What’s preventing an attacker from changing that key? Or is this just to change the attack from passive to active?
You can read the public key from the TPM. If you're using the endorsement key, it comes with a certificate issued by the vendor.
What’s preventing an attacker from changing that key? Or is this just to change the attack from passive to active?