Sorry I've been proven wrong.
I've been missing the point of "remote attestation".
A third party CAN very what soft I'm running via tpm.

cheers

Section "report" here http://www.zurich.ibm.com/security/daa/
has opened my eyes on what purpose AIK keys really serve.


_______________________________________________
L4-hurd mailing list
[email protected]
http://lists.gnu.org/mailman/listinfo/l4-hurd

Reply via email to