Well TPM is a closed hardware-bound system that does this before boot
(as far as I know). I was asking more for an open (software) system
for doing so post-boot.

On 21 June 2016 at 10:23, Peter Hessler <phess...@theapt.org> wrote:
> fwiw, this is literately the point of TPM.
>
>
> On 2016 Jun 21 (Tue) at 10:19:21 +0300 (+0300), Theodoros wrote:
> :Could someone trust a bootloader by e.g. having an aide-like system on
> :boot, confirming its' authenticity as part of the boot process?
> :
> :Please share your thoughts.
> :
> :
> :
> :On 20 June 2016 at 14:36, Ivan Markin <t...@riseup.net> wrote:
> :> Bodie:
> :>> What is that security reason worth of not using default full disk
> :>> encryption?
> :>
> :> Have a look at e.g. Evil Maid Attack [1]. One may want to bear a trusted
> :> bootloader with themselves and leave raw full-encrypted drive in some
> :> 'hostile' environment.
> :>
> :> [1] https://www.schneier.com/blog/archives/2009/10/evil_maid_attac.html
> :>
> :> --
> :> Ivan Markin
> :
>
> --
> The only really decent thing to do behind a person's back is pat it.

Reply via email to