Security with the Trusted Platform Module
Conclusion
Making good use of a TPM under Linux still involves a lot of manual work, but the results can be extremely worthwhile. Plenty of work is going on to integrate this functionality into distributions so that users can benefit from these security features without having to be experts. With luck, everyone will be using TPMs in the near future.
Infos
- Trusted Computing Group: https://trustedcomputinggroup.org/
- Using TPM for encryption: https://github.com/fox-it/linux-luks-tpm-boot
- GRUB: https://github.com/mjg59/grub
- tpmtotp: https://github.com/mjg59/tpmtotp
- Using the TPM chip to secure SSH keys: https://github.com/ThomasHabets/simple-tpm-pk11
- GRUB 2: https://github.com/mjg59/grub/tree/verifier_tpm_module
« Previous 1 2
Buy this article as PDF
Express-Checkout as PDF
Price $2.95
(incl. VAT)
(incl. VAT)