• gwindli
    link
    fedilink
    arrow-up
    1
    ·
    4 months ago

    fair enough. i can see that disabling safe mode would be a decent security measure. but by the time that kind of exploit is used, you’ve already got bad actors inside your network and there are much easier methods available to pivot to other devices and accounts.

      • Scary le Poo@beehaw.org
        link
        fedilink
        arrow-up
        2
        ·
        4 months ago

        Well then obviously you could opt to restrict safe mode on laptops only, or laptops and desktops allowing you to get your server infrastructure up quickly so at least the back end is running properly.

        Ffs.

        • jarfil@beehaw.org
          link
          fedilink
          arrow-up
          1
          ·
          4 months ago

          Servers with KVM access, could have it compromised, letting bad actors enter safe mode.

            • jarfil@beehaw.org
              link
              fedilink
              arrow-up
              1
              ·
              4 months ago

              Doesn’t need to be fully compromised, but it isn’t unusual for the access credentials to some portion, to be stored on an easier to compromise system. Disabling safe mode on a server, prevents stuff like a single compromised laptop, from becoming a full server compromise.

    • Norgur@fedia.io
      link
      fedilink
      arrow-up
      1
      ·
      4 months ago

      Social engineering is the real danger here. If Safe Mode can be enabled on the device too easily, a fake “Call from IT to verify something” , instructing the uneducated user to enable safe mode, circumventing security measures, to place some malware, is really dangerous.