> a) How does the verification happen ? This is where the
> vulnerability will be.
Small binary within the LB payload that uses standard crypto signature
verification. This part can be assumed fully secure, as long as we ship
the machines with a known-good BIOS, which we obviously will.
I was under the impression that the public key based crypto code is
pretty large. Due to the tables used. Will the small binary really be
small?
--
Richard A. Smith
_______________________________________________
Devel mailing list
[email protected]
http://mailman.laptop.org/mailman/listinfo/devel