Other computers elsewhere could "challenge" your computer to prove that it was running an OS and programs that would behave in certain way (for example, that it would block screenshots of confidential messages). This challenge would include a long random number. Your computer's TPM would combine that number with hashes of all the other elements of your computer's operating environment - it's bootloader, OS, etc - and cryptographically sign that using its signing keys.
43/
=> More informations about this toot | View the thread | More toots from pluralistic
text/gemini
This content has been proxied by September (3851b).