Comment Re:Never safe. (Score 1) 93
If you read the paper in detail, it says that the attacks affect Bitlocker, not all TPM based security. They do not compromise the authenticated boot capability of the TPM. You still cannot pretend to have booted a different system to the one you have.
There are plenty of things to criticise about Trusted Computing, but spotting boot-process malware is one thing it does very well. It works for the question "has this platform been booted with the correct software?" but not "has this platform always been booted with the correct software?"
It's situation dependent, of course, and it may not provide the necessary security guarantees that are required for cloud computing. But it comes much closer than a purely software-based solution can.