▲ | mjg59 5 days ago | |||||||
The CPU attests what it booted, and you verify that attestation on a device you trust. If someone boots a shim instead then the attestation will be different and verification will fail, and you refuse to give it data. | ||||||||
▲ | louwrentius 5 days ago | parent [-] | |||||||
That creates a technical complexity I still don't trust. Because I don't see how you can trust that data isn't exfiltrated just because the boot image is correct. If you control the hardware, you trust them blindly. | ||||||||
|