On Thursday 20 August 2009 09:59:42 Michal Suchanek wrote:
> 2009/8/20 Michael Gorven <mich...@gorven.za.net>:
> > On Thursday 20 August 2009 09:49:06 Michal Suchanek wrote:
> >> 2009/8/20 Michael Gorven <mich...@gorven.za.net>:
> >> > On Wednesday 19 August 2009 21:21:28 Michal Suchanek wrote:
> >> >> Tell me one technical benefit of TPM over coreboot.
> >> >
> >> > Coreboot doesn't provide protected storage of secrets (e.g. harddrive
> >> > decryption keys).
> >>
> >> TPM does not either at the time the BIOS is loaded. Remember, it's the
> >> CPU what's running the BIOS, not the TPM chip.
> >>
> >> Only after BIOS enables TPM or coreboot enables any crypto device you
> >> choose you get any secrets or keys.
> >
> > So? It's still protected storage. You can read a BIOS chip, but you can't
> > just read the contents of a TPM chip.
>
> You can use decent crypto storage rather than half-broken TPM. There
> is no advantage to using it.

Like what?

-- 
http://michael.gorven.za.net
PGP Key ID 1E016BE8
S/MIME Key ID AAF09E0E

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
Grub-devel mailing list
Grub-devel@gnu.org
http://lists.gnu.org/mailman/listinfo/grub-devel

Reply via email to