Closed andreeaflorescu closed 3 years ago
The input of vm-fdt is considered trusted. This needs to be explictly mentioned in the threat model documentation.
The input of vm-fdt is considered trusted. This needs to be explictly mentioned in the threat model documentation.