Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Tpm isn't designed for this use case. You can use it for disk encryption or for identity attestation but step 1 for id attestation is asking the tpm to generate a key and then trusting that fingerprint from then on after doing a test sign with a binary blob. The running kernel is just a binary that can be hashed and whitelisted by a user space application. Don't need tpm for that.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: