Article 4118N [$] Secure key handling using the TPM

[$] Secure key handling using the TPM

by
jake
from LWN.net on (#4118N)

Trusted Computing has not had the bestreputation over the years - Richard Stallman dubbing it "TreacherousComputing" probably hasn't helped - though those fears of taking awayusers' control of their computers have not proven to be founded, at least yet.But the TrustedPlatform Module, or TPM, inside your computer can do more than justpotentially enable lockdown. In our second report from Kernel Recipes 2018, we look at a talk from James Bottomley about how the TPM works,how to talk to it, and how he's using it to improve his key handling.

External Content
Source RSS or Atom Feed
Feed Location http://lwn.net/headlines/rss
Feed Title LWN.net
Feed Link https://lwn.net/
Reply 0 comments