Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
Thaxll
15 days ago
|
parent
|
context
|
favorite
| on:
Lennart Poettering, Christian Brauner founded a ne...
I always wondered how this works in practice for "real time" use cases because we've seen with secure boot + tpm that we can attest that the boot was genuine at some point in the past, what about modifications that can happen after that?
Nextgrid
15 days ago
[–]
A full trusted boot chain allows you to use a reboot to revert back to a trusted state after suspected runtime compromise.
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: