On 29/12/2021 12:38, Neal Gompa wrote:
Were they really? TPM devices*are* commonly used today to support
attestation and multi-factor encryption and authentication mechanisms.
In many ways, the trusted computing initiative was a success. And even
virtualization is used for implementing trusted computing in some
platforms.
All hardware TPM implementations are proprietary. We can't trust them.
--
Sincerely,
Vitaly Zaitsev (vitaly(a)easycoding.org)