Navigation
Search
|
[$] Secure key handling using the TPM
Wednesday October 17, 2018. 06:36 PM , from LWN.net
Trusted Computing has not had the best
reputation over the years — Richard Stallman dubbing it 'Treacherous Computing' probably hasn't helped — though those fears of taking away users' control of their computers have not proven to be founded, at least yet. But the Trusted Platform Module, or TPM, inside your computer can do more than just potentially enable lockdown. In our second report from Kernel Recipes 2018, we look at a talk from James Bottomley about how the TPM works, how to talk to it, and how he's using it to improve his key handling.
https://lwn.net/Articles/768419/rss
|
25 sources
Current Date
Nov, Thu 21 - 22:16 CET
|