TPM and Trusted Computing
This cluster centers on discussions about Trusted Platform Module (TPM) chips, their use in secure boot, remote attestation, and hardware security, debating whether they provide genuine user benefits or mainly enable DRM and vendor control. Related topics include software vs hardware TPMs, comparisons to TrustZone or SGX, and concerns over treacherous computing.
Activity Over Time
Top Contributors
Keywords
Sample Comments
Does this relate to the TPM chips ?https://en.wikipedia.org/wiki/Trusted_Platform_Module
Using a TPM: https://en.wikipedia.org/wiki/Trusted_Platform_Module
Probably missing the TPM.https://en.wikipedia.org/wiki/Trusted_Platform_Module
Why couldn't they just use a software TPM?
secure boot with keys outside your control, mandatory TPM chips, remote attestation, etc
i would imagine as some sort of secure-boot or trusted hardware process.
My laptop can use TPM and a hardware key with my keys and free software. Where is the degraded security?
Agreed, finally a use for TPM that isn't customer hostile.
Well, luckily we have TPM chip just for that...
This is false. Here are technical docs on how the TPM is used: https://learn.microsoft.com/en-us/windows/security/informati...