• meaansel@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 hours ago

    But at the end of day, doesn’t app have to ask OS? At that stage, can’t you spoof “positive” responce of unmodified system?

    • LedgeDrop@lemmy.zip
      link
      fedilink
      English
      arrow-up
      1
      ·
      27 minutes ago

      That’s the strength of public/private key encryption.

      The application (or OS) knows what the hardware vendors public key is. Thus ,it can verify that any message (or application key) claiming to come from that hardware (TPM) is legitimate or not. Thus, the OS is just a proxy or the middle man.

      Now what you could do (in theory) is to start modifying the application and replace the hardware vendor public key with your own. …but you’d need to do this with every application and they’ll probably have some sort of anti-tampering or (more likely) you won’t even be allowed to install the application because your OS isn’t “safe/secure”.

      disclaimer: I’m a bit hazy on some of these details. There are probably more elegant solutions.