infect the pre-boot firmware.