logoalt Hacker News

denoyesterday at 11:40 AM0 repliesview on HN

You’ve answered it yourself. Without TPM you have no idea if you can provide the secret to the system or if it’s compromised. Whether that secret comes from TPM or network is secondary.