|
From: chloé F. <fou...@gm...> - 2010-06-28 13:04:21
|
Hi, I would like to know how is used ima practically. In fact how is used the TPM at the moment ? If I want to verify that a certain application on your computer is genuine do I need you to run it and send me after your "ima digests" file and after I check if the .exe value has a good hash ? If you could give me some examples of how is used the TPM, the trusted boot and the ima architecture practically I will be very grateful ! Chloe |