From 33dfef37468ed50f4efa145760e7b9ab710130ac Mon Sep 17 00:00:00 2001 From: Florian Maury Date: Wed, 30 Nov 2022 09:35:46 +0100 Subject: [PATCH] remove double space in secure boot post --- posts/secure_boot.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/posts/secure_boot.md b/posts/secure_boot.md index 1e87769..bd9a0fe 100644 --- a/posts/secure_boot.md +++ b/posts/secure_boot.md @@ -217,7 +217,7 @@ of physical access or remote access through a BMC, what is? Is there a better solution? Well, to the best of the author knowledge, there is one: using a TPM. Using a -TPM will not necessarily  prevent an attacker from tainting the firmware. It +TPM will not necessarily prevent an attacker from tainting the firmware. It will not necessarily prevent booting untrusted and unverified executables. What a TPM can give us is the ability to unseal a LUKS passphrase and get access to user data if and only if the cryptographically verified right version of UEFI