Sorry I've been proven wrong. I've been missing the point of "remote attestation". A third party CAN very what soft I'm running via tpm.
cheers Section "report" here http://www.zurich.ibm.com/security/daa/ has opened my eyes on what purpose AIK keys really serve. _______________________________________________ L4-hurd mailing list [email protected] http://lists.gnu.org/mailman/listinfo/l4-hurd
