Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I always wondered how this works in practice for "real time" use cases because we've seen with secure boot + tpm that we can attest that the boot was genuine at some point in the past, what about modifications that can happen after that?


A full trusted boot chain allows you to use a reboot to revert back to a trusted state after suspected runtime compromise.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: