There's no way for the OS to prove the base was secure, just as there's no way for the OS to prove that the PAM stack hasn't been replaced. All security involves placing some degree of trust in the underlying components.
Power management, mobile and firmware developer on Linux. Security developer at Aurora. Ex-biologist. mjg59 on Twitter. Content here should not be interpreted as the opinion of my employer. Also on Mastodon.
Re: assumption of innocence
Date: 2012-06-15 08:30 pm (UTC)