@Dany I fully understand your points and I agree with some but I will only talk about technical points and not about the voting decision.
Keep in mind that we try to provide a secure environment to customers, hosted by farmers who have physical access to the nodes. And you probably know that it’s nearly impossible to have a perfect solution when physical access is possible.
Using SecureBoot and TPM based feature to increase the security is the only way you can put in place easily for mostly everyone already on the grid. Theses technologie are available on almost all hardware attached to the grid and is the most common for no-cost solution right now. Other method you would put in place always depend on external hardware (and usually expensive).
Btw, arguing about hardware security or security hole in theses technology when talking about using 15 years old hardware is quite irrelevant, there are way more security issue with theses old hardware.
So well Secure Boot and TPM based solution are maybe not the best practice we can put in place but at least it’s one security layer we can apply to mostly everybody without any additional cost. There is no real other way we can use to store encryptions keys and/or node id to make an autonomous system working securely, being able to work without human intervention when people you don’t know can have physical access to node.
Even if it’s not perfect it will make way harder any way to corrupt, exploit, extract or tamper data and the OS