

Sorry but this whole thing is just snake-oil.
You can verify and sign your whole trust chain down to the last shared library and it doesn’t matter when you don’t know what the binary blobs on your TPM / CPU / BIOS / NIC are doing.
The only guarantee to a secure system is openness an all of that signing won’t help you there.


I propose that the developers take turns to limit the exposition to whatever it is, that makes people go strange when they have to develop a filesystem.