Comment by Thaxll

Comment by Thaxll 5 days ago

1 reply

I always wondered how this works in practice for "real time" use cases because we've seen with secure boot + tpm that we can attest that the boot was genuine at some point in the past, what about modifications that can happen after that?

Nextgrid 5 days ago

A full trusted boot chain allows you to use a reboot to revert back to a trusted state after suspected runtime compromise.