diff --git a/posts/secure_boot.md b/posts/secure_boot.md index 1e87769..bd9a0fe 100644 --- a/posts/secure_boot.md +++ b/posts/secure_boot.md @@ -217,7 +217,7 @@ of physical access or remote access through a BMC, what is? Is there a better solution? Well, to the best of the author knowledge, there is one: using a TPM. Using a -TPM will not necessarily  prevent an attacker from tainting the firmware. It +TPM will not necessarily prevent an attacker from tainting the firmware. It will not necessarily prevent booting untrusted and unverified executables. What a TPM can give us is the ability to unseal a LUKS passphrase and get access to user data if and only if the cryptographically verified right version of UEFI