102
Critical vulnerability affecting most Linux distros allows for bootkits
(arstechnica.com)
This is a most excellent place for technology news and articles.
The most useful quote to those familiar with the linux boot process:
If an attack needs root then it doesn't matter. Your box is toast anyway. If you're using http boot without verification then you should have seen a MITM attack coming.
I only let attackers with root privileges execute arbitrary code on my guest WiFi so I’m good.