This ticket is a request to add the following questions to the FAQ to help the reader understand what TrenchBoot is and why it's needed:
Importantly, I think the TrenchBoot documentation should be written for an audience that's familiar with basic cryptography, but not familiar with Trusted Computing. They've heard of Secure Boot and Heads, but they don't know how they work or why they're important.
Q: What is TrenchBoot?
Q: Who should use TrenchBoot?
Q: How is TrenchBoot different from Secure Boot?
Q: How is TrenchBoot different from Heads?
Q: What are "measurements"?
Q: What is SRTM?
Q: What is DRTM?
I recommend keeping the answers as short as possible, and including links to helpful external educational resources where possible.
This ticket is a request to add the following questions to the FAQ to help the reader understand what TrenchBoot is and why it's needed:
Importantly, I think the TrenchBoot documentation should be written for an audience that's familiar with basic cryptography, but not familiar with Trusted Computing. They've heard of Secure Boot and Heads, but they don't know how they work or why they're important.
Q: What is TrenchBoot?
Q: Who should use TrenchBoot?
Q: How is TrenchBoot different from Secure Boot?
Q: How is TrenchBoot different from Heads?
Q: What are "measurements"?
Q: What is SRTM?
Q: What is DRTM?
I recommend keeping the answers as short as possible, and including links to helpful external educational resources where possible.