Comment by Thaxll
2 hours ago
I always wondered how this works in practice for "real time" use cases because we've seen with secure boot + tpm that we can attest that the boot was genuine at some point in the past, what about modifications that can happen after that?
No comments yet
Contribute on Hacker News ↗