>       a)      How does the verification happen ? This is where the
> vulnerability will be.

Small binary within the LB payload that uses standard crypto signature
verification. This part can be assumed fully secure, as long as we ship
the machines with a known-good BIOS, which we obviously will.

I was under the impression that the public key based crypto code is
pretty large. Due to the tables used.  Will the small binary really be
small?

--
Richard A. Smith
_______________________________________________
Devel mailing list
[email protected]
http://mailman.laptop.org/mailman/listinfo/devel

Reply via email to