On 29/12/2021 12:38, Neal Gompa wrote:
Were they really? TPM devices*are*  commonly used today to support
attestation and multi-factor encryption and authentication mechanisms.
In many ways, the trusted computing initiative was a success. And even
virtualization is used for implementing trusted computing in some
platforms.

All hardware TPM implementations are proprietary. We can't trust them.

--
Sincerely,
  Vitaly Zaitsev ([email protected])
_______________________________________________
devel mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure

Reply via email to