Please go through
On Mon, Jun 28, 2010 at 6:04 PM, chloé Fouquet <email@example.com>
I would like to know how is used ima practically. In fact how is used the TPM at the moment ?
If I want to verify that a certain application on your computer is genuine do I need you to run it and send me after your "ima digests" file and after I check if the .exe value has a good hash ?
If you could give me some examples of how is used the TPM, the trusted boot and the ima architecture practically I will be very grateful !