zlacker

[parent] [thread] 2 comments
1. thrown+(OP)[view] [source] 2022-07-30 01:18:26
>Hardware-based attestation of the running software is an important security feature, especially in a world where data leaks and identity theft are rampant. Let's say I'm a healthcare provider, and I'm about to send sensitive medical data to a third party vendor. Wouldn't you prefer that this data only be able to be decrypted by a computer that can prove to the world it booted a clean OS image with all the latest security patches installed?

I'd prefer it to not be run a computer which has already been compromised with a UEFI rootkit which is what trusted computing has gotten us so far.

replies(1): >>dap+96
2. dap+96[view] [source] 2022-07-30 02:42:06
>>thrown+(OP)
These primitives can be used to tell you when you're talking to a machine that has not been compromised with a UEFI rootkit.
replies(1): >>thwart+k9
◧◩
3. thwart+k9[view] [source] [discussion] 2022-07-30 03:29:57
>>dap+96
Which is meaningless. Bad actors can use machines that have not been compromised with a rootkit.
[go to top]