this post was submitted on 04 Apr 2026
347 points (99.2% liked)
Technology
83500 readers
2601 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
That's the strength of public/private key encryption.
The application (or OS) knows what the hardware vendors public key is. Thus ,it can verify that any message (or application key) claiming to come from that hardware (TPM) is legitimate or not. Thus, the OS is just a proxy or the middle man.
Now what you could do (in theory) is to start modifying the application and replace the hardware vendor public key with your own. ...but you'd need to do this with every application and they'll probably have some sort of anti-tampering or (more likely) you won't even be allowed to install the application because your OS isn't "safe/secure".
disclaimer: I'm a bit hazy on some of these details. There are probably more elegant solutions.