TPM2 introduced a plain text authorization scheme with the idea that the system using the TPM should now whether the transport was secure. The presence of interposers on the bus, either as physical devices
Or as compromised pre-boot firmware make this threat a reality. A NULL seed based scheme has been proposed for Linux
we should discuss if this is the best we can do and if it is how should we extend it to the layers below that use the TPM (like UEFI and grub).
|I agree to abide by the anti-harassment policy||Yes|