Comment by Gigachad

4 years ago

How do we audit that the TPM chip is secure? What happened when a bug in the silicone is found later?

We assume it is, just like we assume CPU works as advertised. In other words, TPM is part of TCB.

  • So what is the point? I already assume the code on their server is not malicious by using it. What extra trust does an untrusted TPM chip give me?

    • System Transparency reduces your trust assumptions on us. As a VPN provider we are in an immense position of power over you. We aim to reduce your trust assumptions on us to a few things that we would need to explicitly lie about in order to betray you.

      As an example, let's say that we offered any of our users to at any time during the year show up at our office and inspect our VPN hardware, without warning us beforehand. In that situation, if we wanted to betray your trust and privacy, we would need to put in a lot more effort than if we said "We have secure servers. Trust us on that. No you can't see them.". Does that make sense?

      2 replies →