hardware root of trust
A known secure starting point. TPMs have a private key burned into the hardware that provides a hardware root of trust.
A known secure starting point. TPMs have a private key burned into the hardware that provides a hardware root of trust.