Always install Windows first. Mint should be able to find your Windows install and have it as a bootable selection.
A quick fix you could try is to boot into Mint and reinstall the kernel. Itll run through the mkinitcpio and os-prober process and potentially add your Windows disk to the boot selection.
TBD. Apparently he's not happy about the state of things. Not just his project, but the development community as a whole hasn't been able to nail it down.
No, i meant granular controls through a parental account that is set on a child account, like how most parental controls are for services. Its just a funny thought.
Secure Boot is a security feature found in the UEFIstandard, designed to add a layer of protection to the pre-boot process: by maintaining a cryptographically signed list of binaries authorized or forbidden to run at boot, it helps in improving the confidence that the machine core boot components (boot manager, kernel, initramfs) have not been tampered with.
As such it can be seen as a continuation or complement to the efforts in securing one's computing environment, reducing the attack surface that other software security solutions such as system encryption cannot easily cover, while being totally distinct and not dependent on them. Secure Boot just stands on its own as a component of current security practices, with its own set of pros and cons.
Trusted Platform Module (TPM) is an international standard for a secure cryptoprocessor, which is a dedicated microprocessor designed to secure hardware by integrating cryptographic keys into devices.
TPM is naturally supported only on devices that have TPM hardware support. If your hardware has TPM support but it is not showing up, it might need to be enabled in the BIOS settings.
Note: There are two very different TPM specifications: 2.0 and 1.2, which also use different software stacks.
All that to say this is still not as secure as it could be (since it lacks some decent remote attestation), but security is best in layers, so a Secure Boot setup can be a great way to protect your pre-boot process.
Depends on your distros documentation, but essentially it verifies your UEFI, OS kernel, and other boot processes haven't been tampered with based on cryptographic signatures. Its really a neat setup.
Even on Linux, it's probably a good idea to set up SecureBoot with your TPM. Very few distros will automatically set this up for you, but I know for sure that Ubuntu and Fedora do this by default.
Always install Windows first. Mint should be able to find your Windows install and have it as a bootable selection.
A quick fix you could try is to boot into Mint and reinstall the kernel. Itll run through the mkinitcpio and os-prober process and potentially add your Windows disk to the boot selection.