| 26 Jan 2024 |
ElvishJerricco | ohhhh | 23:02:50 |
ElvishJerricco | ok I forgot about that part | 23:02:57 |
raitobezarius | And you can control removing access to that encryption key remotely | 23:03:09 |
ElvishJerricco | right | 23:03:17 |
raitobezarius | And of course you have activity log etc | 23:03:19 |
raitobezarius | It becomes interesting for ONE aspect | 23:03:26 |
raitobezarius | Imagine you bind against more PCRs | 23:03:35 |
ElvishJerricco | so you basically are using the TPM just for remote attestation | 23:03:38 |
raitobezarius | And then on a reboot something change | 23:03:42 |
ElvishJerricco | which authenticates the machine to gain access to its disk decryption key | 23:03:51 |
ElvishJerricco | from a server | 23:04:00 |
raitobezarius | You can prompt yourself on your phone or something to accept/refuse that new change, etc. | 23:04:02 |
raitobezarius | In reply to @elvishjerricco:matrix.org so you basically are using the TPM just for remote attestation Correct | 23:04:09 |
ElvishJerricco | yea, that's really cool | 23:04:12 |
ElvishJerricco | I really like the idea of having it ping my phone too | 23:04:20 |