@mjg59
2. Assuming the threat model is: someone with complete physical access to a laptop trying to fool remote attestation into falsely passing — is it true that it's possible to intercept on-board communications between the TPM and the other components (CPU? RAM?), and feed false data into the TPM (pretending to be running stock software) to get it to release the secret material?
Sergey Bugaev (bugaevc@floss.social)'s status on Thursday, 02-Jan-2025 14:57:31 JST
-
Embed this notice
Sergey Bugaev (bugaevc@floss.social)'s status on Thursday, 02-Jan-2025 14:57:31 JST Sergey Bugaev