Sergey Bugaev on Nostr: nprofile1q…xvklh 2. Assuming the threat model is: someone with complete physical ...
nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqlksxw7gqy3tyvzvzv4wn0he6045z7k68nhnlec9tz4njkk3xdfmqaxvklh (nprofile…vklh)
2. Assuming the threat model is: someone with complete physical access to a laptop trying to fool remote attestation into falsely passing — is it true that it's possible to intercept on-board communications between the TPM and the other components (CPU? RAM?), and feed false data into the TPM (pretending to be running stock software) to get it to release the secret material?
2. Assuming the threat model is: someone with complete physical access to a laptop trying to fool remote attestation into falsely passing — is it true that it's possible to intercept on-board communications between the TPM and the other components (CPU? RAM?), and feed false data into the TPM (pretending to be running stock software) to get it to release the secret material?