Tóth Gábor Baltazár on Nostr: nprofile1q…xvklh my question regarding TPM: 1. what's stopping an attacker from ...
nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqlksxw7gqy3tyvzvzv4wn0he6045z7k68nhnlec9tz4njkk3xdfmqaxvklh (nprofile…vklh)
my question regarding TPM:
1. what's stopping an attacker from putting a device between the TPM and the rest of the system to fake measurements?
2. how do we know the firmware is measuring itself and not just reporting a hard coded hash?
3. how can we rely on firmware based TPM to measure itself and not lie or just let all the secrets out?
my question regarding TPM:
1. what's stopping an attacker from putting a device between the TPM and the rest of the system to fake measurements?
2. how do we know the firmware is measuring itself and not just reporting a hard coded hash?
3. how can we rely on firmware based TPM to measure itself and not lie or just let all the secrets out?