baloo, 1 month ago @mjg59 @hyc Curious: what kind of hardware should the security VM need to access? (I can only guess TPM? For state bootstrap or something?)
@mjg59 @hyc Curious: what kind of hardware should the security VM need to access? (I can only guess TPM? For state bootstrap or something?)