On Wed, Dec 29, 2021 at 7:39 AM Vitaly Zaitsev via devel
On 29/12/2021 12:38, Neal Gompa wrote:
> Were they really? TPM devices*are* commonly used today to support
> attestation and multi-factor encryption and authentication mechanisms.
> In many ways, the trusted computing initiative was a success. And even
> virtualization is used for implementing trusted computing in some
All hardware TPM implementations are proprietary. We can't trust them.
CPU is proprietary, the firmware is proprietary. Guess we can't trust