... hash and the associated signatures for any bootloaders they find, and control over what ...
... How do we reallocate mechanisms of control and ...