MacMusic  |  PcMusic  |  440 Software  |  440 Forums  |  440TV  |  Zicos
tpm
Search

[$] Secure key handling using the TPM

Wednesday October 17, 2018. 06:36 PM , from LWN.net
Trusted Computing has not had the best
reputation over the years — Richard Stallman dubbing it 'Treacherous
Computing' probably hasn't helped — though those fears of taking away
users' control of their computers have not proven to be founded, at least yet.
But the Trusted
Platform Module, or TPM, inside your computer can do more than just
potentially enable lockdown. In our second report from
Kernel Recipes 2018,
we look at a talk from James Bottomley about how the TPM works,
how to talk to it, and how he's using it to improve his key handling.
https://lwn.net/Articles/768419/rss
News copyright owned by their original publishers | Copyright © 2004 - 2024 Zicos / 440Network
Current Date
Apr, Wed 24 - 14:59 CEST