Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

By virtual TPM you mean the implementation on modern Intel and Ryzen platforms in the cpu correct? If so does that mean that a firmware/bios/microcode update will be able to patch the vulnerability on those machines?


No, I mean a swtpm running in a hypervisor and presented to a VM as a discrete TPM.


I would not assume so as these are firmware implementations and as such would not use the simulator directly

edit: also look at the link you can see clearly that Intel is not effected but AMD is unknown...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: