] Remote attestation works by generating, in hardware, a ] cryptographic certificate attesting to the identity of ] the software currently running on a PC. (There is no ] determination of whether the software is good or bad, ] or whether it is compromised or not compromised. ] "Identity" is represented by a cryptographic hash, ] which simply allows different programs to be ] distinguished from one another, or changes in their ] code to be discerned, without conveying any sort of value ] judgment.) This certificate may, at the PC user's ] request, be provided to any remote party, and in ] principle has the effect of proving to that party that ] the machine is using expected and unaltered software. If ] the software on the machine has been altered, the ] certificate generated will reflect this. We will see ] that this approach, although elegant, proves ] problematic. READ THIS! EFF: Trusted Computing: Promise and Risk |