logoalt Hacker News

deno01/17/20250 repliesview on HN

You’ve answered it yourself. Without TPM you have no idea if you can provide the secret to the system or if it’s compromised. Whether that secret comes from TPM or network is secondary.