On Fri, Jun 24, 2011 at 10:01:45AM +0100, Camilo Mesias wrote: > I am still struggling to see real applications for this. I don't know > how a networked system using the technology could be differentiated > from an (insecure) software simulation of the same from a remote > viewer's perspective. Also I don't see how it would be used in the Afaik it would allow to securely enter hard disk encryption passwords via network on a Fedora system, because one can ensure that the correct (untampered) initrd / kernel is loaded. You cannot simulate this afaik because the used cryptographic keys are only stored in the TPM module and cannot be accessed from the outside. Therefore one needs to tamper with the TPM module instead of only with the unencrypted /boot partition, which is a lot harder from my point of view. Regards Till -- devel mailing list devel@xxxxxxxxxxxxxxxxxxxxxxx https://admin.fedoraproject.org/mailman/listinfo/devel