You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Importantly, I think the TrenchBoot documentation should be written for an audience that's familiar with basic cryptography, but not familiar with Trusted Computing. They've heard of Secure Boot and Heads, but they don't know how they work or why they're important.
I recommend keeping the answers as short as possible, and including links to helpful external educational resources where possible.
The text was updated successfully, but these errors were encountered:
maltfield
changed the title
(Documentation) What makes TrenchBoot better than others?
(Documentation) What makes TrenchBoot different from than others?
Feb 18, 2023
maltfield
changed the title
(Documentation) What makes TrenchBoot different from than others?
(FAQ) What makes TrenchBoot different from than others?
Feb 18, 2023
This ticket is a request to add the following questions to the FAQ to help the reader understand what TrenchBoot is and why it's needed:
Importantly, I think the TrenchBoot documentation should be written for an audience that's familiar with basic cryptography, but not familiar with Trusted Computing. They've heard of Secure Boot and Heads, but they don't know how they work or why they're important.
Q: What is TrenchBoot?
Q: Who should use TrenchBoot?
Q: How is TrenchBoot different from Secure Boot?
Q: How is TrenchBoot different from Heads?
Q: What are "measurements"?
Q: What is SRTM?
Q: What is DRTM?
I recommend keeping the answers as short as possible, and including links to helpful external educational resources where possible.
The text was updated successfully, but these errors were encountered: