| ▲ | tapoxi 2 hours ago | ||||||||||||||||||||||
The call asks the TPM to display the signed boot chain, you can't fake that because it wouldnt be cryptographically valid. The TPM is that independent hardware. | |||||||||||||||||||||||
| ▲ | digiown 2 hours ago | parent [-] | ||||||||||||||||||||||
How would that be implemented? I'd be curious to know. I'm not aware that a TPM is capable of hiding a key without the OS being able to access/unseal it at some point. It can display a signed boot chain but what would it be signed with? If it's not signed with a key out of the reach of the system, you can always implement a fake driver pretty easily to spoof it. | |||||||||||||||||||||||
| |||||||||||||||||||||||