(no title)
Thaxll
|
1 month ago
I always wondered how this works in practice for "real time" use cases because we've seen with secure boot + tpm that we can attest that the boot was genuine at some point in the past, what about modifications that can happen after that?
Nextgrid|1 month ago