On Wed, Dec 29, 2021 at 7:39 AM Vitaly Zaitsev via devel devel@lists.fedoraproject.org wrote:
On 29/12/2021 12:38, Neal Gompa wrote:
Were they really? TPM devices*are* commonly used today to support attestation and multi-factor encryption and authentication mechanisms. In many ways, the trusted computing initiative was a success. And even virtualization is used for implementing trusted computing in some platforms.
All hardware TPM implementations are proprietary. We can't trust them.
CPU is proprietary, the firmware is proprietary. Guess we can't trust our computers?