logoalt Hacker News

KaiserProyesterday at 11:50 AM2 repliesview on HN

Also to your point: "can't we just encrypt it?"

Its someone else's computer. The TPM is controlled by someone else. You can't really process on a machine that has a compromised urandom/TPM

Also the bigger issue is having all your access revoked over night. Thats the bigger fear.


Replies

komali2yesterday at 12:20 PM

> You can't really process on a machine that has a compromised urandom/TPM

Naive question: does zero knowledge proof solutions help with this?

show 1 reply
XorNotyesterday at 12:05 PM

Exactly - it's about availability. If someone with remote access could knock out your business operations, how long would it take to adapt? How much economic cost could that incur, perhaps at a critical time?