Comment by Thaxll
I always wondered how this works in practice for "real time" use cases because we've seen with secure boot + tpm that we can attest that the boot was genuine at some point in the past, what about modifications that can happen after that?
A full trusted boot chain allows you to use a reboot to revert back to a trusted state after suspected runtime compromise.