<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>UDS Enterprise</provider_name><provider_url>https://udsenterprise.com/en/</provider_url><author_name>UDS Enterprise Team</author_name><author_url>https://udsenterprise.com/en/author/uds-enterprise-team/</author_url><title>Lockdown security module bypass on Linux</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="OyKvY4woFS"&gt;&lt;a href="https://udsenterprise.com/en/lockdown-security-module-bypass-linux/"&gt;Lockdown security module bypass on Linux&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://udsenterprise.com/en/lockdown-security-module-bypass-linux/embed/#?secret=OyKvY4woFS" width="600" height="338" title="&#x201C;Lockdown security module bypass on Linux&#x201D; &#x2014; UDS Enterprise" data-secret="OyKvY4woFS" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://udsenterprise.com/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://udsenterprise.com/wp-content/uploads/2022/11/img-linea-blanca.gif</thumbnail_url><thumbnail_width>67</thumbnail_width><thumbnail_height>4</thumbnail_height><description>The Lockdown security module introduced in Linux 5.4 to lock certain parts of the kernel seems not to be as effective as expected. A developer has managed to skip this protection on Ubuntu 18.04 and break Secure Boot. To do this, he has used ACPI tables, the standard that controls the operation of the BIOS and provides advanced functionalities to manage and save energy.</description></oembed>
