On Wed, Dec 29, 2021 at 7:39 AM Vitaly Zaitsev via devel <devel@xxxxxxxxxxxxxxxxxxxxxxx> wrote: > > On 29/12/2021 12:38, Neal Gompa wrote: > > Were they really? TPM devices*are* commonly used today to support > > attestation and multi-factor encryption and authentication mechanisms. > > In many ways, the trusted computing initiative was a success. And even > > virtualization is used for implementing trusted computing in some > > platforms. > > All hardware TPM implementations are proprietary. We can't trust them. CPU is proprietary, the firmware is proprietary. Guess we can't trust our computers? -- Chris Murphy _______________________________________________ devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/devel@xxxxxxxxxxxxxxxxxxxxxxx Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure