

The thing is in such a case secureboot doesn’t help and is unnecessary. Secureboot only does anything for the concept of “trusted suppliers”.
If the system has available signing keys for itself, well, hypothetical malware could sign itself using those same keys The OS security mechanisms are the only things protecting that, and in which case the signature validation is redundant.
You can have trusted boot, e.g. LUKS volume sealed to TPM PCRs, but secureboot just doesnt make sense as a mechanism for a user to only trust themselves.






Actually heard from a colleague there that he was actively doing just that, at least a few weeks ago. Complete with the cloak and dagger about coordinating it offline and avoiding active patrols and protests that would similarly draw too much attention.
Yes, awfully 1930s German scenario that happened there.