|
|
|
@ -236,6 +236,13 @@ When using an own PK, you loose the benefit of having externally created and sig |
|
|
|
Secure and trusted boot can, however, exist side by side on one system. |
|
|
|
The benefit of using it seems to be very limited when not using a Microsoft OS. |
|
|
|
|
|
|
|
\subsection{Intel TXT}% |
|
|
|
\label{sub:intel_txt} |
|
|
|
Intel developed a solution to build a trusted environment on a hypervisor which they call \emph{Trusted Execution Technology} (TXT). |
|
|
|
It requires an enabled TPM on the hypervisor as well as an activated trusted boot workflow. |
|
|
|
\ToDo |
|
|
|
|
|
|
|
|
|
|
|
\section{Integrity Measurement Architecture}% |
|
|
|
\label{sec:integrity_measurement_architecture} |
|
|
|
|
|
|
|
|