During update process, Pureboot does not verify the .rom file before flashing it. I think it is quite dangerous because it allows malware in the operating system to gain privilege and persistency by modifying the .rom file in the usb drive.
I think Pureboot can secure this process by adding a “Verify and update BIOS” option to the menu, and by uploading a signature file for each released update. The “Verify and update BIOS” option should check both the signature and the time it is made against the embeded public key.
And for power users who want to flash their own BIOS. They can always use the existing update process or do it in the recovery shell. So there will be no vendor lock-in.
Update: To prevent TOCTOU related attack, Pureboot needs to copy the signature and .rom to a temp dir before verifying them. So the whole verify process will be 1) Copy the signature and .rom to a temp dir. 2) Verify the content of .rom file. 3) Verify the time the signature is made to prevent rollback.